+34
-34
.terraform.lock.hcl
+34
-34
.terraform.lock.hcl
······
+65
-1
butane/fcos.yml.tftpl
+65
-1
butane/fcos.yml.tftpl
···-ExecStart=/usr/bin/rpm-ostree install --allow-inactive --assumeyes --reboot qemu-guest-agent intel-gpu-tools+ExecStart=/usr/bin/rpm-ostree install --allow-inactive --assumeyes --reboot qemu-guest-agent restic intel-gpu-tools···+ExecStart=/bin/bash -c "export B2_ACCOUNT_ID=$(cat $CREDENTIALS_DIRECTORY/restic-b2-account-id); export B2_ACCOUNT_KEY=$(cat $CREDENTIALS_DIRECTORY/restic-b2-account-key); restic -r b2:krasovsky-homelab:app-data --verbose backup /var/mnt/docker/app_data"+ExecStart=/bin/bash -c "export AWS_ACCESS_KEY_ID=$(cat $CREDENTIALS_DIRECTORY/restic-aws-access-key-id); export AWS_SECRET_ACCESS_KEY=$(cat $CREDENTIALS_DIRECTORY/restic-aws-secret-access-key); restic -r s3:https://gateway.eu1.storjshare.io/homelab-backup/app-data --verbose backup /var/mnt/docker/app_data"
+4
configs/containers/systemd/open-webui/open-webui-pipelines.container.tftpl
+4
configs/containers/systemd/open-webui/open-webui-pipelines.container.tftpl
···
+2
-2
main.tf
+2
-2
main.tf
+8
-1
scripts/init_fcos.sh.tftpl
+8
-1
scripts/init_fcos.sh.tftpl
···podman run --rm -it -v /var/home/core:/home/app --user 1000:1000 --uidmap +1000:@1000:1 --security-opt=label=disable \docker.io/bitwarden/bws secret get --color=no --access-token=${bws_access_token} ${id} | jq -r .value | tr -d '\n' | \podman secret create --replace ${replace(name, "_", "-")} - # I prefer '-' divider for everything related to podman+podman run --rm -it -v /var/home/core:/home/app --user 1000:1000 --uidmap +1000:@1000:1 --security-opt=label=disable \+docker.io/bitwarden/bws secret get --color=no --access-token=${bws_access_token} ${id} | jq -r .value | tr -d '\n' | \
+8
variables.tf
+8
variables.tf
······