diff --git a/archetypes/default.md b/archetypes/default.md index 85703a0..810f43b 100644 --- a/archetypes/default.md +++ b/archetypes/default.md @@ -15,6 +15,7 @@ tags: - api - automation - availability + - caddy - certs - chat - chrome @@ -47,6 +48,7 @@ tags: - selfhosting - serverless - shell + - tailscale - tasker - terraform - vmware diff --git a/config/_default/params.toml b/config/_default/params.toml index 372e595..7146dbc 100644 --- a/config/_default/params.toml +++ b/config/_default/params.toml @@ -5,7 +5,7 @@ mainSections = ["posts"] fallBackOgImage = "images/broken-computer.svg" numberOfFeaturedPosts = 5 numberOfRelatedPosts = 5 -author = "codesplice" +author = "jbowdre" indexTitle = ".-. ..- -. - .. -- . - . .-. .-. --- .-." diff --git a/content/posts/easy-push-notifications-with-ntfy/index.md b/content/posts/easy-push-notifications-with-ntfy/index.md index d11b5a1..a5447b8 100644 --- a/content/posts/easy-push-notifications-with-ntfy/index.md +++ b/content/posts/easy-push-notifications-with-ntfy/index.md @@ -11,6 +11,7 @@ tags: - android - api - automation + - caddy - containers - docker - homeassistant @@ -20,7 +21,7 @@ tags: - shell --- ### The Pitch -Wouldn't it be great if there was a simple way to send a notification to your phone(s) with a simple `curl` call? Then you could get notified when a script completes, or a server reboots, a user logs in to a system, or a sensor connected to Home Assistant changes state. How great would that be?? +Wouldn't it be great if there was a simple way to send a notification to your phone(s) with just a `curl` call? Then you could get notified when a script completes, a server reboots, a user logs in to a system, or a sensor connected to Home Assistant changes state. How great would that be?? [ntfy.sh](https://ntfy.sh) (pronounced *notify*) provides just that. It's an [open-source](https://github.com/binwiederhier/ntfy), easy-to-use, HTTP-based notification service, and it can notify using mobile apps for Android ([Play](https://play.google.com/store/apps/details?id=io.heckel.ntfy) or [F-Droid](https://f-droid.org/en/packages/io.heckel.ntfy/)) or iOS ([App Store](https://apps.apple.com/us/app/ntfy/id1625396347)) or a [web app](https://ntfy.sh/app). diff --git a/content/posts/federated-matrix-server-synapse-on-oracle-clouds-free-tier/index.md b/content/posts/federated-matrix-server-synapse-on-oracle-clouds-free-tier/index.md index dd3cc30..edb8bad 100644 --- a/content/posts/federated-matrix-server-synapse-on-oracle-clouds-free-tier/index.md +++ b/content/posts/federated-matrix-server-synapse-on-oracle-clouds-free-tier/index.md @@ -5,6 +5,7 @@ thumbnail: 2xe34VJym.png usePageBundles: true lastmod: "2021-09-17" tags: +- caddy - docker - linux - cloud diff --git a/content/posts/gitea-self-hosted-git-server/index.md b/content/posts/gitea-self-hosted-git-server/index.md index 5819744..69bd209 100644 --- a/content/posts/gitea-self-hosted-git-server/index.md +++ b/content/posts/gitea-self-hosted-git-server/index.md @@ -16,6 +16,7 @@ thumbnail: "gitea-logo.png" # Sets thumbnail image appearing inside card on home codeLineNumbers: false # Override global value for showing of line numbers within code block. series: Projects tags: + - caddy - linux - docker - cloud diff --git a/content/posts/secure-networking-made-simple-with-tailscale/index.md b/content/posts/secure-networking-made-simple-with-tailscale/index.md index f38d63c..a69b118 100644 --- a/content/posts/secure-networking-made-simple-with-tailscale/index.md +++ b/content/posts/secure-networking-made-simple-with-tailscale/index.md @@ -23,6 +23,7 @@ tags: - linux - networking - security + - tailscale comment: true # Disable comment if false. --- Not all that long ago, I shared about a [somewhat-complicated WireGuard VPN setup](/cloud-based-wireguard-vpn-remote-homelab-access/) that I had started using to replace my previous OpenVPN solution. I raved about WireGuard's speed, security, and flexible (if complex) Cryptokey Routing, but adding and managing peers with WireGuard is a fairly manual (and tedious) process. And while I thought I was pretty clever for using a WireGuard peer in GCP to maintain a secure tunnel into my home network without having to punch holes through my firewall, routing all my traffic through The Cloud wasn't really optimal[^egress_fees]. diff --git a/content/posts/snikket-private-xmpp-chat-on-oracle-cloud-free-tier/index.md b/content/posts/snikket-private-xmpp-chat-on-oracle-cloud-free-tier/index.md index 0b6c02a..a22fd51 100644 --- a/content/posts/snikket-private-xmpp-chat-on-oracle-cloud-free-tier/index.md +++ b/content/posts/snikket-private-xmpp-chat-on-oracle-cloud-free-tier/index.md @@ -22,6 +22,7 @@ tags: - containers - chat - selfhosting + - caddy comment: true # Disable comment if false. --- **Non-technical users deserve private communications, too.**