| Commit message (Collapse) | Author | Age | Files | Lines | |
|---|---|---|---|---|---|
| * | add a module to remotely unlock machines | Franck Cuny | 7 days | 1 | -0/+10 |
| | | | | | | | | For machines with full disk encryption, we can remotely unlock them from bree. A systemd timer will run every 10 minutes and check if we need to unlock the host. If we need to, it will SSH and provide the passphrase to unlock the disk(s). | ||||
| * | the VM on the synology was reinstalled | Franck Cuny | 8 days | 1 | -1/+1 |
| | | | | | All the secrets were re-keyed. | ||||
| * | backup to the synology nas | Franck Cuny | 8 days | 1 | -4/+1 |
| | | | | | | | In addition to do a local backup, we also backup to the synology nas. We don't configure what to backup in the profiles, but instead in the host configuration. | ||||
| * | rename synology-vm to bree | Franck Cuny | 9 days | 1 | -7/+6 |
| | | |||||
| * | configure miniflux and integrate with authelia | Franck Cuny | 13 days | 1 | -0/+12 |
| | | |||||
| * | initial setup for authelia | Franck Cuny | 14 days | 1 | -0/+19 |
| | | |||||
| * | delete do-rproxy | Franck Cuny | 14 days | 1 | -11/+3 |
| | | | | | This machine is replaced by argonath | ||||
| * | configure the reverse proxy on argonath | Franck Cuny | 14 days | 1 | -1/+1 |
| | | |||||
| * | add argonath to agenix and rekey secrets | Franck Cuny | 2025-11-21 | 1 | -0/+7 |
| | | |||||
| * | move acme configurations to a profile | Franck Cuny | 2025-11-20 | 1 | -1/+2 |
| | | | | | Clean up API keys for Cloudflare. | ||||
| * | delete profiles for forgejo and keycloak | Franck Cuny | 2025-11-15 | 1 | -8/+0 |
| | | |||||
| * | simplify the backups | Franck Cuny | 2025-11-15 | 1 | -5/+3 |
| | | |||||
| * | remove tailscale configuration | Franck Cuny | 2025-11-09 | 1 | -5/+0 |
| | | |||||
| * | configure rivendell to be an exit node for tailscale | Franck Cuny | 2025-10-24 | 1 | -0/+5 |
| | | |||||
| * | move keycloak and forgejo on rivendell | Franck Cuny | 2025-10-18 | 1 | -2/+2 |
| | | | | | | I had to rekey all the secrets. Updated the documentation for both how to setup forgejo and keycloak. | ||||
| * | configure wireguard for rivendell | Franck Cuny | 2025-10-18 | 1 | -0/+6 |
| | | |||||
| * | switch to nginx | Franck Cuny | 2025-08-30 | 1 | -1/+1 |
| | | | | | | For some reasons, I can't get compression to work with Caddy, and I don't get much benefit from it in the first place anyway. | ||||
| * | add keycloak for OAuth, runbooks, and finish forgejo setup | Franck Cuny | 2025-08-14 | 1 | -0/+8 |
| | | |||||
| * | rekey some secrets and deleted unused ones | Franck Cuny | 2025-08-12 | 1 | -9/+4 |
| | | |||||
| * | delete LLM related stuff for now | Franck Cuny | 2025-08-12 | 1 | -6/+0 |
| | | |||||
| * | setup wireguard tunnel between the VM and DO hosts | Franck Cuny | 2025-08-10 | 1 | -0/+5 |
| | | |||||
| * | manage a DigitalOcean virtual machine with nixos | Franck Cuny | 2025-08-10 | 1 | -0/+10 |
| | | | | | | | | Add a new machine on DigitalOcean and provision it using terraform + nixos-anywhere. This takes care of bringing the machine up on nixos completely, and use a static SSH host key in order to configure wireguard at the same time. | ||||
| * | add the SSH key for the remote builder | Franck Cuny | 2025-08-09 | 1 | -0/+7 |
| | | | | | All the secrets were rekeyed. | ||||
| * | add a module for mounting CIFS volumes | Franck Cuny | 2025-07-25 | 1 | -0/+4 |
| | | | | | | | | | | | The new module is for NAS clients, where we specify the server and the paths to mount locally. We add a new secret to have the username of the `nas' user. We mount the backups volume from the NAS under `/data/backups` on the VM. | ||||
| * | add secrets and configurations for cloudflared | Franck Cuny | 2025-07-06 | 1 | -0/+9 |
| | | |||||
| * | backup the VM to Google Cloud Storage | Franck Cuny | 2025-06-30 | 1 | -0/+11 |
| | | | | | For now we only backup git repositories. | ||||
| * | remove one of my keys from the secrets | Franck Cuny | 2025-06-12 | 1 | -6/+3 |
| | | |||||
| * | use a dedicated SSH key for agenix | Franck Cuny | 2025-06-12 | 1 | -3/+10 |
| | | | | | | | | The key is still stored in 1password, and we add a script to synchronize the key to the host. The existing keys have been rekeyed with the new key. | ||||
| * | use agenix to manage some secrets | Franck Cuny | 2025-06-08 | 1 | -0/+9 |
| | | | | | | | | | | | | I have some secrets that I want to manage for my user without having to rely on 1password, and ensure proper rotation everywhere when needed. For now we only have two secrets (one for `llm` and another one is the API key for anthropic for Emacs). Will document the process better in the near future. | ||||
| * | remove secrets and agenix since nothing uses them | Franck Cuny | 2024-12-28 | 1 | -12/+0 |
| | | |||||
| * | switch to the newer version of nixfmt | Franck Cuny | 2024-12-19 | 1 | -6/+8 |
| | | | | | | | `nixfmt-rfc-style' replaces `nixfmt-classic'. It's actively maintained, but also changes the style, so this commit touches all the files in the repository. | ||||
| * | use treefmt to format all the files | Franck Cuny | 2024-12-19 | 1 | -6/+1 |
| | | |||||
| * | run `ddns-updater' on `vm-synology' | Franck Cuny | 2024-12-15 | 1 | -1/+4 |
| | | | | | | It has a small UI and the configuration with the secrets is managed with `agenix'. | ||||
| * | use agenix to manage secrets in the repository | Franck Cuny | 2024-12-14 | 1 | -0/+12 |
