aboutsummaryrefslogtreecommitdiff
path: root/secrets (follow)
Commit message (Collapse)AuthorAgeFilesLines
* add keycloak for OAuth, runbooks, and finish forgejo setupFranck Cuny2025-08-143-0/+22
|
* rekey some secrets and deleted unused onesFranck Cuny2025-08-129-34/+30
|
* delete LLM related stuff for nowFranck Cuny2025-08-121-6/+0
|
* setup wireguard tunnel between the VM and DO hostsFranck Cuny2025-08-102-0/+12
|
* manage a DigitalOcean virtual machine with nixosFranck Cuny2025-08-103-0/+17
| | | | | | | Add a new machine on DigitalOcean and provision it using terraform + nixos-anywhere. This takes care of bringing the machine up on nixos completely, and use a static SSH host key in order to configure wireguard at the same time.
* add the SSH key for the remote builderFranck Cuny2025-08-098-12/+17
| | | | All the secrets were rekeyed.
* add a module for mounting CIFS volumesFranck Cuny2025-07-252-0/+12
| | | | | | | | | | The new module is for NAS clients, where we specify the server and the paths to mount locally. We add a new secret to have the username of the `nas' user. We mount the backups volume from the NAS under `/data/backups` on the VM.
* store backups locally and remotelyFranck Cuny2025-07-071-0/+0
| | | | | | | | | | It might be useful to have a local backup so that I don't need to pull it from the remote bucket. It is useful to be able to quickly browse and see what's in the backup, and having to go to GCS for that is a waste of resources. Export environment variables to make it easier to interact with the local repository.
* add secrets and configurations for cloudflaredFranck Cuny2025-07-063-0/+9
|
* backup the VM to Google Cloud StorageFranck Cuny2025-06-303-0/+18
| | | | For now we only backup git repositories.
* remove one of my keys from the secretsFranck Cuny2025-06-121-6/+3
|
* use a dedicated SSH key for agenixFranck Cuny2025-06-123-12/+23
| | | | | | | The key is still stored in 1password, and we add a script to synchronize the key to the host. The existing keys have been rekeyed with the new key.
* use agenix to manage some secretsFranck Cuny2025-06-083-0/+20
| | | | | | | | | | | I have some secrets that I want to manage for my user without having to rely on 1password, and ensure proper rotation everywhere when needed. For now we only have two secrets (one for `llm` and another one is the API key for anthropic for Emacs). Will document the process better in the near future.
* remove secrets and agenix since nothing uses themFranck Cuny2024-12-283-19/+0
|
* switch to the newer version of nixfmtFranck Cuny2024-12-191-6/+8
| | | | | | `nixfmt-rfc-style' replaces `nixfmt-classic'. It's actively maintained, but also changes the style, so this commit touches all the files in the repository.
* use treefmt to format all the filesFranck Cuny2024-12-191-6/+1
|
* move gitotlite to vm-synologyFranck Cuny2024-12-162-6/+6
|
* run `ddns-updater' on `vm-synology'Franck Cuny2024-12-152-1/+4
| | | | | It has a small UI and the configuration with the secrets is managed with `agenix'.
* use agenix to manage secrets in the repositoryFranck Cuny2024-12-142-0/+19
|
* secrets: move all the secrets under module/Franck Cuny2022-04-107-25/+0
| | | | | Refactor a bit the configuration, which should simplify the management and usage of secrets from now on.
* rclone: synchronize restic repo to GCSFranck Cuny2022-03-112-0/+0
| | | | | | Add a couple of secrets to store the configuration and the service account, and add a timer to synchronize the restic repository to a GCS bucket once a day.
* restic: add the secret for the repo 'systems'Franck Cuny2022-03-071-0/+12
|
* unifi: configure the pollerFranck Cuny2022-03-061-0/+13
|
* traefik: initial configurationFranck Cuny2022-03-061-0/+0
| | | | | | | | | I want to run traefik on the NAS, so I can reach grafana and other future services running on that host. To manage TLS, we use let's encrypt with a DNS challenge. For this to work we need a service account configuration, that is encrypted with age.
* agenix: rekey secretsFranck Cuny2022-03-052-0/+0
| | | | Reinstalled tahoe, new ssh key for the host.
* secrets: add a new key and rekey existing keysFranck Cuny2022-03-012-18/+19
|
* tahoe: wireguard setupFranck Cuny2022-02-211-0/+10
|
* secrets: initial config and a first secretFranck Cuny2022-02-211-0/+10