Commit message (Collapse) | Author | Age | Files | Lines | |
---|---|---|---|---|---|
* | don't sign git commits | Franck Cuny | 2024-03-04 | 1 | -16/+0 |
| | | | | Simplify the configuration as this is not something I currently use. | ||||
* | delete even more unused configurations | Franck Cuny | 2023-12-09 | 2 | -17/+0 |
| | |||||
* | formatting a few files with treefmt | Franck Cuny | 2023-12-03 | 2 | -9/+9 |
| | |||||
* | add ssh key from 1passowrd and sign commits | Franck Cuny | 2023-09-14 | 1 | -0/+3 |
| | |||||
* | module for homelab | Franck Cuny | 2023-05-08 | 1 | -0/+1 |
| | |||||
* | hosts/tahoe: rename account for backup and enable sftp for it | Franck Cuny | 2023-04-29 | 1 | -0/+3 |
| | | | | | | | | | | | | | The dedicated account for backup should be named 'backup', as it's more generic. While it's a system account, I still need to be able to log in the host remotely with sftp, so we give it a UID (991). The account needs to be able to sftp to tahoe in order to store the backups from remote hosts. However we don't want this user to get a shell and be able to browse the host, so we configure sshd to chroot the user to where the backups are stored. | ||||
* | wireguard: fix configuration of a few hosts | Franck Cuny | 2023-04-05 | 1 | -7/+2 |
| | |||||
* | hosts/carmel: add wireguard key | Franck Cuny | 2023-04-05 | 1 | -2/+2 |
| | |||||
* | home/git: some cleanup | Franck Cuny | 2023-03-13 | 1 | -0/+4 |
| | | | | | | - add a comment for each ssh-key that is not stored on a yubikey - simplify the git commit template - remove some extra config that I don't need | ||||
* | ref(modules/users): move ssh keys to a separate file | Franck Cuny | 2023-02-20 | 1 | -0/+6 |
| | | | | | Each key is associated to a variable, which let me be more specific about which key to use depending on the context. | ||||
* | wireguard: set the externalIP | Franck Cuny | 2022-03-02 | 1 | -0/+3 |
| | |||||
* | tahoe: wireguard setup | Franck Cuny | 2022-02-21 | 1 | -0/+3 |
| | |||||
* | wireguard: module and peers configurations | Franck Cuny | 2022-02-21 | 1 | -0/+15 |
| | | | | | | | | | Add a new module to automatically configure the peers for wireguard. The module needs a configuration file (in `configs/wireguard.toml`) which lists all the peers, their IP and and their public keys. The secret keys is encrypted as a secret with agenix. There's some initial documentation on how to use this setup. | ||||
* | configs: move personal configuration with user | Franck Cuny | 2022-02-12 | 14 | -213/+0 |
| | |||||
* | home-manager: mpd and ncmpcpp configuration | Franck Cuny | 2022-02-10 | 2 | -0/+43 |
| | |||||
* | polybar: rename configuration files | Franck Cuny | 2022-02-09 | 2 | -0/+0 |
| | |||||
* | home-manager: let's try to configure polybar | Franck Cuny | 2022-02-09 | 11 | -0/+143 |
| | | | | | There's a few things missing (my binaries for the wifi and battery, at a minimum), but that's fine for now. | ||||
* | home-manager: fix zsh config | Franck Cuny | 2022-02-09 | 1 | -0/+15 |
| | |||||
* | home-manager: expand zsh configuration | Franck Cuny | 2022-02-09 | 1 | -0/+12 |