aboutsummaryrefslogtreecommitdiff
path: root/content
diff options
context:
space:
mode:
Diffstat (limited to 'content')
-rw-r--r--content/blog/_index.md2
-rw-r--r--content/blog/terraform/caa.md10
-rw-r--r--content/docs/_index.md2
-rw-r--r--content/docs/adyxax.org/adyxax-org.md2
4 files changed, 8 insertions, 8 deletions
diff --git a/content/blog/_index.md b/content/blog/_index.md
index b842812..90d7ae2 100644
--- a/content/blog/_index.md
+++ b/content/blog/_index.md
@@ -5,4 +5,4 @@ menu:
weight: 1
---
-This is the blog section of this website. It is an heritage of the old wiki I maintained before switching to a static website generated with [hugo]({{< ref "hugo" >}}), so articles before 2021 can be a little short and are more like notes than regular articles.
+This is the blog section of this website. It is an heritage of the old wiki I maintained before switching to a static website generated with [hugo]({{< ref "/tags/hugo" >}}), so articles before 2021 can be a little short and are more like notes than regular articles.
diff --git a/content/blog/terraform/caa.md b/content/blog/terraform/caa.md
index aba407b..2f3f9ad 100644
--- a/content/blog/terraform/caa.md
+++ b/content/blog/terraform/caa.md
@@ -11,7 +11,7 @@ tags:
Certification Authority Authorization (CAA) are a type of DNS records that allows the owner of a domain to restrict which Certificate Authority (CA) can emit a certificate for the domain. This is a protection mechanism that is easy to setup and that has absolutely no drawbacks.
-One good reason to use CAA records in our modern world of servers running in the cloud is that when you decomission or change a server you very often lose access to its IP address and get a new one. If you mess up cleaning the old IP address from your DNS records and have no CAA records, someone who grabs it could then start issuing certificates for your domain.
+One good reason to use CAA records in our modern world of servers running in the cloud is that when you decommission or change a server you very often lose access to its IP address and get a new one. If you mess up cleaning the old IP address from your DNS records and have no CAA records, someone who grabs it could then start issuing certificates for your domain.
# CAA records
@@ -28,7 +28,7 @@ In this example, letsencrypt is authorized to issue both standard and wildcard c
## Getting notified of wrongful attempts
-There are severeal bits of syntax in the RFC that can be of interest, especially if you want to be notified when someone tries to issue a certificate from an unauthorized CA:
+There are several bits of syntax in the RFC that can be of interest, especially if you want to be notified when someone tries to issue a certificate from an unauthorized CA:
```
$ dig +short CAA adyxax.org
@@ -51,11 +51,11 @@ With this configuration, I can be pretty sure only I will be able to generate a
## Caveat
-Note that some DNS providers that offer hosting services will sometimes provision invisible CAA records on your behalf and it might not be obvious this is happening. For example if your domain is hosted on cloudflare and you use their `pages` service, they will add CAA records to issue their certificates. You will be able to see these records using your lookup tool, but not if you look at your cloudflare dashboard.
+Note that some DNS providers that offer hosting services will sometimes provision invisible CAA records on your behalf and it might not be obvious this is happening. For example if your domain is hosted on Cloudflare and you use their `pages` service, they will add CAA records to issue their certificates. You will be able to see these records using your lookup tool, but not if you look at your Cloudflare dashboard.
# Opentofu code
-The following code examples will first feature a standard version (suitable for AWS, GCP and other providers), and one for cloudflare. Cloudflare records are built different than other providers I know of because the Cloudflare terraform provider does some validation by itself while others simply rely on their APIs. Another important difference is that terraform resources use a list of records as input, while cloudflare forces you to create one resource per value you need for a record. Yes this will clutter your terraform states!
+The following code examples will first feature a standard version (suitable for AWS, GCP and other providers), and one for Cloudflare. Cloudflare records are built different than other providers I know of because the Cloudflare terraform provider does some validation by itself while others simply rely on their APIs. Another important difference is that terraform resources use a list of records as input, while Cloudflare forces you to create one resource per value you need for a record. Yes this will clutter your terraform states!
## Basic
@@ -238,4 +238,4 @@ resource "cloudflare_record" "caa" {
# Conclusion
-I hope I showed you that CAA records are both useful and accessible. Please start propecting your domains with CAA records now!
+I hope I showed you that CAA records are both useful and accessible. Please start protecting your domains with CAA records now!
diff --git a/content/docs/_index.md b/content/docs/_index.md
index 6177dfa..0595b64 100644
--- a/content/docs/_index.md
+++ b/content/docs/_index.md
@@ -5,6 +5,6 @@ menu:
weight: 3
---
-This is the Docs section of this website. It is an heritage of the old wiki I maintained before switching to a static website generated with [hugo]({{< ref "hugo" >}}), with information that does not really fit in a blog format.
+This is the Docs section of this website. It is an heritage of the old wiki I maintained before switching to a static website generated with [hugo]({{< ref "/tags/hugo" >}}), with information that does not really fit in a blog format.
It is organised in the following sections :
diff --git a/content/docs/adyxax.org/adyxax-org.md b/content/docs/adyxax.org/adyxax-org.md
index 3c87fbc..1e37f2c 100644
--- a/content/docs/adyxax.org/adyxax-org.md
+++ b/content/docs/adyxax.org/adyxax-org.md
@@ -12,7 +12,7 @@ maintainable solution, with as little maintenance overhead as possible.
It used to rely on mostly [Gentoo]({{< ref "/tags/Gentoo" >}}) (and some optional [OpenBSD]({{< ref "/tags/OpenBSD" >}})) servers interconnected with point to point openvpn links. Services ran inside lxd on alpine linux containers. Communications between all those services work
thanks to dynamic routing with bird and ospf along those openvpn links. I made extensive use of ansible to orchestrate all that, deploy the containers and manage them.
-Even though it worked really well for years, I do not plan to blog a lot about this setup unless someone interested writes me to request information about it. On this new documentation site I plan to focus on how I am migrating the most stable and boring parts on OpenBSD hosts (so without containerisation). The less important or more changing services will be migrated on [kubernetes]({{< ref "kubernetes" >}}) as a learning experience. Even though my custom setup with lxd on gentoo has always worked well it still was a rather unusual design that sometimes required maintenance following updates. Even if I am proud of its stability and reliability... It is not good for me to not look deeper into new technologies. Gentoo, OpenBSD and LXD is not the most popular combination out there. I will not abandon it completely (I do not imagine my laptop running anything other than gentoo), but working on more employable skills will do me good.
+Even though it worked really well for years, I do not plan to blog a lot about this setup unless someone interested writes me to request information about it. On this new documentation site I plan to focus on how I am migrating the most stable and boring parts on OpenBSD hosts (so without containerisation). The less important or more changing services will be migrated on [kubernetes]({{< ref "/tags/kubernetes" >}}) as a learning experience. Even though my custom setup with lxd on gentoo has always worked well it still was a rather unusual design that sometimes required maintenance following updates. Even if I am proud of its stability and reliability... It is not good for me to not look deeper into new technologies. Gentoo, OpenBSD and LXD is not the most popular combination out there. I will not abandon it completely (I do not imagine my laptop running anything other than gentoo), but working on more employable skills will do me good.
## Why write about it?