Tanders

joined 2 years ago
[โ€“] [email protected] 2 points 2 years ago

That certainly is putting the IDP back in Magic ๐Ÿ‘

[โ€“] [email protected] 2 points 2 years ago

I usually have them coarsely ground for my french press. I've had the Volcania ones and it felt like they were coated with something.

Coarse Ground Coffee Beans

[โ€“] [email protected] 2 points 2 years ago* (last edited 2 years ago) (2 children)

Tanzanian Peaberry by RostHaus out of Austin, TX.

French Press.

RostHaus Beans Bag

[โ€“] [email protected] 1 points 2 years ago

I had some servers sitting around from a previous project and I put them to use.

As soon as I wanted a valid TLS endpoint I was going down the rabbit hole of tunneling the local services; ingress or egress I'd have "trust issues" that I would have to deal with such as where the vaults live and get the database to them, sshfs? zfs smb? nfs? So I decided to extend out for the public services and keep the private services a couple tunnels away from the internet.

The other nice part is that I can make a tmpfs/memfs mount for my vault and cache it at the edge, still working on that one. ;-)

[โ€“] [email protected] 2 points 2 years ago (2 children)

I've been working on a locally hosted instance of VaultWarden, deploying it locally is easy with Alpine but I want it accessible remotely. That requires some restructuring and trust. OpenBSD.Amsterdam is a good choice for that, a small instance of theirs works as my front end relaying to a system that connects over WireGuard to my local VW install with PGSQL back-end.

Presently my solution is 1P/BW for low value accounts, but a VaultWarden on a USB Armory Mk II for high value. The Somu works great for storing keys to open the VW vault. Overkill but it was fun to make.