aboutsummaryrefslogtreecommitdiff
Commit message (Collapse)AuthorAgeFilesLines
* Disable $DESTROY_VOLUME operational toggleEuAndreh2019-06-101-0/+0
|
* Remove --progress from borg createEuAndreh2019-06-101-1/+0
| | | | It shows filenames in CI output log.
* Change SSH portEuAndreh2019-06-101-0/+0
|
* Use create_known_hosts_file function instead of duplicating behaviourEuAndreh2019-06-101-3/+6
|
* Fail CI run if backup failsEuAndreh2019-06-102-4/+5
|
* Don't run restore backup Ansible task when not requiredEuAndreh2019-06-102-8/+2
| | | | | | | Instead of performing this task on the generated =restore-backup.sh= file, do it on provision.yaml. The boolean logic is less confusing and the interpolation is less tricky.
* Create generated-known-hosts.txt twiceEuAndreh2019-06-101-0/+1
| | | | | Since it can change after being destroyed by Terraform, we can't create it before and use it later.
* Allow shutdown process to failEuAndreh2019-06-101-2/+2
|
* Provision DNS entries using DigitalOcean instead of DNS registrarEuAndreh2019-06-106-64/+135
| | | | | | | | | | | | | This way we can implement dynamic (provision-time) Floating IP, instead of a hardcoded pre-created Floating IP address. Related changes: - remove =terraform-godaddy= provider, use =digitalocean_record= instead; - create =generated-known-hosts= after provisioning instead of during =setup.sh=: use the =$(terraform output public_floating_ip)= value to make this file dynamic; - remote the =$PINNED_IP= and =$TF_VAR_floating_ip= variables; - add type and descriptions to variable declarations in Terraform recipe.
* Change $TLDEuAndreh2019-06-091-0/+0
|
* Rotate DNS registrar keysEuAndreh2019-06-091-0/+0
|
* Revert "Create Terraform plan before shutting down running containers"EuAndreh2019-06-091-6/+6
| | | | This reverts commit c8963acd02a5095bafb46c79abd45eec45059707.
* Don't use terraform-full derivationEuAndreh2019-06-093-6/+3
|
* Create Terraform plan before shutting down running containersEuAndreh2019-06-091-8/+8
|
* Quote $() call (ShellCheck offense)EuAndreh2019-06-091-1/+1
|
* Use same NIX_PATH locally and on the CIEuAndreh2019-06-091-0/+0
|
* Make terraform-provider-godaddy available for TerraformEuAndreh2019-06-091-0/+3
|
* Remove CI dbg codeEuAndreh2019-06-091-2/+0
|
* s/terraformGodaddy/terraformGodaddyBuild/EuAndreh2019-06-091-1/+1
|
* ci dbgEuAndreh2019-06-091-0/+2
|
* Expose build of terraform-godaddy under subtasks attribute setEuAndreh2019-06-091-1/+1
|
* ci dbg: Revert "Revert "Update modSha256 for terraform-godaddy""EuAndreh2019-06-081-1/+1
| | | | This reverts commit 4d04172f9027203e3656f74bd8cecdc0d9c45e69.
* Revert "Update modSha256 for terraform-godaddy"EuAndreh2019-06-081-1/+1
| | | | This reverts commit 5ad5984f47860bdf3a85abeddef18d17c2095e69.
* TODOs.orgEuAndreh2019-06-081-0/+1
|
* Add quote around nested quote expansionEuAndreh2019-06-081-1/+1
| | | | Thanks ShellCheck :)
* Remove unused $PUBLIC_KEY_ONLYEuAndreh2019-06-081-1/+0
| | | | Thanks ShellCheck.
* Format vps.tf (terraform linter offense)EuAndreh2019-06-081-3/+3
|
* Format default.nix (nixfmt linter offense)EuAndreh2019-06-081-2/+3
|
* Update modSha256 for terraform-godaddyEuAndreh2019-06-081-1/+1
|
* TODOs.orgEuAndreh2019-06-081-0/+4
|
* Use terraform-godaddy and Terraform 0.11EuAndreh2019-06-084-10/+32
| | | | | | | | | | | | The =terraform-godaddy= package supports only Terraform 0.11 as of now. It is not packaged by default by nixpkgs, and the =postInstall= hook is required because Terraform looks for providers usinthe the =terraform-provider-$name= template, which the package doesn't follow. I had to remove the loop on vps.tf since it requires Terraform 0.12. I'll either wait for =terraform-godaddy= to upgrade to 0.12 or try to do it myself if it bothers me enough.
* Update terraform to 0.12EuAndreh2019-06-081-1/+1
|
* Provision DNS entries with Terraform! :tada:EuAndreh2019-06-081-0/+22
| | | | Before all the DNS entries had to be entered manually on the web UI.
* TODOs.orgEuAndreh2019-06-081-21/+21
|
* Add credentials for manipulating DNS entries.EuAndreh2019-06-081-0/+0
|
* Generate UserKnownHostsFile dynamically instead of when rotating keysEuAndreh2019-06-085-4/+5
| | | | | | | | | | | | The previous solution would hardcode the server IP. This way we can change the server IP address that is hosting everything and keep the SSH keypair. Previously changing the IP address would require either calling the =./rotate-ssh-keys.sh= script or manually changing the IP address on the known-hosts.txt file. The IP address being duplicated itself was a code smell. Both SSH keypair and IP address can now be changed independently.
* Use nextcloud.${TLD} instead of cloud.${TLD} as CNAME for Nextcloud installationEuAndreh2019-06-082-1/+1
|
* CI debug: remove --verbose flag from borg create commandEuAndreh2019-06-081-1/+0
| | | | THe objective is to remove the logged files from the CI log.
* TODOs.orgEuAndreh2019-06-081-1/+9
|
* Add =any_errors_fatal: true= to provision.yml playbookEuAndreh2019-06-071-0/+2
|
* Revert "Add verbose logging for Ansible playbook command"EuAndreh2019-06-071-1/+1
| | | | This reverts commit 80ee903ac9f09c22b4ef3458393242fa929cff89.
* Add verbose logging for Ansible playbook commandEuAndreh2019-06-071-1/+1
|
* TODOs.orgEuAndreh2019-06-071-0/+6
|
* Fix boolean logic bug on ${DESTROY_VOLUME} usageEuAndreh2019-06-071-2/+2
|
* Disable SC2034 for ${DOLLAR} interpolated variableEuAndreh2019-06-071-0/+3
|
* TODOs.orgEuAndreh2019-06-071-0/+2
|
* Add ${DESTROY_VOLUME} operational toggleEuAndreh2019-06-063-2/+13
| | | | | | | | | | | | | This way I can dynamically control whether to destroy and recreate all the existing infrastructure entirely from scratch. The advantages of doing so are: - test the non-existence of local state on every deployment; - make sure I can always recreate everything from scratch. The disadvantages are: - slower deployment times; - longer downtime during deployments.
* Uncomment docker-compose starting Ansible taskEuAndreh2019-06-061-5/+5
|
* Remove invalid --stats option from borg extract commandEuAndreh2019-06-061-1/+0
|
* Fail fast on copied Bash filesEuAndreh2019-06-062-0/+2
|