aboutsummaryrefslogtreecommitdiff
path: root/vps.tf (follow)
Commit message (Collapse)AuthorAgeFilesLines
* Use correct Droplet size slugEuAndreh2019-05-281-1/+1
| | | | Taken from https://developers.digitalocean.com/documentation/v2/#list-all-sizes
* Rename ./secrets/id_rsa{.pub} -> ./secrets/vps_box{.pub}EuAndreh2019-05-281-1/+1
|
* Fix terraform fmt offenseEuAndreh2019-05-261-1/+1
|
* Automate provisioning and deployment of VPSEuAndreh2019-05-261-1/+5
| | | | | | | | | | | | | | | | | | | | | | | | In order to perform that I had to remove Terraform's =.tfstate= files from the repository. Terraform does support "backends" for storing the state files, but I settled for storing it on a separate repo (vps-state). For now it solves the state management problem: - it has history of states; - all state files are GPG encrypted; - there's no coordination however, but only the CI should perform a deploy in order to avoid race conditions. I had to add GPG and SSH keys to sr.ht to achieve that: - SSH public key to my profile to authorize it to push to vps-state repo; - SSH private key to the secret builds.sr.ht environment to enable push to the repository from the pipeline; - GPG public key to git-crypt to make it possible for the pipeline to unlock the encrypted content; - GPG private key to the secret builds.sr.ht environment to enable decrypting git-crypt content from the pipeline. In order to avoid divergent environment from local and CI, the ./provision.sh script is ran through nix-shell.
* Increase droplet image to 1024mbEuAndreh2019-05-251-1/+1
|
* Remove provisioning from TerraformEuAndreh2019-05-251-4/+0
|
* Move provisioning code into provision.shEuAndreh2019-05-251-8/+1
|
* Add lint checks and a pipeline to check using NixEuAndreh2019-05-251-1/+0
|
* Format vps.tfEuAndreh2019-05-251-13/+16
|
* Don't use pub_key and pvt_key as input variablesEuAndreh2019-05-251-5/+6
| | | | Embed SSH keypair directly into git-crypt.
* Add simple DigitalOcean droplet skeleton for TerraformEuAndreh2019-05-251-0/+36