Commit graph

14 commits

Author SHA1 Message Date
bacd06e90f
Update staging server key after rebuild 2026-02-18 15:24:52 +00:00
0b8cedf800
Add new staging server key for sops 2026-02-18 05:06:57 +00:00
343f999efb
Update host key for corp server 2026-01-13 04:48:16 +00:00
c5c612e35e Re-wipe nocix-amd-legacy-sexcore again, update secrets (again) 2026-01-05 03:31:47 +00:00
cbb8daebf9 Working nixos-anywhere directly to nocix-amd-legacy-sexcore
This was essentiall an OS wipe, adding root authorized keys, then
running nix-anywhere out of the main flake. Saves a bunch of steps which
is really nice.

I removed the data disk from the disko config in the hopes it would
solve a problem that looked like:

  ### Installing NixOS ###
  Pseudo-terminal will not be allocated because stdin is not a terminal.
  Warning: Permanently added 'nocix-amd-legacy-sexcore.gleipnir.technology' (ED25519) to the list of known hosts.
  installing the boot loader...
  mkdir: cannot create directory ‘/mnt/sys’: Structure needs cleaning
2026-01-05 01:29:00 +00:00
23a61985dc WIP getting legacy-sexcore back up
At this point I was able to successfully nixos-anywhere the system and
SSH back in afterwards. That's progress worth keeping.
2026-01-04 21:07:51 +00:00
df208876aa
Add dev_poweredge key
For building nix binary cache
2025-12-15 18:47:41 +00:00
6f89f0fe56 Add noxic-amd-legacy-hexcore to sops secrets 2025-10-07 17:07:19 +00:00
4d5de177b5 Get authentik working on the new corp server without podman
The podman integration was pretty janky because it relied on running a
pod and the NixOS integration with pods are essentially non-existent.
This led to issues with the port being improperly forwarded when
partially restarted.

Now instead I use a flake dedicated to running authentik. This allows me
to specify some of the config in the module directly and some in
secrets, which is really nice. I've additionally added some changes to
the listen address so that the service isn't exposed over public IP
addresses.
2025-09-09 15:03:43 +00:00
3a76566ac6 Add corp dev key
This makes it so I can modify secrets files directly on the server I'm
bringing up.
2025-09-09 12:32:58 +00:00
9949dddaaa Update key for new corp server 2025-09-08 23:33:42 +00:00
089abc7a50 Add new sync host encryption keys to various secrets 2025-08-18 19:59:04 +00:00
a2f9607685 Switch to running redis within the pod
I need time to figure out the networking portion.
2025-07-18 18:04:26 +00:00
43cde1e2f4 Switch authentik env file to an actual env file
ini is not env.
2025-07-18 17:00:35 +00:00