aboutsummaryrefslogtreecommitdiff
path: root/TODOs.org (follow)
Commit message (Collapse)AuthorAgeFilesLines
...
* TODOs.orgEuAndreh2019-06-041-0/+1
|
* TODOs.orgEuAndreh2019-06-041-0/+4
|
* TODOs.orgEuAndreh2019-06-021-0/+2
|
* TODOs.orgEuAndreh2019-06-011-0/+1
|
* TODOs.orgEuAndreh2019-05-301-5/+52
|
* Use Floating IP on DropletEuAndreh2019-05-281-1/+7
|
* TODOs.orgEuAndreh2019-05-281-1/+5
| | | | Extend on how to use =vps-state= to store Terraform state.
* TODOs.orgEuAndreh2019-05-281-0/+11
| | | | Expand on the decision of using =vps-state= to store Terraform files.
* Add backup routing before possibly tearing down machineEuAndreh2019-05-281-1/+4
| | | | | | | | | | Create a new backup entry before running =terraform apply=, which may (or may not) destroy the current machine. This shouldn't be an issue for the backup itself, since all of the data should be stored in a separate Block Storage Volume, but we can take advantage of the sevices already needing to be taken down in order to perform a full backup of the data.
* TODOs.orgEuAndreh2019-05-271-0/+2
|
* TODOs.orgEuAndreh2019-05-271-0/+1
| | | | Add =Nice to have= task on docker-compose version
* TODOs.orgEuAndreh2019-05-271-0/+9
| | | | Add notes on creating backups, and questions on the best strategies available.
* TODOs.orgEuAndreh2019-05-271-4/+25
|
* TODOs.orgEuAndreh2019-05-261-3/+12
|
* TODOs.orgEuAndreh2019-05-261-10/+34
|
* TODOs.orgEuAndreh2019-05-261-1/+8
|
* Add gnupg to allow pipeline to import GPG keysEuAndreh2019-05-261-1/+1
|
* Automate provisioning and deployment of VPSEuAndreh2019-05-261-0/+4
| | | | | | | | | | | | | | | | | | | | | | | | In order to perform that I had to remove Terraform's =.tfstate= files from the repository. Terraform does support "backends" for storing the state files, but I settled for storing it on a separate repo (vps-state). For now it solves the state management problem: - it has history of states; - all state files are GPG encrypted; - there's no coordination however, but only the CI should perform a deploy in order to avoid race conditions. I had to add GPG and SSH keys to sr.ht to achieve that: - SSH public key to my profile to authorize it to push to vps-state repo; - SSH private key to the secret builds.sr.ht environment to enable push to the repository from the pipeline; - GPG public key to git-crypt to make it possible for the pipeline to unlock the encrypted content; - GPG private key to the secret builds.sr.ht environment to enable decrypting git-crypt content from the pipeline. In order to avoid divergent environment from local and CI, the ./provision.sh script is ran through nix-shell.
* Add static file server container with nginxEuAndreh2019-05-261-1/+2
|
* TODOs.orgEuAndreh2019-05-261-2/+21
|
* TODOs.orgEuAndreh2019-05-251-3/+5
|
* TODOs.orgEuAndreh2019-05-251-21/+26
|
* Remove provisioning from TerraformEuAndreh2019-05-251-0/+4
|
* TODOs.orgEuAndreh2019-05-251-1/+1
|
* Add lint checks and a pipeline to check using NixEuAndreh2019-05-251-5/+8
|
* TODOs.orgEuAndreh2019-05-251-13/+19
|
* TODOs.orgEuAndreh2019-05-251-3/+11
|
* TODOs.orgEuAndreh2019-05-241-0/+21