Commit graph

322 commits

Author SHA1 Message Date
38967bd43d
Bump to latest nidus sync 2026-01-12 14:12:56 +00:00
5de9d3ed97
Remove warning from nixvim 2026-01-12 14:12:56 +00:00
9497063340
Deploy nidus-sync v0.0.6
This also removes tegola reading only from the nidus-dev-sync.
Also bump to 25.11 so the system is consistent
2026-01-12 14:12:54 +00:00
1055f382fc
Move nidus sync to its own backup buckets
When doing the restore recently it seemed likely that there were
conflicts with sharing the buckets.
2026-01-12 14:12:12 +00:00
0dd71de7a6
Remove fss-gleipnir-qa
We'll be switching it to the new nidus-sync project soon.
2026-01-12 14:12:12 +00:00
b5defe1bf0
Add restic backup for all corp services 2026-01-12 00:49:27 +00:00
d042a416c3 Add non-working filesystem comment
I just mounted the disk by hand, less dangerous that way.
2026-01-05 03:32:03 +00:00
c5c612e35e Re-wipe nocix-amd-legacy-sexcore again, update secrets (again) 2026-01-05 03:31:47 +00:00
4ca2b5faca
Update missed fieldseeker-sync secrets 2026-01-05 01:46:20 +00:00
cbb8daebf9 Working nixos-anywhere directly to nocix-amd-legacy-sexcore
This was essentiall an OS wipe, adding root authorized keys, then
running nix-anywhere out of the main flake. Saves a bunch of steps which
is really nice.

I removed the data disk from the disko config in the hopes it would
solve a problem that looked like:

  ### Installing NixOS ###
  Pseudo-terminal will not be allocated because stdin is not a terminal.
  Warning: Permanently added 'nocix-amd-legacy-sexcore.gleipnir.technology' (ED25519) to the list of known hosts.
  installing the boot loader...
  mkdir: cannot create directory ‘/mnt/sys’: Structure needs cleaning
2026-01-05 01:29:00 +00:00
d0df5172d3 Move all logic from nixos-anywhere to main flake
It should now be possible to nixos-anywhere without the custom
directory.
Still testing that works though.
2026-01-05 00:27:37 +00:00
0ac27f8b99 Add switch-fix commands 2026-01-05 00:27:23 +00:00
e5f5117cdd Add eliribble to trusted users for pushing updates
This should make it possible to push remote builds.
2026-01-04 21:07:51 +00:00
696f241b3d Update key for nocix-amd-legacy-sexcore after rebuild 2026-01-04 21:07:51 +00:00
23a61985dc WIP getting legacy-sexcore back up
At this point I was able to successfully nixos-anywhere the system and
SSH back in afterwards. That's progress worth keeping.
2026-01-04 21:07:51 +00:00
fd8e9ce33e
Roll back to 25.05
Can't build corp on 25.11 yet.
2025-12-16 03:42:17 +00:00
bdd58efc4e
Add old laptop key 2025-12-16 03:41:50 +00:00
c811b0e4d0
Update to nidus-sync 0.0.5 2025-12-16 03:41:50 +00:00
b120ab9fec
Move to NixOS 25.11 2025-12-15 18:48:00 +00:00
df208876aa
Add dev_poweredge key
For building nix binary cache
2025-12-15 18:47:41 +00:00
03d683cb0c
Add FIELDSEEKER_SCHEMA_DIRECTORY to nidus config 2025-12-11 14:33:45 +00:00
b9204b28f7
Add s3 for theribbles sovr tunnel 2025-12-11 14:31:58 +00:00
840c68524f
Add alternative IP address and SSH port
I was trying to use it to get around public wifi firewalls
2025-12-11 14:31:58 +00:00
af1de58c28
Add initial attempt at qgis
Doesn't work, likely due to missing CPU instruction support (AVX).
2025-12-11 14:31:57 +00:00
63bd931034 Clean up old, unused restic 2025-11-29 16:30:58 +00:00
35203056b1
Add MAPBOX_TOKEN to nidus-sync env 2025-11-21 18:32:40 +00:00
53088a6c8f
Add ENVIRONMENT to nidus-sync 2025-11-21 18:16:18 +00:00
d8cd03f704
Go to latest nidus-sync 2025-11-21 18:14:47 +00:00
839e699582
Add organization_id parameter to Tegola
This makes it possible to separate data by organization for different
clients
2025-11-16 21:25:11 +00:00
6b8a21664f
Add support for Nidus database to Tegola 2025-11-15 21:34:05 +00:00
1c3ca5909b
Reverse proxy for tegola through caddy to get TLS 2025-11-15 15:00:39 +00:00
423c1e6d9f
Working tegola delpoy
This uses the data from Bonn, Germany which I downloaded from
https://github.com/go-spatial/tegola-example-bonn/tree/main
2025-11-14 18:58:42 +00:00
7315b7edba
Add secrets for dev environment
Just useful for me to lookup the information when running things by hand
2025-11-11 19:25:40 +00:00
f3b8602f30
Actually serve sync.nidus.cloud with the new config. 2025-11-11 17:57:35 +00:00
44c0d83bf6
Add nidus-sync production module
This will allow me to keep nidus-sync stable while continuing to do
development on this same server on a different port.
2025-11-11 17:24:41 +00:00
a94d491929
Add jq to all servers
Generically useful
2025-11-11 17:24:41 +00:00
e1f7581bde
Add asterisk
It seems to work - I connected a client to it - but I never successfully
made any calls.
2025-11-11 17:24:40 +00:00
505aa936eb
Add a database for nidus-sync 2025-11-11 17:24:40 +00:00
273d42024b
Add git-lfs to all systems 2025-11-11 17:24:40 +00:00
d2b750b155
Add git commit signing through ssh-agent 2025-11-11 17:24:39 +00:00
78f1bfca49
Add reverse proxy for sync.nidus.cloud
Makes it so I can test my oauth thing with ArcGIS
2025-11-11 17:24:39 +00:00
0fad3ec351
Add watchexec to all servers
Really useful tool for continuously changing things.
2025-11-11 17:24:39 +00:00
00d3e4be39
Bump version of fieldseeker-sync 2025-11-11 17:24:38 +00:00
e29be82423
Update to latest fieldseeker-sync 2025-11-11 17:24:38 +00:00
8c7e31b800
Fix paths to use files on new sync system 2025-11-11 17:24:38 +00:00
ff52925cb4
Set the bind address for nidus-sync 2025-11-11 17:23:25 +00:00
e5bb45abbd
Add Nidus sync dev secrets 2025-11-11 16:36:29 +00:00
1f21e2d01c
Add nidus-sync secrets 2025-11-11 16:30:54 +00:00
d7feca7bea Get twenty CRM actually running
I had to punt and allow IP-based connection over the docker network port
rather than mount the unix domain socket.

For now.
2025-10-22 21:36:19 +00:00
40d7ccf048 Move corp server to using the nocix role pattern
This was introduced for the sync server, but we desire all to receive
it.
2025-10-22 18:17:13 +00:00