| Commit message (Collapse) | Author | Age | Files | Lines |
| | |
|
| |
|
|
|
|
|
|
|
| |
All the terraform configuration is managed within one state instead of
having multiple state for each components. This might not be the best
practice but it simplifies things for me.
Now, all I need to do is to run `nix run .#tf -- plan` and I can see
what will be changed for all the resources that I care about.
|
| | |
|
| |
|
|
| |
All the secrets were rekeyed.
|
| | |
|
| |
|
|
|
|
|
|
|
|
| |
It might be useful to have a local backup so that I don't need to pull
it from the remote bucket. It is useful to be able to quickly browse and
see what's in the backup, and having to go to GCS for that is a waste of
resources.
Export environment variables to make it easier to interact with the
local repository.
|
| | |
|
| |
|
|
|
| |
This is a VM running on the Synology NAS. For now it only run
`gitolite`, but we may host additional services in the future.
|
| |
|
|
|
|
|
| |
The key is still stored in 1password, and we add a script to
synchronize the key to the host.
The existing keys have been rekeyed with the new key.
|
| |
|
|
|
|
|
|
|
|
|
| |
I have some secrets that I want to manage for my user without having
to rely on 1password, and ensure proper rotation everywhere when
needed.
For now we only have two secrets (one for `llm` and another one is the
API key for anthropic for Emacs).
Will document the process better in the near future.
|
| |
|
|
| |
Delete unused/outdated documentations.
|
| | |
|
| |
|
|
|
| |
I'm not using rclone anymore and I'm not storing the backups to GCS
buckets either.
|
| |
|
|
|
|
|
|
| |
Delete gnome's keyring documentation, I will not be using it anymore, so
no need to keep this around.
Add documentation about how to manage secrets, and clean up wireguard's
documentation.
|
| | |
|
| |
|
|
|
|
|
| |
Change-Id: Ibc81727971cfbd7b05c383a1c58ca02b907683f7
Reviewed-on: https://cl.fcuny.net/c/world/+/661
Tested-by: CI
Reviewed-by: Franck Cuny <franck@fcuny.net>
|
| |
|
|
|
|
|
|
|
|
|
|
| |
Currently the secure configuration for gerrit is not managed by nix.
This is likely going to break in the future and I'll hate myself for
that. Let's move it into nix and encrypt it with age, like we do for
other secrets.
Change-Id: Ia7a006748a3ad64fa4b97ca9e8cbd98c99433982
Reviewed-on: https://cl.fcuny.net/c/world/+/622
Tested-by: CI
Reviewed-by: Franck Cuny <franck@fcuny.net>
|
| |
|
|
|
|
|
| |
Change-Id: I79075be119258eb8ee28bf99f404480a646d2583
Reviewed-on: https://cl.fcuny.net/c/world/+/402
Tested-by: CI
Reviewed-by: Franck Cuny <franck@fcuny.net>
|
| |
|
|
|
|
| |
Change-Id: I8d00bfd71248e1403e8966d74e93941d90462b47
Reviewed-on: https://cl.fcuny.net/c/world/+/83
Reviewed-by: Franck Cuny <franck@fcuny.net>
|
| |
|
|
| |
The `documents` folder was not being synced.
|
| | |
|
| | |
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
|
|
|
|
| |
Add a new module to automatically configure the peers for wireguard. The
module needs a configuration file (in `configs/wireguard.toml`) which
lists all the peers, their IP and and their public keys. The secret keys
is encrypted as a secret with agenix.
There's some initial documentation on how to use this setup.
|
| | |
|
| | |
|
| | |
|
| |
|
|
|
| |
Create a subvolume named 'media' that we will mount under
/home/fcuny/media so we can snapshots /home/fcuny without the medias.
|
| |
|