| Commit message (Collapse) | Author | Files | Lines | ||
|---|---|---|---|---|---|
| 2025-10-18 | move keycloak and forgejo on rivendell | Franck Cuny | 1 | -2/+2 | |
| I had to rekey all the secrets. Updated the documentation for both how to setup forgejo and keycloak. | |||||
| 2025-10-18 | configure wireguard for rivendell | Franck Cuny | 1 | -0/+7 | |
| 2025-10-13 | introduce a module for digital ocean droplet | Franck Cuny | 1 | -16/+3 | |
| 2025-10-13 | consistent home-manager configuration for all nixos hosts | Franck Cuny | 1 | -9/+0 | |
| 2025-10-09 | configure podman for all nixos machines | Franck Cuny | 1 | -2/+0 | |
| 2025-10-09 | import home-manager.nix and user.nix by default on nixos | Franck Cuny | 1 | -2/+0 | |
| 2025-10-09 | automatically import home-manager.nix for all hosts | Franck Cuny | 1 | -1/+0 | |
| 2025-10-09 | more simplification of the configuration | Franck Cuny | 1 | -3/+0 | |
| 2025-10-09 | move common modules under modules/ | Franck Cuny | 1 | -1/+0 | |
| Simplify the import on the various hosts. | |||||
| 2025-10-06 | nix configuration is applied by default to nixos machines | Franck Cuny | 1 | -2/+0 | |
| 2025-09-12 | start to refactor nixos modules | Franck Cuny | 1 | -1/+0 | |
| 2025-09-08 | Revert "move droplet specific settings to its own module" | Franck Cuny | 1 | -3/+6 | |
| This reverts commit 3b47113c28c5180d4d5d710e3c1fe74f95aa7226. | |||||
| 2025-09-08 | move droplet specific settings to its own module | Franck Cuny | 1 | -6/+3 | |
| 2025-09-07 | move deployment bits to colmena declaration | Franck Cuny | 1 | -7/+0 | |
| 2025-09-01 | initial attempt at using colmena to deploy nixos configurations | Franck Cuny | 1 | -0/+7 | |
| Can be used that way: ``` colmena exec --impure -v --on do-rproxy -- 'systemctl status nginx' ``` or ``` colmena --impure apply dry-activate --on synology-vm ``` | |||||
| 2025-08-30 | switch to nginx | Franck Cuny | 1 | -1/+1 | |
| For some reasons, I can't get compression to work with Caddy, and I don't get much benefit from it in the first place anyway. | |||||
| 2025-08-20 | initial configuration for fail2ban | Franck Cuny | 1 | -0/+1 | |
| We need to ensure the firewall is enabled and let's ensure that we open the port for SSH. | |||||
| 2025-08-17 | create a new systemd slice for critical services | Franck Cuny | 1 | -8/+1 | |
| 2025-08-12 | initial setup for forgejo and caddy | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | more simplifications | Franck Cuny | 1 | -53/+1 | |
| 2025-08-12 | move secrets to their own files and delete unused profile | Franck Cuny | 1 | -14/+10 | |
| 2025-08-12 | move profile for home-manager under programs | Franck Cuny | 1 | -1/+1 | |
| 2025-08-12 | profiles for doc, fish, and remove unused profiles | Franck Cuny | 1 | -1/+3 | |
| 2025-08-12 | add profiles for security, firewalls, and users | Franck Cuny | 1 | -0/+3 | |
| 2025-08-12 | add a profile for boot | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | use podman for containers on nixos | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | add profile for motd | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | create profiles for networkd and nix's GC | Franck Cuny | 1 | -1/+2 | |
| 2025-08-12 | move disks configuration to the host' directory | Franck Cuny | 1 | -2/+1 | |
| 2025-08-12 | profile for tools | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | profile for sshd | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | import locale | Franck Cuny | 1 | -0/+1 | |
| 2025-08-12 | move each machine configuration to a folder | Franck Cuny | 1 | -0/+0 | |
| This will give me a bit more flexibility to configure things per machine in the future. | |||||
| 2025-08-12 | users -> home | Franck Cuny | 1 | -1/+1 | |
| 2025-08-10 | setup wireguard tunnel between the VM and DO hosts | Franck Cuny | 1 | -0/+9 | |
| 2025-08-10 | manage a DigitalOcean virtual machine with nixos | Franck Cuny | 1 | -0/+110 | |
| Add a new machine on DigitalOcean and provision it using terraform + nixos-anywhere. This takes care of bringing the machine up on nixos completely, and use a static SSH host key in order to configure wireguard at the same time. | |||||
