about summary refs log tree commit diff
path: root/docs
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--docs/backups.org187
-rw-r--r--docs/desktop.org19
-rw-r--r--docs/gcloud.org21
-rw-r--r--docs/install.org153
-rw-r--r--docs/secrets.org29
-rw-r--r--docs/tools.org167
-rw-r--r--docs/wireguard.org21
7 files changed, 0 insertions, 597 deletions
diff --git a/docs/backups.org b/docs/backups.org
deleted file mode 100644
index a1db502..0000000
--- a/docs/backups.org
+++ /dev/null
@@ -1,187 +0,0 @@
-#+TITLE: Backups
-
-Each host can be configured to store a backup on the NAS using restic. The backups are synchronized once a day to rsync.net.
-
-* restic
-For backups I'm using [[https://restic.readthedocs.io/][restic]].
-
-On the NAS itself, we backup the git repositories to =/data/backups=.
-
-The password is stored in =/etc/restic/password= (this is not managed by puppet for now, and the password is stored within 1password).
-** List the snapshots
-To get a list of snapshots:
-#+BEGIN_SRC sh :dir /ssh:nas: :results verbatim
-sudo restic -r /data/backups/ -p /etc/restic/password snapshots
-#+END_SRC
-
-#+RESULTS:
-#+begin_example
-repository a37cfab5 opened successfully, password is correct
-ID        Time                 Host        Tags        Paths
----------------------------------------------------------------------------------
-e36e9100  2020-02-29 08:43:37  nas                     /home/git/repositories
-603a46a7  2020-03-31 08:39:03  nas                     /home/git/repositories
-e890453b  2020-04-30 08:22:37  nas                     /home/git/repositories
-0affa4d9  2020-05-10 08:47:18  nas                     /home/git/repositories
-a01d8be4  2020-07-31 08:41:25  nas                     /home/git/repositories
-78afb27a  2020-08-31 08:23:52  nas                     /home/git/repositories
-68a417b1  2020-09-30 08:44:49  nas                     /home/git/repositories
-ac6701b4  2020-10-18 06:00:00  nas         git         /home/git/repositories
-4f183431  2020-10-25 06:00:00  nas         git         /home/git/repositories
-aec0b472  2020-10-25 07:24:10  aptos       home        /home/fcuny
-3e98a872  2020-10-30 06:00:00  nas         git         /home/git/repositories
-0268f733  2020-10-31 06:00:00  nas         git         /home/git/repositories
-1b840de3  2020-11-01 06:00:00  nas         git         /home/git/repositories
-2d224944  2020-11-02 06:00:00  nas         git         /home/git/repositories
-fa0107dd  2020-11-03 06:00:00  nas         git         /home/git/repositories
-1165032b  2020-11-04 06:00:00  nas         git         /home/git/repositories
-612b66e3  2020-11-05 06:00:00  nas         git         /home/git/repositories
-2de6fb79  2020-12-31 06:01:19  nas         gitea       /data/containers/gitea
-ece08207  2020-12-31 06:01:41  nas         traefik     /data/containers/traefik
-d59bd75a  2020-12-31 06:06:19  nas         grafana     /data/containers/grafana
-168c0ddf  2020-12-31 06:07:24  nas         unifi       /data/containers/unifi
-5882ffe4  2021-01-27 18:58:06  aptos       home        /home/fcuny
-3565b23b  2021-01-31 06:05:18  nas         traefik     /data/containers/traefik
-653d4411  2021-01-31 06:14:12  nas         gitea       /data/containers/gitea
-38a3e50e  2021-01-31 06:15:13  nas         unifi       /data/containers/unifi
-542e2c80  2021-01-31 06:15:13  nas         grafana     /data/containers/grafana
-8c804805  2021-02-06 19:13:24  aptos       home        /home/fcuny
-3f38d369  2021-02-28 06:03:28  nas         grafana     /data/containers/grafana
-ef2042e2  2021-02-28 06:11:50  nas         unifi       /data/containers/unifi
-b429ef99  2021-02-28 06:18:02  nas         gitea       /data/containers/gitea
-b73f5128  2021-02-28 06:18:04  nas         traefik     /data/containers/traefik
-7a7e3e06  2021-03-28 09:05:35  aptos       home        /home/fcuny
-3a0c790f  2021-03-30 06:12:20  nas         grafana     /data/containers/grafana
-58179a2f  2021-03-31 06:05:04  nas         gitea       /data/containers/gitea
-fc4ede5d  2021-03-31 06:08:18  nas         unifi       /data/containers/unifi
-5eaa5148  2021-03-31 06:17:13  nas         traefik     /data/containers/traefik
-d7c95e53  2021-04-27 18:10:36  aptos       home        /home/fcuny
-4c702501  2021-04-30 06:02:11  nas         gitea       /data/containers/gitea
-8de29c3c  2021-04-30 06:04:42  nas         unifi       /data/containers/unifi
-66664254  2021-04-30 06:08:25  nas         traefik     /data/containers/traefik
-9a3ad896  2021-04-30 06:15:15  nas         grafana     /data/containers/grafana
-344ef4c3  2021-05-15 14:22:05  aptos       home        /home/fcuny
-6141b888  2021-05-30 06:14:37  nas         traefik     /data/containers/traefik
-106c4819  2021-05-31 06:04:56  nas         grafana     /data/containers/grafana
-8e0ba4c3  2021-05-31 06:12:37  nas         gitea       /data/containers/gitea
-8cba7fbf  2021-05-31 06:17:26  nas         unifi       /data/containers/unifi
-2cc04ad6  2021-06-28 17:08:25  aptos       home        /home/fcuny
-8b04e195  2021-06-30 06:03:56  nas         grafana     /data/containers/grafana
-d21a464f  2021-06-30 06:09:56  nas         unifi       /data/containers/unifi
-f180e1a0  2021-06-30 06:10:20  nas         gitea       /data/containers/gitea
-b9e0ce43  2021-06-30 06:11:50  nas         traefik     /data/containers/traefik
-512e80fb  2021-07-23 17:25:45  aptos       home        /home/fcuny
-28b32d1f  2021-07-31 06:03:50  nas         gitea       /data/containers/gitea
-884574c8  2021-07-31 06:11:13  nas         unifi       /data/containers/unifi
-a61cd90f  2021-07-31 06:16:50  nas         grafana     /data/containers/grafana
-614f9123  2021-07-31 06:19:38  nas         traefik     /data/containers/traefik
-17698a8a  2021-08-14 06:05:34  nas         git         /data/containers/git
-b5674e76  2021-08-16 13:47:52  aptos       home        /home/fcuny
-d7c251f6  2021-08-31 06:16:07  nas         gitea       /data/containers/gitea
-ef20f101  2021-08-31 06:16:11  nas         unifi       /data/containers/unifi
-b7cd0d5c  2021-08-31 06:16:16  nas         grafana     /data/containers/grafana
-facffc9a  2021-08-31 06:16:19  nas         traefik     /data/containers/traefik
-b2d31938  2021-08-31 06:16:22  nas         syncthing   /data/containers/syncthing
-8ab3bee2  2021-09-27 10:35:27  aptos       home        /home/fcuny
-1559f48c  2021-09-30 04:11:21  nas         gitea       /data/containers/gitea
-353d202d  2021-09-30 04:11:25  nas         unifi       /data/containers/unifi
-b567fec1  2021-09-30 04:11:30  nas         grafana     /data/containers/grafana
-d7b239c1  2021-09-30 04:11:33  nas         traefik     /data/containers/traefik
-4890d748  2021-09-30 04:11:35  nas         syncthing   /data/containers/syncthing
-4d6b6646  2021-10-31 04:11:55  nas         gitea       /data/containers/gitea
-b2820465  2021-10-31 04:12:01  nas         unifi       /data/containers/unifi
-cd2230ff  2021-10-31 04:12:07  nas         grafana     /data/containers/grafana
-807f1bb3  2021-10-31 04:12:12  nas         traefik     /data/containers/traefik
-5d9c2314  2021-10-31 04:12:15  nas         syncthing   /data/containers/syncthing
-5f1a2de0  2021-10-31 12:38:40  carmel      home        /home/fcuny
-89f6bbec  2021-10-31 14:53:27  aptos       home        /home/fcuny
-5bb120c9  2021-11-05 15:54:28  aptos       home        /home/fcuny
-5fb31f63  2021-11-06 16:05:30  aptos       home        /home/fcuny
-9bfd32e2  2021-11-07 18:02:06  aptos       home        /home/fcuny
-d4dd252f  2021-11-17 13:40:16  aptos       home        /home/fcuny
-b072a3a1  2021-11-21 04:18:17  nas         gitea       /data/containers/gitea
-6ba6bff3  2021-11-21 04:18:32  nas         unifi       /data/containers/unifi
-bb697aae  2021-11-21 04:18:38  nas         grafana     /data/containers/grafana
-33ba0e83  2021-11-21 04:18:41  nas         traefik     /data/containers/traefik
-e2cae3b5  2021-11-21 04:18:43  nas         syncthing   /data/containers/syncthing
-1caaca88  2021-11-21 13:35:29  carmel      home        /home/fcuny
-97d034ce  2021-11-27 19:16:12  aptos       home        /home/fcuny
-5fa6b510  2021-11-28 04:11:27  nas         gitea       /data/containers/gitea
-6670d391  2021-11-28 04:11:32  nas         unifi       /data/containers/unifi
-77d11ce4  2021-11-28 04:11:38  nas         grafana     /data/containers/grafana
-04ee74c6  2021-11-28 04:11:40  nas         traefik     /data/containers/traefik
-1371d8d2  2021-11-28 04:11:43  nas         syncthing   /data/containers/syncthing
-3b2a45ee  2021-11-28 09:19:13  aptos       home        /home/fcuny
-b19902e6  2021-11-28 15:25:29  carmel      home        /home/fcuny
-02fb34d8  2021-11-30 04:05:15  nas         gitea       /data/containers/gitea
-1ac8f79f  2021-11-30 04:05:21  nas         unifi       /data/containers/unifi
-848505be  2021-11-30 04:05:26  nas         grafana     /data/containers/grafana
-2e48e232  2021-11-30 04:05:29  nas         traefik     /data/containers/traefik
-47732732  2021-11-30 04:05:34  nas         syncthing   /data/containers/syncthing
-dd141856  2021-11-30 12:06:56  carmel      home        /home/fcuny
-00e5429b  2021-12-03 18:31:51  aptos       home        /home/fcuny
-31b849ad  2021-12-05 04:06:10  nas         gitea       /data/containers/gitea
-8cc78932  2021-12-05 04:06:26  nas         unifi       /data/containers/unifi
-b7364a55  2021-12-05 04:06:38  nas         grafana     /data/containers/grafana
-043c4b36  2021-12-05 04:06:43  nas         traefik     /data/containers/traefik
-2e415963  2021-12-05 04:06:48  nas         syncthing   /data/containers/syncthing
-1ef944db  2021-12-05 11:14:51  carmel      home        /home/fcuny
-e58a2421  2021-12-06 04:02:44  nas         gitea       /data/containers/gitea
-907bb839  2021-12-06 04:02:50  nas         unifi       /data/containers/unifi
-050dcff3  2021-12-06 04:02:55  nas         grafana     /data/containers/grafana
-72092444  2021-12-06 04:03:00  nas         traefik     /data/containers/traefik
-d04b79bb  2021-12-06 04:03:03  nas         syncthing   /data/containers/syncthing
-2ef060ec  2021-12-06 11:36:51  carmel      home        /home/fcuny
-a3036320  2021-12-07 04:19:42  nas         gitea       /data/containers/gitea
-18af7ba5  2021-12-07 04:19:48  nas         unifi       /data/containers/unifi
-ba7adae4  2021-12-07 04:19:53  nas         grafana     /data/containers/grafana
-b71283de  2021-12-07 04:19:57  nas         traefik     /data/containers/traefik
-d1918837  2021-12-07 04:19:59  nas         syncthing   /data/containers/syncthing
-ec06c179  2021-12-07 17:24:07  carmel      home        /home/fcuny
-49722319  2021-12-08 04:11:10  nas         gitea       /data/containers/gitea
-b7cfa0d8  2021-12-08 04:11:18  nas         unifi       /data/containers/unifi
-64e98ec2  2021-12-08 04:11:25  nas         grafana     /data/containers/grafana
-d5f848fd  2021-12-08 04:11:30  nas         traefik     /data/containers/traefik
-ce58becc  2021-12-08 04:11:33  nas         syncthing   /data/containers/syncthing
-8342e5b7  2021-12-08 17:45:07  carmel      home        /home/fcuny
-93584f9e  2021-12-09 04:06:27  nas         gitea       /data/containers/gitea
-fb0e6073  2021-12-09 04:06:33  nas         unifi       /data/containers/unifi
-68d354c2  2021-12-09 04:06:39  nas         grafana     /data/containers/grafana
-73e199bd  2021-12-09 04:06:46  nas         traefik     /data/containers/traefik
-47e0e0a6  2021-12-09 04:06:49  nas         syncthing   /data/containers/syncthing
-9d7bcb97  2021-12-09 11:53:49  carmel      home        /home/fcuny
-c2130706  2021-12-10 04:00:56  nas         gitea       /data/containers/gitea
-29af7e4f  2021-12-10 04:01:03  nas         unifi       /data/containers/unifi
-393b006b  2021-12-10 04:01:08  nas         grafana     /data/containers/grafana
-433a00d1  2021-12-10 04:01:13  nas         traefik     /data/containers/traefik
-d4949919  2021-12-10 04:01:18  nas         syncthing   /data/containers/syncthing
-ce2a8a73  2021-12-10 12:10:49  carmel      home        /home/fcuny
-c8d56977  2021-12-11 04:11:20  nas         gitea       /data/containers/gitea
-40f3c6d8  2021-12-11 04:11:25  nas         unifi       /data/containers/unifi
-f24178f5  2021-12-11 04:11:30  nas         grafana     /data/containers/grafana
-3ca4553f  2021-12-11 04:11:33  nas         traefik     /data/containers/traefik
-ca41fe42  2021-12-11 04:11:35  nas         syncthing   /data/containers/syncthing
-b2643ef9  2021-12-11 12:40:49  carmel      home        /home/fcuny
-50cb9254  2021-12-12 04:10:34  nas         gitea       /data/containers/gitea
-85de9005  2021-12-12 04:10:40  nas         unifi       /data/containers/unifi
-0fd36196  2021-12-12 04:10:46  nas         grafana     /data/containers/grafana
-bd8f14dd  2021-12-12 04:10:50  nas         traefik     /data/containers/traefik
-ee0735e3  2021-12-12 04:10:53  nas         syncthing   /data/containers/syncthing
----------------------------------------------------------------------------------
-148 snapshots
-#+end_example
-
-** How to configure a backup
-All daily backups are added to the [[file:~/workspace/infrastructure/puppet/site-modules/backup/files/etc/systemd/system/backups.service][unit file]]. Each backup needs a tag (to make it easier to filter/search).
-
-This will run once a day. The backups will be stored in =/data/backups= and then be exported to GCS.
-** How to restore the backup
-First, this is the [[https://restic.readthedocs.io/en/latest/050_restore.html][documentation]] to read. Here's an example:
-#+begin_src sh
-$ sudo restic -r /data/backups/ -p /etc/restic/password restore 8dbaaf98 --target /tmp/this-is-a-test
-repository a37cfab5 opened successfully, password is correct
-restoring <Snapshot 8dbaaf98 of [/data/containers/traefik] at 2021-08-14 06:05:49.547829076 -0700 PDT by restic@nas> to /tmp/this-is-a-test
-$ sudo ls -l /tmp/this-is-a-test/data/containers/traefik
-total 4
-drwxrwxr-x 2 root root 4096 Nov  6  2020 config
-#+end_src
diff --git a/docs/desktop.org b/docs/desktop.org
deleted file mode 100644
index a52fc53..0000000
--- a/docs/desktop.org
+++ /dev/null
@@ -1,19 +0,0 @@
-* Next build
-** Requirements
-- Future proof (PCIe 5, DDR5)
-- Re-use the nr200p case
-- 2 NVMe drive would be nice
-- not have to use a GPU would be nice
-** Hardware selection
-
-| component   | model                                         | price | note |
-|-------------+-----------------------------------------------+-------+------|
-| CPU         | Intel Core i7-12700K                          |   380 |      |
-| CPU cooler  | Noctua NH-U9S chromax.black                   |     0 |      |
-| motherboard | Asus ROG STRIX B660-I GAMING                  |   220 |      |
-| memory      | Corsair Vengeance 32 GB (2 x 16 GB) DDR5-5200 |   309 |      |
-| boot drive  | Western Digital Black SN850                   |   160 |      |
-| case        | nr200p                                        |     0 |      |
-|-------------+-----------------------------------------------+-------+------|
-|             |                                               |  1069 |      |
-#+TBLFM: @8$3=vsum(@2..@-1)
diff --git a/docs/gcloud.org b/docs/gcloud.org
deleted file mode 100644
index 95e7531..0000000
--- a/docs/gcloud.org
+++ /dev/null
@@ -1,21 +0,0 @@
-#+TITLE: Gcloud
-
-* Initial setup
-First we need to create a service account, with:
-#+begin_src sh
-gcloud --project fcuny-homelab iam service-accounts create world-nix
-#+end_src
-
-Next we need to bind the new policy:
-#+begin_src sh
-gcloud projects add-iam-policy-binding fcuny-homelab --member="serviceAccount:world-nix@fcuny-homelab.iam.gserviceaccount.com" --role="roles/accessapproval.configEditor"
-#+end_src
-
-Note: I had to add DNS administrator in the console, I don't know what I need to add to this command.
-
-Finally we need the key:
-#+begin_src sh
-gcloud iam service-accounts keys create world-nix.json --iam-account=world-nix@fcuny-homelab.iam.gserviceaccount.com
-#+end_src
-
-This will create a file name =world-nix.json=. It's best to encrypt it with =age= and move it under the =secrets= directory for a host.
diff --git a/docs/install.org b/docs/install.org
deleted file mode 100644
index 40ba5a8..0000000
--- a/docs/install.org
+++ /dev/null
@@ -1,153 +0,0 @@
-#+TITLE: Installation
-#+AUTHOR: Franck Cuny
-#+EMAIL: franck@fcuny.net
-
-* Prepare the USB stick
-Download the most recent image from https://nixos.org/download.html then put it on a stick:
-#+begin_src sh
-sudo cp ~/downloads/nixos-minimal-21.11.336020.2128d0aa28e-x86_64-linux.iso /dev/sda
-#+end_src
-* Partitioning
-** For the workstation (desktop/laptop)
-All hosts have the same partitioning for the boot drive:
-- /boot partition for UEFI
-- / encrypted with btrfs
-- a 8GB swap
-
-If we assume the boot drive to be =nvme0n1=, we will do the following:
-#+begin_src sh
-parted /dev/nvme0n1 -- mklabel gpt
-parted /dev/nvme0n1 -- mkpart primary 512MiB -8GiB
-parted /dev/nvme0n1 -- mkpart primary linux-swap -8GiB 100%
-parted /dev/nvme0n1 -- mkpart ESP fat32 1MiB 512MiB
-parted /dev/nvme0n1 -- set 3 esp on
-#+end_src
-
-Running =lsbkl= should give the following output:
-#+begin_src sh
-[root@nixos:~]# lsblk
-NAME        MAJ:MIN RM   SIZE RO TYPE MOUNTPOINTS
-loop0         7:0    0   709M  1 loop /nix/.ro-store
-sda           8:0    1  29.9G  0 disk
-├─sda1        8:1    1   784M  0 part /iso
-└─sda2        8:2    1    37M  0 part
-nvme0n1     259:0    0 465.8G  0 disk
-├─nvme0n1p1 259:1    0 457.3G  0 part
-├─nvme0n1p2 259:2    0     8G  0 part
-└─nvme0n1p3 259:3    0   511M  0 part
-#+end_src
-
-Then we create the LUKS device:
-#+begin_src sh
-cryptsetup --verify-passphrase -v luksFormat /dev/nvme0n1p1
-cryptsetup open /dev/nvme0n1p1 system
-#+end_src
-
-We can create the partition for the boot drive and activate the swap:
-#+begin_src sh
-mkswap -L swap /dev/nvme0n1p2
-swapon /dev/nvme0n1p2
-mkfs.fat -F 32 -n nixos-boot /dev/nvme0n1p3
-#+end_src
-#+begin_src sh
-mkfs.btrfs /dev/mapper/system
-
-mount -t btrfs /dev/mapper/system /mnt
-
-btrfs subvolume create /mnt/nixos
-btrfs subvolume create /mnt/home
-btrfs subvolume create /mnt/snapshots
-
-umount /mnt
-#+end_src
-
-Now we can re-mount the partitions with the proper options:
-#+begin_src sh
-mount -o subvol=nixos,compress=zstd,noatime,autodefrag /dev/mapper/system /mnt
-
-mkdir /mnt/{home,boot,.snapshots}
-
-mount -o subvol=home,compress=zstd,noatime,autodefrag /dev/mapper/system /mnt/home
-mount -o subvol=snapshots,compress=zstd,noatime /dev/mapper/system /mnt/.snapshots
-mount /dev/nvme0n1p3 /mnt/boot
-#+end_src
-
-Once the installation is completed:
-#+begin_src sh
-CUSTOMIZE_TIMESTAMP=$(date -u +%Y%m%dT%H%M%S)
-btrfs subvolume snapshot /mnt /mnt/.snapshots/$CUSTOMIZE_TIMESTAMP
-#+end_src
-** Partitions for the NAS
-Create the RAIDs:
-#+begin_src sh
-mdadm --create /dev/md/fast --level=mirror --raid-devices=2 /dev/sda /dev/sdb
-mdadm --create /dev/md/slow --level=mirror --raid-devices=2 /dev/sdc /dev/sde
-#+end_src
-
-Encrypt the RAIDs:
-#+begin_src sh
-cryptsetup --verify-passphrase -v luksFormat /dev/md/slow
-cryptsetup --verify-passphrase -v luksFormat /dev/md/fast
-#+end_src
-
-Then open them:
-#+begin_src sh
-cryptsetup open /dev/md/fast raid-fast
-cryptsetup open /dev/md/slow raid-slow
-#+end_src
-
-Create the filesystem:
-#+begin_src sh
-mkfs.btrfs /dev/mapper/raid-fast
-mkfs.btrfs /dev/mapper/raid-slow
-#+end_src
-
-Then we can mount them to generate the host configuration
-#+begin_src sh
-btrfs subvolume create /mnt/media
-btrfs subvolume create /mnt/containers
-umount /mnt
-
-mount -t btrfs /dev/mapper/raid-slow /mnt/
-btrfs subvolume create /mnt/backups
-mkdir /mnt/data/{backups,containers,media}
-mount -o subvol=media,compress=zstd,noatime,autodefrag /dev/mapper/raid-fast /mnt/data/media
-mount -o subvol=media,compress=zstd,noatime,autodefrag /dev/mapper/raid-fast /mnt/data/media
-mount -o subvol=containers,compress=zstd,noatime,autodefrag /dev/mapper/raid-fast /mnt/data/containers
-mount -o subvol=backups,compress=zstd,noatime,autodefrag /dev/mapper/raid-slow /mnt/data/backups
-#+end_src
-* Installing the system
-Let's add git and nixFlakes:
-#+begin_src sh
-nix-shell -p git nixFlakes
-#+end_src
-
-#+begin_src sh
-nixos-generate-config --root /mnt
-mkdir /mnt/root
-git clone https://git.fcuny.net/fcuny/world.git /mnt/root/world
-mkdir /mnt/root/world/hosts/<host name>
-cp /mnt/etc/nixos/hardware-configuration.nix /mnt/root/world/hosts/<host name>/
-cp /mnt/root/world/hosts/aptos/default.nix /mnt/root/world/hosts/<host name>/
-vim /mnt/root/world/hosts/<host name>/default.nix
-cd /mnt/root/world
-git add hosts/tahoe
-cd /
-nixos-install --root /mnt --flake /mnt/root/world#<host name>
-#+end_src
-
-Create another snapshot
-#+begin_src sh
-CUSTOMIZE_TIMESTAMP=$(date -u +%Y%m%dT%H%M%S)
-btrfs subvolume snapshot /mnt /mnt/.snapshots/$CUSTOMIZE_TIMESTAMP
-#+end_src
-
-And a =reboot= should be enough.
-* home-manager initial install
-After a reboot, as root:
-#+begin_src sh
-nix-channel --add https://github.com/nix-community/home-manager/archive/release-21.11.tar.gz home-manager
-nix-channel --update
-nix-shell '<home-manager>' -A install
-home-manager build --flake .#fcuny@<host name>
-#+end_src
diff --git a/docs/secrets.org b/docs/secrets.org
deleted file mode 100644
index 5c350e0..0000000
--- a/docs/secrets.org
+++ /dev/null
@@ -1,29 +0,0 @@
-#+TITLE: Secrets
-
-* secrets
-** system
-Secrets at the system level are managed by [[https://github.com/ryantm/agenix][agenix]]. The secrets are encrypted with a couple of =age= keys. I do not use ssh keys to encrypt the secrets. Instead, I do the following:
-- each system has a key for the user root, and the secrets for that host are encoded with it as a recipient
-- on each workstation, my user (=fcuny=) has a key and the secrets for all the hosts are encrypted with it as a recipient
-- in addition, I've a backup key stored on a USB device, and I used its public key to encrypt all the secrets with it
-
-These keys are backed up on an external USB device and in passage. When re-provisioning a host, the keys are restored from the USB device or from passage itself.
-
-When provisioning a new host, a key for root (and my user if it's a workstation) is created and stored on the USB device and in passage.
-*** add a new secret
-#+begin_src sh
-nix run github:ryantm/agenix -- -i ~/.age/key.txt -e sendsms/sendsms.age
-#+end_src
-*** re-key secrets
-#+begin_src sh
-nix run github:ryantm/agenix -- -i ~/.age/key.txt -r
-#+end_src
-** home-manager
-Nothing for now.
-** passage
-I use [[https://github.com/FiloSottile/passage][passage]] to store passwords locally. The content of the store is pushed to a remote git repository, and I synchronized the store regularly to the USB device.
-* misc
-** GPG
-nop nop nop nop nop
-** keyring
-I don't need one anymore.
diff --git a/docs/tools.org b/docs/tools.org
deleted file mode 100644
index e093f5c..0000000
--- a/docs/tools.org
+++ /dev/null
@@ -1,167 +0,0 @@
-#+TITLE: Collection of recipes for various tools
-
-* syncthing
-** connection to the remote UI
-The web UI for syncthing is binded to localhost. To access the UI of a remote host, create a SSH tunnel:
-#+begin_src sh
-ssh -L 1235:localhost:8384 -N -f 192.168.0.106
-#+end_src
-* yt-dlp
-- use =--merge-output-format=mkv=
-- check what's the best audio and video for a video
-- prefer =mp4= for the audio over =webm=
-
-** List of supported formats
-#+begin_src sh :results verbatim
-yt-dlp --list-formats https://www.youtube.com/watch?v=igH-NgcuW2M
-#+end_src
-
-#+RESULTS:
-#+begin_example
-[youtube] igH-NgcuW2M: Downloading webpage
-[youtube] igH-NgcuW2M: Downloading android player API JSON
-[info] Available formats for igH-NgcuW2M:
-ID  EXT  RESOLUTION FPS |  FILESIZE    TBR PROTO | VCODEC        VBR ACODEC     ABR  ASR    MORE INFO
---- ---- ---------- --- - ---------- ----- ----- - ----------- ----- --------- ---- ------- -----------------
-139 m4a  audio only     |  15.00MiB    47k https |                   mp4a.40.5  47k 22050Hz low, m4a_dash
-249 webm audio only     |  15.28MiB    48k https |                   opus       48k 48000Hz low, webm_dash
-250 webm audio only     |  19.58MiB    62k https |                   opus       62k 48000Hz low, webm_dash
-140 m4a  audio only     |  40.06MiB   127k https |                   mp4a.40.2 127k 44100Hz medium, m4a_dash
-251 webm audio only     |  39.20MiB   124k https |                   opus      124k 48000Hz medium, webm_dash
-17  3gp  176x144    12  |  24.81MiB    78k https | mp4v.20.3     78k mp4a.40.2   0k 22050Hz 144p
-160 mp4  256x144    12  |  34.44MiB   109k https | avc1.4d400c  109k                        144p, mp4_dash
-278 webm 256x144    12  |  28.61MiB    90k https | vp9           90k                        144p, webm_dash
-133 mp4  426x240    24  |  77.23MiB   244k https | avc1.4d4015  244k                        240p, mp4_dash
-242 webm 426x240    24  |  72.41MiB   229k https | vp9          229k                        240p, webm_dash
-134 mp4  640x360    24  |  178.23MiB  565k https | avc1.4d401e  565k                        360p, mp4_dash
-18  mp4  640x360    24  |  231.71MiB  734k https | avc1.42001E  734k mp4a.40.2   0k 44100Hz 360p
-243 webm 640x360    24  |  137.73MiB  436k https | vp9          436k                        360p, webm_dash
-135 mp4  854x480    24  |  329.98MiB 1046k https | avc1.4d401e 1046k                        480p, mp4_dash
-244 webm 854x480    24  |  244.94MiB  776k https | vp9          776k                        480p, webm_dash
-136 mp4  1280x720   24  |  638.05MiB 2023k https | avc1.4d401f 2023k                        720p, mp4_dash
-22  mp4  1280x720   24  |            2150k https | avc1.64001F 2150k mp4a.40.2   0k 44100Hz 720p
-247 webm 1280x720   24  |  490.14MiB 1554k https | vp9         1554k                        720p, webm_dash
-137 mp4  1920x1080  24  |  1.13GiB   3685k https | avc1.640028 3685k                        1080p, mp4_dash
-248 webm 1920x1080  24  |  893.45MiB 2833k https | vp9         2833k                        1080p, webm_dash
-#+end_example
-** Best audio and video
-#+begin_src sh
-yt-dlp -f 'bv*+ba' https://www.youtube.com/watch?v=igH-NgcuW2M -o '%(id)s.%(ext)s'
-#+end_src
-** Download a playlist
-Save into =channel_id/playlist_id= directory with the video added to an archive text file:
-#+begin_src sh
-yt-dlp -f 'bv*[height=1080]+ba' --download-archive videos.txt  https://www.youtube.com/playlist?list=PLlVlyGVtvuVnUjA4d6gHKCSrLAAm2n1e6 -o '%(channel_id)s/%(playlist_id)s/%(id)s.%(ext)s'
-#+end_src
-** Download a channel
-#+begin_src sh
-yt-dlp -f 'bv*[height=720]+ba' --download-archive videos.txt https://www.youtube.com/c/FootheFlowerhorn/videos -o '%(channel)s/%(title)s.%(ext)s'
-#+end_src
-* exiftool
-** Copy media based on the creation date
-#+begin_src sh
-exiftool -v -o . '-Directory<CreateDate' -d /data/photos/%Y/%Y-%m-%d/ .
-#+end_src
-** Move media based on the creation date
-#+begin_src sh
-exiftool -v '-Directory<CreateDate' -d /data/photos/%Y/%Y-%m-%d/ .
-#+end_src
-
-Alternatively, in case the creation date is incorrect:
-#+begin_src sh
-exiftool -v '-Directory<DateTimeOriginal' -d /data/photos/%Y/%Y-%m-%d/
-#+end_src
-** Move pdf to a directory
-To move papers (for example) using the title and date of creation to a specific destination:
-#+begin_src sh
-exiftool '-filename<${Title;}.%e' '-directory<CreateDate' -d ~/documents/papers/%Y/ .
-#+end_src
-** Edit metadata from a google takeout
-This [[https://github.com/kaytat/exiftool-scripts-for-takeout][repository]] as a few scripts for =exiftools= that are interesting. In case this repository were to disappear in the future, here is the script to update the metadata from the JSON files:
-#+begin_src sh :filename use_json.args
-# Fill in from Google's JSON
-
-# Look at all media files and ignore JSON
---ext
-json
-
-# Recursive
--r
-
-# Show processed filenames
--v0
-
-# Check if the corresponding JSON exists
--if
-(-e "${Directory}/${Filename}".".json")
-
-# Attempt to modify media only if the info doesn't already exist
--if
-($Filetype eq "MP4" and not $quicktime:TrackCreateDate) or ($Filetype eq "MP4" and $quicktime:TrackCreateDate eq "0000:00:00 00:00:00") or ($Filetype eq "JPEG" and not $exif:DateTimeOriginal) or ($Filetype eq "PNG" and not $PNG:CreationTime)
-
-# Attempt to read in the JSON
--tagsfromfile
-%d%F.json
-
-#
-# Write out the tags. Use ConvertUnixTime to try and convert the UTC timestamp
-# to a reasonable local EXIF string.
-#
-
-# EXIF for regular JPG photos
--AllDates<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,1)}
-
-# PNG-specific
--XMP-Exif:DateTimeOriginal<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,1)}
--PNG:CreationTime<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,1)}
-
-# Quicktime / MP4. Assume that timestamp is in UTC.
--QuickTime:TrackCreateDate<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,0)}
--QuickTime:TrackModifyDate<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,0)}
--QuickTime:MediaCreateDate<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,0)}
--QuickTime:MediaModifyDate<${PhotoTakenTimeTimestamp;$_=ConvertUnixTime($_,0)}
-
-# Clobber everything
--overwrite_original
-#+end_src
-
-and to run it: =exiftool -@ use_json.args <takeout_dir>=
-* beet
-=beet= is a media library management system for music. The main documentation is [[https://beets.readthedocs.io/en/latest/index.html][here]].
-** search
-By album
-#+begin_src shell
-tahoe:~ beet ls album:henry
-Nick Cave & the Bad Seeds - Henry’s Dream - Papa Won’t Leave You, Henry
-Nick Cave & the Bad Seeds - Henry’s Dream - I Had a Dream, Joe
-Nick Cave & the Bad Seeds - Henry’s Dream - Straight to You
-Nick Cave & the Bad Seeds - Henry’s Dream - Brother, My Cup Is Empty
-Nick Cave & the Bad Seeds - Henry’s Dream - Christina the Astonishing
-Nick Cave & the Bad Seeds - Henry’s Dream - When I First Came to Town
-Nick Cave & the Bad Seeds - Henry’s Dream - John Finn’s Wife
-Nick Cave & the Bad Seeds - Henry’s Dream - Loom of the Land
-Nick Cave & the Bad Seeds - Henry’s Dream - Jack the Ripper
-#+end_src
-
-All the albums from 2023
-#+begin_src shell
-tahoe:~ beet ls year:2023 -a
-ALL HANDS_MAKE LIGHT - "Darling the Dawn"
-Big ‡ Brave - Nature Morte
-boygenius - the record
-Ky - Power Is The Pharmacy
-OM - Gebel Barkal / Version
-Joni Void - Everyday Is The Song
-#+end_src
-** Update
-Modify the year for an album:
-#+begin_src shell
-tahoe:~ beet modify path:/data/fast/music/Nick\ Cave\ \&\ the\ Bad\ Seeds/B-Sides\ \&\ Rarities,\ Part\ I year=2005
-Modifying 56 items.
-Nick Cave & Dirty Three - B-Sides & Rarities, Part I - Time Jesum Transeuntum et Non Riverentum
-  year: 2021 -> 2005
-Nick Cave & Shane MacGowan - B-Sides & Rarities, Part I - What a Wonderful World
-  year: 2021 -> 2005
-...
-Really modify, move and write tags? (Yes/no/select) yes
-#+end_src
diff --git a/docs/wireguard.org b/docs/wireguard.org
deleted file mode 100644
index 154c159..0000000
--- a/docs/wireguard.org
+++ /dev/null
@@ -1,21 +0,0 @@
-#+TITLE: Configuration for wireguard
-
-* Creating the keys
-We need a key for the host:
-#+begin_src sh
-(umask 0077; wg genkey > peer_A.key)
-#+end_src
-
-Next we create the public key:
-#+begin_src sh
-wg pubkey < peer_A.key > peer_A.pub
-#+end_src
-
-Now we need to add the private key to the list of secrets:
-#+begin_src sh
-nix run github:ryantm/agenix -- -e secrets/network/<host name>/wireguard_privatekey.age
-#+end_src
-
-Once this is done, update [[file:~/workspace/world/configs/wireguard.toml][wireguard.toml]] to add the new peer with the public key.
-
-Once this is completed, we can delete the files =peer_A.key= and =peer_A.pub=.