Commit graph

82 commits

Author SHA1 Message Date
7ac27f6a94
Re-enable glitchtip
See if the latest version has slightly fewer problems :/
2026-01-26 02:57:45 +00:00
7394dec056
Update tegola for latest nidus-sync 2026-01-22 05:22:37 +00:00
044765202d
Add new options for nidus-sync 2026-01-18 02:44:06 +00:00
5288c5857a
Add separate restic roles for separate credentials
I don't want corp and prod accidentally smashing each other, or being
used as a credentials escalation attack.
2026-01-13 14:57:33 +00:00
343f999efb
Update host key for corp server 2026-01-13 04:48:16 +00:00
d6fc5502f6
Add report/sync URLs for nidus 2026-01-12 14:12:56 +00:00
9497063340
Deploy nidus-sync v0.0.6
This also removes tegola reading only from the nidus-dev-sync.
Also bump to 25.11 so the system is consistent
2026-01-12 14:12:54 +00:00
c5c612e35e Re-wipe nocix-amd-legacy-sexcore again, update secrets (again) 2026-01-05 03:31:47 +00:00
4ca2b5faca
Update missed fieldseeker-sync secrets 2026-01-05 01:46:20 +00:00
cbb8daebf9 Working nixos-anywhere directly to nocix-amd-legacy-sexcore
This was essentiall an OS wipe, adding root authorized keys, then
running nix-anywhere out of the main flake. Saves a bunch of steps which
is really nice.

I removed the data disk from the disko config in the hopes it would
solve a problem that looked like:

  ### Installing NixOS ###
  Pseudo-terminal will not be allocated because stdin is not a terminal.
  Warning: Permanently added 'nocix-amd-legacy-sexcore.gleipnir.technology' (ED25519) to the list of known hosts.
  installing the boot loader...
  mkdir: cannot create directory ‘/mnt/sys’: Structure needs cleaning
2026-01-05 01:29:00 +00:00
23a61985dc WIP getting legacy-sexcore back up
At this point I was able to successfully nixos-anywhere the system and
SSH back in afterwards. That's progress worth keeping.
2026-01-04 21:07:51 +00:00
df208876aa
Add dev_poweredge key
For building nix binary cache
2025-12-15 18:47:41 +00:00
03d683cb0c
Add FIELDSEEKER_SCHEMA_DIRECTORY to nidus config 2025-12-11 14:33:45 +00:00
35203056b1
Add MAPBOX_TOKEN to nidus-sync env 2025-11-21 18:32:40 +00:00
53088a6c8f
Add ENVIRONMENT to nidus-sync 2025-11-21 18:16:18 +00:00
ff52925cb4
Set the bind address for nidus-sync 2025-11-11 17:23:25 +00:00
e5bb45abbd
Add Nidus sync dev secrets 2025-11-11 16:36:29 +00:00
1f21e2d01c
Add nidus-sync secrets 2025-11-11 16:30:54 +00:00
d7feca7bea Get twenty CRM actually running
I had to punt and allow IP-based connection over the docker network port
rather than mount the unix domain socket.

For now.
2025-10-22 21:36:19 +00:00
de24c16161 Rebuild librchat secrets
Bad merge.
2025-10-22 18:16:56 +00:00
009829f6d9 Add twenty CRM secrets 2025-10-22 18:13:22 +00:00
e465a7bf1c Add label studio integration to gleipnir qa deployment 2025-10-22 18:00:34 +00:00
c5fc53024c Add secrets for label studio integration 2025-10-22 16:49:31 +00:00
8ca7c886a9 Update sentry dsn to use glitchtip SaaS 2025-10-22 03:27:39 +00:00
8f5ac7fe7c Enable debug logging and log level for librechat
Trying to debug some behavior
2025-10-20 23:01:15 +00:00
b7a5cdc1bd Lot Glitchtip errors to cloud hosted Glitchtip.
On suggestion of one of its maintainers.
2025-10-20 23:00:52 +00:00
cea700ecf2 Remove some FRPS settings from old server install 2025-10-14 02:56:11 +00:00
8995e95041 Add the sovr role and initial frps deployment 2025-10-13 17:06:15 +00:00
6c56e9a6da Move delta files to bigdisk 2025-10-10 01:34:08 +00:00
eaf2868cd3 Update fieldseeker sync environment for Delta and Gleipnir QA 2025-10-08 20:38:53 +00:00
da0954e737 Allow logic reuse in fieldseeker-sync deployment
This uses a system of patterns to deploy everything needed for
fieldseeker sync and standardizes the naming conventions.
2025-10-08 20:34:49 +00:00
6f89f0fe56 Add noxic-amd-legacy-hexcore to sops secrets 2025-10-07 17:07:19 +00:00
3e89673560 Get rag_api running through unix domain socket postgres 2025-10-03 15:01:36 +00:00
20330304b6 Enable cross-origin requests from minio to label studio
This allows streaming of audio files directly to label studio
2025-10-03 15:01:36 +00:00
352ed1a433 Disable signup for new users in label studio
I'll manually create all the users myself
2025-10-03 15:01:36 +00:00
54b79f1437 Switch reverse proxy to also handle s3 API
Without this we only get the console but can't actually access the
S3-compatible portion of the API
2025-10-03 15:01:36 +00:00
0632df5a30 Add proper Authentik scopes to minio OIDC config
See https://integrations.goauthentik.io/infrastructure/minio/ for
details that I was following
2025-10-03 15:01:36 +00:00
dad759c4b3 Add minio module for S3-compatible object storage
Label Studio _really_ prefers using a direct object storage model. Can't
say I blame them, it makes sense given they are running Python.

I had to bump Authentik to not use its default port so that minio could
use its own default port. That seemed safest given that Authentik is
always proxied but minio/S3 may _not_ be. I'm just not sure.
2025-10-03 15:01:36 +00:00
dbbed7117a Set up reverse proxy, configure hostname
It was rather rediculously hard to get the CSRF settings correct. I
don't think I can register new users on anything but the commandline at
this point via:

podman exec -it podman-label-studio /bin/bash
label-studio start --username <username> --password <password>

Where <username> should actually be an email.
2025-10-03 15:01:36 +00:00
d246caa613 Connect label-studio to postgres 2025-10-03 15:01:36 +00:00
24ecd65cf0 Add backup for fieldseeker-sync files.
This required changing the directory of the user files so that I don't
accidentially backup Gleipnir test files.
2025-09-30 17:46:46 +00:00
40517face6 Add timecard-bot deployment to corp
This currently has the architecture hard-coded. That's bad, but nix is
hard, and there's probably a much better way to integrate this into the
system when I can be bothered to do it.
2025-09-26 19:08:26 +00:00
35777dc9cb Enable vikunja search for SSO users when editing teams
See https://vikunja.io/docs/config-options/#1-service-enableopenidteamusersearch
2025-09-26 17:27:46 +00:00
70dca56cf8 Connect vikunja to the local database rather than the remote one 2025-09-09 21:34:38 +00:00
2c101e6aaa Get cloudreve working on new corp with local database
This was a huge hassle. I really wanted to see it working under a
non-root user since it writes files, but that ended up being impossible
because of several bugs in podman's rootless integration with NixOS.
I've kept pieces of the logic around and commented out in case I can fix
it in the future as it would be more secure.

I also tried to connect to Postgres over the unix domain socket, but the
problem here is that the container is built to run as root and I'd need
to do some elaborate mapping of the root user inside the container, the
non-root user outside the container, and the Postgres auth scheme.

This would be great stuff to sort out, but I'm out of time now to work
on it.
2025-09-09 19:47:22 +00:00
57843f6b8a Get matrix-synapse up and running on new corp
I move the secrets file to be more consistent with the naming.
I removed parts of the postgres config that is no longer needed now that
the database is running locally.
2025-09-09 15:05:28 +00:00
e78d5aacf5 Add missing new corp hardware change
Missed from a previous commit
2025-09-09 15:03:43 +00:00
4d5de177b5 Get authentik working on the new corp server without podman
The podman integration was pretty janky because it relied on running a
pod and the NixOS integration with pods are essentially non-existent.
This led to issues with the port being improperly forwarded when
partially restarted.

Now instead I use a flake dedicated to running authentik. This allows me
to specify some of the config in the module directly and some in
secrets, which is really nice. I've additionally added some changes to
the listen address so that the service isn't exposed over public IP
addresses.
2025-09-09 15:03:43 +00:00
3a76566ac6 Add corp dev key
This makes it so I can modify secrets files directly on the server I'm
bringing up.
2025-09-09 12:32:58 +00:00
edf96e2159 Add missing vikunja.yaml secret 2025-09-08 23:44:17 +00:00