aboutsummaryrefslogtreecommitdiff
path: root/docs (follow)
Commit message (Collapse)AuthorAgeFilesLines
* simplify the configurationFranck Cuny13 days5-116/+0
|
* clean up documentationsFranck Cuny2025-11-153-34/+1
|
* delete profiles for forgejo and keycloakFranck Cuny2025-11-152-41/+0
|
* move keycloak and forgejo on rivendellFranck Cuny2025-10-182-17/+24
| | | | | I had to rekey all the secrets. Updated the documentation for both how to setup forgejo and keycloak.
* configure wireguard for rivendellFranck Cuny2025-10-181-0/+51
|
* initial setup for the framework destkop (named rivendell)Franck Cuny2025-10-121-0/+20
|
* configure keycloak with terraformFranck Cuny2025-09-011-0/+20
|
* manage terraform configuration with terranixFranck Cuny2025-08-311-2/+1
| | | | | | | | | All the terraform configuration is managed within one state instead of having multiple state for each components. This might not be the best practice but it simplifies things for me. Now, all I need to do is to run `nix run .#tf -- plan` and I can see what will be changed for all the resources that I care about.
* add keycloak for OAuth, runbooks, and finish forgejo setupFranck Cuny2025-08-142-0/+29
|
* add the SSH key for the remote builderFranck Cuny2025-08-091-0/+7
| | | | All the secrets were rekeyed.
* add a small note about DNS configurationFranck Cuny2025-07-131-0/+11
|
* store backups locally and remotelyFranck Cuny2025-07-071-8/+10
| | | | | | | | | | It might be useful to have a local backup so that I don't need to pull it from the remote bucket. It is useful to be able to quickly browse and see what's in the backup, and having to go to GCS for that is a waste of resources. Export environment variables to make it easier to interact with the local repository.
* add some docs about backupsFranck Cuny2025-06-301-0/+13
|
* add configuration for vm-synologyFranck Cuny2025-06-301-0/+14
| | | | | This is a VM running on the Synology NAS. For now it only run `gitolite`, but we may host additional services in the future.
* use a dedicated SSH key for agenixFranck Cuny2025-06-121-6/+8
| | | | | | | The key is still stored in 1password, and we add a script to synchronize the key to the host. The existing keys have been rekeyed with the new key.
* use agenix to manage some secretsFranck Cuny2025-06-081-0/+15
| | | | | | | | | | | I have some secrets that I want to manage for my user without having to rely on 1password, and ensure proper rotation everywhere when needed. For now we only have two secrets (one for `llm` and another one is the API key for anthropic for Emacs). Will document the process better in the near future.
* update the main documentationFranck Cuny2023-12-147-597/+0
| | | | Delete unused/outdated documentations.
* various updates related to music collectionFranck Cuny2023-07-051-0/+39
|
* modules/rclone: delete the module and cleanupFranck Cuny2023-04-301-11/+1
| | | | | I'm not using rclone anymore and I'm not storing the backups to GCS buckets either.
* documentation: clean upFranck Cuny2023-03-103-68/+29
| | | | | | | | Delete gnome's keyring documentation, I will not be using it anymore, so no need to keep this around. Add documentation about how to manage secrets, and clean up wireguard's documentation.
* ref(gerrit): delete modules/docs/configs for gerrit/buildkiteFranck Cuny2022-11-071-79/+0
|
* docs(gerrit): how to edit the secretsFranck Cuny2022-07-201-1/+3
| | | | | | | Change-Id: Ibc81727971cfbd7b05c383a1c58ca02b907683f7 Reviewed-on: https://cl.fcuny.net/c/world/+/661 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
* feat(modules/gerrit): manage secure configuration with nixFranck Cuny2022-07-181-1/+1
| | | | | | | | | | | | Currently the secure configuration for gerrit is not managed by nix. This is likely going to break in the future and I'll hate myself for that. Let's move it into nix and encrypt it with age, like we do for other secrets. Change-Id: Ia7a006748a3ad64fa4b97ca9e8cbd98c99433982 Reviewed-on: https://cl.fcuny.net/c/world/+/622 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
* docs(gerrit): document various thingsFranck Cuny2022-06-101-0/+59
| | | | | | | Change-Id: I79075be119258eb8ee28bf99f404480a646d2583 Reviewed-on: https://cl.fcuny.net/c/world/+/402 Tested-by: CI Reviewed-by: Franck Cuny <franck@fcuny.net>
* docs: start documenting gerritFranck Cuny2022-05-281-0/+18
| | | | | | Change-Id: I8d00bfd71248e1403e8966d74e93941d90462b47 Reviewed-on: https://cl.fcuny.net/c/world/+/83 Reviewed-by: Franck Cuny <franck@fcuny.net>
* modules: fix configuration for syncthingFranck Cuny2022-05-131-0/+6
| | | | The `documents` folder was not being synced.
* docs: some documentationFranck Cuny2022-05-071-0/+21
|
* docs: add more documentation!Franck Cuny2022-03-253-0/+207
|
* docs: add partition setup for the NASFranck Cuny2022-02-271-2/+43
|
* docs: backups!Franck Cuny2022-02-241-0/+197
|
* docs: update wireguard setupFranck Cuny2022-02-211-0/+2
|
* wireguard: module and peers configurationsFranck Cuny2022-02-211-0/+21
| | | | | | | | | Add a new module to automatically configure the peers for wireguard. The module needs a configuration file (in `configs/wireguard.toml`) which lists all the peers, their IP and and their public keys. The secret keys is encrypted as a secret with agenix. There's some initial documentation on how to use this setup.
* docs: more updateFranck Cuny2022-02-201-6/+20
|
* docs: add more stepsFranck Cuny2022-02-191-1/+9
|
* docs: udpateFranck Cuny2022-02-181-2/+2
|
* hosts: add a new subvolumes to carmelFranck Cuny2022-02-141-0/+3
| | | | | Create a subvolume named 'media' that we will mount under /home/fcuny/media so we can snapshots /home/fcuny without the medias.
* doc: how to install the systemFranck Cuny2022-02-071-0/+87