aboutsummaryrefslogtreecommitdiff
path: root/bash_aliases.sh (unfollow)
Commit message (Collapse)AuthorFilesLines
2019-05-27Add --color to ls aliasEuAndreh1-1/+1
2019-05-27Add cd to /home/vps/ in profileEuAndreh1-0/+1
Just a nice to have when SSH'ing interactively, doesn't have and effect on non-interactive SSH commands.
2019-05-27Use ssh pipe and cat instead of hacky temporary file descriptorEuAndreh1-3/+1
Taken from http://compgroups.net/comp.unix.shell/-scp-dev-fd-63-not-a-regular-file/3063561
2019-05-27WIP: take a backup during deploymentEuAndreh2-2/+11
Before possibly tearing down the machine, while all services are stopped (after the =docker-compose down= command), create a new backup with the current data. The backup tag should include the commit SHA of the deployment.
2019-05-27Add more descriptive error message for FIXME derivation testEuAndreh1-1/+5
2019-05-27Add bash_aliases.sh and scp it when deploying a new boxEuAndreh2-0/+4
2019-05-27Add Nextcloud recipe to docker-compose.yamlEuAndreh2-0/+19
2019-05-27Use Bash variables for domain names and container portsEuAndreh2-9/+9
2019-05-27Fix formatting of default.nix (linter offense)EuAndreh1-7/+2
2019-05-27Revert Terraform to "default" versionEuAndreh1-1/+1
2019-05-27TODOs.orgEuAndreh1-4/+25
2019-05-26Run terraform init before running terraform applyEuAndreh1-0/+1
2019-05-26Use Terraform 0.12.0 in nix-shell and CIEuAndreh1-2/+7
2019-05-26ci dbgEuAndreh1-0/+1
2019-05-26Change permission of ./secrets/id_rsa after git crypt unlockEuAndreh1-0/+2
2019-05-26Disable StrictHostKeyChecking for SSH accessEuAndreh1-0/+1
2019-05-26Fix missing argument to sshEuAndreh1-1/+1
2019-05-26Fix call to ./provision.sh in .build.ymlEuAndreh1-1/+1
2019-05-26Specify shell type to ShellCheck in nix-shell shebang filesEuAndreh2-0/+2
2019-05-26Format default.nix (nixfmt offense)EuAndreh1-7/+2
2019-05-26Use more robust Bash cd approachEuAndreh4-3/+3
2019-05-26Run CI scripts from ./vps/ folderEuAndreh1-2/+5
2019-05-26Use nix-shell shebang to run CI scriptsEuAndreh3-8/+7
2019-05-26Use nix-shell --pure to run scriptsEuAndreh2-4/+11
Instead of adding them to the =packages= section of .build.yml.
2019-05-26TODOs.orgEuAndreh1-3/+12
2019-05-26Prepare builds.sr.ht CI environment before running build tasksEuAndreh5-13/+21
Make content of .envrc available to subsequent build jobs.
2019-05-26Unlock with git-crypt in setup phaseEuAndreh2-9/+5
2019-05-26Revert back from Debian to NixOSEuAndreh1-5/+3
2019-05-26TODOs.orgEuAndreh1-10/+34
2019-05-26Perform single-user installation of NixEuAndreh1-3/+1
2019-05-26Change ownership to build instead of root of /nixEuAndreh1-1/+2
2019-05-26Create Nix store with sudo before installing NixEuAndreh1-1/+2
2019-05-26Create Nix store with sudoEuAndreh1-1/+1
2019-05-26Change GPG secret referenceEuAndreh1-1/+1
2019-05-26TODOs.orgEuAndreh1-1/+8
2019-05-26Fix terraform fmt offenseEuAndreh1-1/+1
2019-05-26Run shellcheck on Bash files stored in git-cryptEuAndreh2-2/+3
2019-05-26Disable shellcheck 2139 offenseEuAndreh2-0/+2
2019-05-26Remove extra newline at "Done.\n" messagesEuAndreh2-8/+8
2019-05-26Fix unexpected shell scapingEuAndreh1-1/+1
2019-05-26Change GPG secret referenceEuAndreh1-2/+1
2019-05-26Test using Debian to correctly import GPG secretEuAndreh1-4/+6
Right now the NixOS image tries to import the GPG before installing GPG. Adding it as a package doesn't solve it.
2019-05-26Add gnupg to allow pipeline to import GPG keysEuAndreh2-1/+3
2019-05-26Automate provisioning and deployment of VPSEuAndreh10-11/+83
In order to perform that I had to remove Terraform's =.tfstate= files from the repository. Terraform does support "backends" for storing the state files, but I settled for storing it on a separate repo (vps-state). For now it solves the state management problem: - it has history of states; - all state files are GPG encrypted; - there's no coordination however, but only the CI should perform a deploy in order to avoid race conditions. I had to add GPG and SSH keys to sr.ht to achieve that: - SSH public key to my profile to authorize it to push to vps-state repo; - SSH private key to the secret builds.sr.ht environment to enable push to the repository from the pipeline; - GPG public key to git-crypt to make it possible for the pipeline to unlock the encrypted content; - GPG private key to the secret builds.sr.ht environment to enable decrypting git-crypt content from the pipeline. In order to avoid divergent environment from local and CI, the ./provision.sh script is ran through nix-shell.