Remove server files

This commit is contained in:
thiloho
2024-04-25 08:25:23 +02:00
parent 47be5c990b
commit 3812bed347
24 changed files with 21 additions and 493 deletions

View File

@@ -8,26 +8,6 @@
url = "github:nix-community/home-manager"; url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
website = {
url = "github:thiloho/website";
flake = false;
};
aurora-blog-template = {
url = "github:thiloho/aurora";
inputs.nixpkgs.follows = "nixpkgs";
};
denbot = {
url = "github:thiloho/discord-bot";
inputs.nixpkgs.follows = "nixpkgs";
};
todos = {
url = "github:thiloho/todos";
inputs.nixpkgs.follows = "nixpkgs";
};
agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
};
}; };
outputs = inputs@{ nixpkgs, home-manager, ... }: { outputs = inputs@{ nixpkgs, home-manager, ... }: {
@@ -51,7 +31,6 @@
in { in {
pc = mkSystem ./nixos-configurations/pc; pc = mkSystem ./nixos-configurations/pc;
laptop = mkSystem ./nixos-configurations/laptop; laptop = mkSystem ./nixos-configurations/laptop;
server = mkSystem ./nixos-configurations/server;
}; };
}; };
} }

View File

@@ -1,4 +1,4 @@
{ config, pkgs, inputs, ... }: { inputs, ... }:
{ {
imports = [ imports = [
@@ -12,13 +12,7 @@
home-manager.users.thiloho = { pkgs, ... }: { home-manager.users.thiloho = { pkgs, ... }: {
programs.git.signing.key = "BFD8F6A55B1E4F11"; programs.git.signing.key = "BFD8F6A55B1E4F11";
home = { home = { stateVersion = "23.05"; };
packages = with pkgs;
[
# ciscoPacketTracer8
];
stateVersion = "23.05";
};
}; };
system.stateVersion = "23.05"; system.stateVersion = "23.05";
} }

View File

@@ -4,28 +4,26 @@
{ config, lib, pkgs, modulesPath, ... }: { config, lib, pkgs, modulesPath, ... }:
{ {
imports = imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sd_mod" ]; boot.initrd.availableKernelModules =
[ "xhci_pci" "nvme" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ]; boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ]; boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ]; boot.extraModulePackages = [ ];
fileSystems."/" = fileSystems."/" = {
{ device = "/dev/disk/by-uuid/c930419a-6c2f-452a-9e58-c92979ab8f3d"; device = "/dev/disk/by-uuid/c930419a-6c2f-452a-9e58-c92979ab8f3d";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/boot" = fileSystems."/boot" = {
{ device = "/dev/disk/by-uuid/EF76-673F"; device = "/dev/disk/by-uuid/EF76-673F";
fsType = "vfat"; fsType = "vfat";
}; };
swapDevices = swapDevices =
[ { device = "/dev/disk/by-uuid/5ec2362b-c256-4097-8d48-5460002d0978"; } [{ device = "/dev/disk/by-uuid/5ec2362b-c256-4097-8d48-5460002d0978"; }];
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking # Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's
@@ -36,5 +34,6 @@
# networking.interfaces.wlp3s0.useDHCP = lib.mkDefault true; # networking.interfaces.wlp3s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.intel.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
} }

View File

@@ -1,4 +1,4 @@
{ pkgs, inputs, lib, ... }: { inputs, ... }:
{ {
imports = [ imports = [

View File

@@ -1,294 +0,0 @@
{ inputs, pkgs, config, lib, ... }:
{
imports = [
inputs.agenix.nixosModules.default
./hardware-configuration.nix
../shared.nix
];
nix.settings.trusted-users = [ "thiloho" ];
age.secrets = {
hedgedoc-environment-file.file =
../../secrets/hedgedoc-environment-file.age;
discord-bot-token.file = ../../secrets/discord-bot-token.age;
todos-environment-file.file = ../../secrets/todos-environment-file.age;
"restic/minecraft-environment-file".file =
../../secrets/restic/minecraft-environment-file.age;
"restic/minecraft-repository".file =
../../secrets/restic/minecraft-repository.age;
"restic/minecraft-password".file =
../../secrets/restic/minecraft-password.age;
"restic/hedgedoc-environment-file".file =
../../secrets/restic/hedgedoc-environment-file.age;
"restic/hedgedoc-repository".file =
../../secrets/restic/hedgedoc-repository.age;
"restic/hedgedoc-password".file =
../../secrets/restic/hedgedoc-password.age;
"restic/todos-environment-file".file =
../../secrets/restic/todos-environment-file.age;
"restic/todos-repository".file = ../../secrets/restic/todos-repository.age;
"restic/todos-password".file = ../../secrets/restic/todos-password.age;
"restic/discord-bot-environment-file".file =
../../secrets/restic/discord-bot-environment-file.age;
"restic/discord-bot-repository".file =
../../secrets/restic/discord-bot-repository.age;
"restic/discord-bot-password".file =
../../secrets/restic/discord-bot-password.age;
};
environment.systemPackages = with pkgs; [ nodejs_20 ];
networking = {
hostName = "server";
firewall = {
allowedTCPPorts = [ 80 443 25565 3232 ];
allowedUDPPorts = [ 80 443 25565 3232 ];
};
};
services = {
openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
minecraft-server = {
enable = true;
eula = true;
declarative = true;
openFirewall = true;
whitelist = {
thilo_ho = "4e4d744d-7748-46bc-add8-b3e8ca3b4cf5";
Liaxswan = "ccbf3468-a6b4-4d7b-9837-5a2451deca79";
};
serverProperties = {
difficulty = 3;
max-players = 10;
motd = "Thilo's SMP";
white-list = true;
};
};
nginx = {
enable = true;
recommendedProxySettings = true;
recommendedTlsSettings = true;
virtualHosts = {
"thilohohlt.com" = {
enableACME = true;
forceSSL = true;
root = inputs.website;
};
"aurora.thilohohlt.com" = {
enableACME = true;
forceSSL = true;
root = inputs.aurora-blog-template.packages.${pkgs.system}.default;
};
"collab.thilohohlt.com" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://localhost:3300";
locations."/socket.io/" = {
proxyPass = "http://localhost:3300";
proxyWebsockets = true;
extraConfig = "proxy_ssl_server_name on;";
};
};
"todos.thilohohlt.com" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://localhost:5173";
};
"git.thilohohlt.com" = {
enableACME = true;
forceSSL = true;
locations."/".proxyPass = "http://localhost:3001";
};
};
};
hedgedoc = {
enable = true;
settings = {
port = 3300;
domain = "collab.thilohohlt.com";
db = {
dialect = "postgres";
host = "/run/postgresql";
database = "hedgedoc";
};
protocolUseSSL = true;
allowAnonymous = false;
allowEmailRegister = false;
email = false;
};
environmentFile = config.age.secrets.hedgedoc-environment-file.path;
};
gitea = {
enable = true;
appName = "Gitea instance of Thilo";
database = {
type = "postgres";
host = "/run/postgresql";
};
settings.service.DISABLE_REGISTRATION = true;
settings.server = {
DOMAIN = "thilohohlt.com";
ROOT_URL = "https://git.thilohohlt.com";
HTTP_PORT = 3001;
};
};
invidious = {
enable = true;
port = 3232;
domain = "invidious.thilohohlt.com";
nginx.enable = true;
settings = {
db.user = "invidious";
registration_enabled = false;
};
};
postgresql = {
enable = true;
package = pkgs.postgresql_15;
ensureDatabases = [ "dcbot" "hedgedoc" "todos" "gitea" ];
ensureUsers = [
{
name = "hedgedoc";
ensureDBOwnership = true;
}
{
name = "gitea";
ensureDBOwnership = true;
}
];
authentication = lib.mkForce ''
#type database DBuser auth-method
local all all trust
'';
};
restic.backups = {
minecraft-backup = {
initialize = true;
environmentFile =
config.age.secrets."restic/minecraft-environment-file".path;
repositoryFile = config.age.secrets."restic/minecraft-repository".path;
passwordFile = config.age.secrets."restic/minecraft-password".path;
paths = [ "/var/lib/minecraft/world" ];
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
};
hedgedoc-database-backup = {
initialize = true;
environmentFile =
config.age.secrets."restic/hedgedoc-environment-file".path;
repositoryFile = config.age.secrets."restic/hedgedoc-repository".path;
passwordFile = config.age.secrets."restic/hedgedoc-password".path;
paths =
[ "/var/lib/hedgedoc/uploads" "/var/lib/hedgedoc/hedgedoc.dump" ];
backupPrepareCommand = ''
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc hedgedoc > /var/lib/hedgedoc/hedgedoc.dump
'';
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
};
todos-database-backup = {
initialize = true;
environmentFile =
config.age.secrets."restic/todos-environment-file".path;
repositoryFile = config.age.secrets."restic/todos-repository".path;
passwordFile = config.age.secrets."restic/todos-password".path;
paths = [ "/var/lib/todos.dump" ];
backupPrepareCommand = ''
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc todos > /var/lib/todos.dump
'';
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
};
discord-bot-database-backup = {
initialize = true;
environmentFile =
config.age.secrets."restic/discord-bot-environment-file".path;
repositoryFile =
config.age.secrets."restic/discord-bot-repository".path;
passwordFile = config.age.secrets."restic/discord-bot-password".path;
paths = [ "/var/lib/dcbot.dump" ];
backupPrepareCommand = ''
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc dcbot > /var/lib/dcbot.dump
'';
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
};
};
};
security = {
acme = {
acceptTerms = true;
defaults.email = "thilo.hohlt@tutanota.com";
};
};
systemd.services = {
todoapp = {
description = "Todo application to plan your daily tasks effectively";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
Environment =
"PORT=5173 DOTENV_CONFIG_PATH=${config.age.secrets.todos-environment-file.path}";
ExecStart = "${pkgs.nodejs_20}/bin/node -r dotenv/config .";
WorkingDirectory = inputs.todos.packages.${pkgs.system}.default;
Restart = "always";
};
};
todoapp-check-due-dates = {
description =
"Set is_overdue for todo in database to true if todo is overdue";
wantedBy = [ "timers.target" ];
path = [ pkgs.postgresql_15 ];
script = ''
psql -d todos -c "UPDATE user_todo SET is_overdue = true WHERE DATE_TRUNC('day', NOW() AT TIME ZONE 'CET') > due_date AND is_completed = false AND is_overdue = false"
'';
serviceConfig = { User = "postgres"; };
partOf = [ "todoapp.service" ];
startAt = "daily";
};
denbot = {
description = "Thilo's Den discord bot";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "simple";
ExecStartPre = [
"${pkgs.nodejs_20}/bin/node dbInit.js"
"${pkgs.nodejs_20}/bin/node deploy-commands.js --token=${config.age.secrets.discord-bot-token.path} --clientId=1142441791459704912"
];
ExecStart =
"${pkgs.nodejs_20}/bin/node index.js --token=${config.age.secrets.discord-bot-token.path}";
WorkingDirectory = inputs.denbot.packages.${pkgs.system}.default;
Restart = "always";
};
};
};
users.users.thiloho.openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMkvr+vT7Ik0fjquxb9xQBfVVWJPgrfC+vJZsyG2V+/G thiloho@pc"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ5jOELdhQ85uKV8l2QkbLhjdPr142p1AmPzpawaJ7ws thiloho@laptop"
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA2jCxyYIisj7/tFdFewdCvxMHk3fNDkL8cFjowub7wV thiloho@pixelphone"
];
home-manager.users.thiloho = { pkgs, lib, ... }: {
home = { stateVersion = "23.05"; };
};
system.stateVersion = "23.05";
}

View File

@@ -1,36 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
boot.initrd.availableKernelModules =
[ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ ];
boot.extraModulePackages = [ ];
fileSystems."/" = {
device = "/dev/disk/by-uuid/950d0289-1ae9-4c4b-8792-3f369e2d0f05";
fsType = "ext4";
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/08B5-9946";
fsType = "vfat";
};
swapDevices =
[{ device = "/dev/disk/by-uuid/d3ecc375-0371-4391-ad48-b79168737ec7"; }];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
}

View File

@@ -55,8 +55,9 @@
programs = { programs = {
firefox = { firefox = {
enable = true; enable = true;
package = package = pkgs.firefox-devedition.override {
pkgs.firefox-devedition.override { cfg = { speechSynthesisSupport = true; }; }; cfg = { speechSynthesisSupport = true; };
};
}; };
chromium = { chromium = {
enable = true; enable = true;

View File

@@ -1,4 +1,4 @@
{ inputs, pkgs, ... }: { pkgs, ... }:
{ {
boot = { boot = {
@@ -30,11 +30,8 @@
enable = true; enable = true;
shellAliases = { shellAliases = {
rbs = "sudo nixos-rebuild switch --flake ."; rbs = "sudo nixos-rebuild switch --flake .";
off = "sudo systemctl poweroff";
cleanup = cleanup =
"nix store optimise && nix-collect-garbage -d && sudo nix store optimise && sudo nix-collect-garbage -d"; "nix store optimise && nix-collect-garbage -d && sudo nix store optimise && sudo nix-collect-garbage -d";
listboots =
"nix profile history --profile /nix/var/nix/profiles/system";
}; };
}; };
helix = { helix = {
@@ -43,6 +40,5 @@
settings.theme = "ayu_dark"; settings.theme = "ayu_dark";
}; };
}; };
home.packages = [ inputs.agenix.packages."x86_64-linux".default ];
}; };
} }

View File

@@ -1,9 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA GIWZXYxMprQgnKyf6eHbmdAbm2BQ8qmXcNOCx6xACAM
KxoFMCq6BqOW0ZL+mPz084AsrJiYwd65TQbT3lm5C7Q
-> ssh-ed25519 dRl0SQ 0lwzyhATdftLsGB+9yk3MWIjROdVDNiXUZ3zlSGMtXQ
C1PQpcq6mftSr9nWP7wteHQnK4/jNEzWBDPrVdlYg5Q
-> H\-grease ika_t} ('9'r F[ z6"b$
FjkIPhH4Cd1a
--- ERGBSp2uqfpO5fYXK8QfCmM6MOb2oGJ/PchtAV4INdA
7<EFBFBD><EFBFBD><1E>><3E>q<EFBFBD><02> bk<><6B><EFBFBD>q>$<24><>[<5B><<<+뺣w <0B><><18>rt<72>;u<>_R<08><>(<28><>0za.<2E>ɼ<7F><C9BC><EFBFBD>4f<34>,<2C>y<EFBFBD>kk<6B>7<EFBFBD><37><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ļ<EFBFBD><C4BC><EFBFBD>5<EFBFBD>ߋޮW<DEAE>7!

View File

@@ -1,10 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA ch9l8hAmzPcDLcDqgHx7CvEHya5Cc+W6WPG5NFWVWAg
T+Mb5yxPCSo32EKbpxj/Ll8reLe4sosTd9ENjYV3B0c
-> ssh-ed25519 dRl0SQ lPdA7HcBt03GR/EYXs+9N2gPMwEksgQKCSEJHiUYnAU
QXruj7Ao1Tap/ai5JYOmxBjIYvocmMYVX2GuCyxSqdI
-> SN)(9z-grease CF C B!|*qlm
GobRjNqLfEwntbsGa3MpYqYFqkh80ZmtmXVesUKTjAaykeon9mGkW6cI3weL91Dp
Jyk5IF10fScpCERAqgUCMPkQ56oFtGESwnZUILqeKIk0QWAZMJWtkBse+AqizX8
--- LTF3BpAb4BipCsqr+igNNnu3Guc1JBIgczy5+0S8W4Q
<EFBFBD><EFBFBD>]<18><>[Y<>W<>F<EFBFBD>#<08><>p<EFBFBD>FYh@<40><>Ґ<EFBFBD>|<7C><><EFBFBD>򈪮<EFBFBD><F288AAAE>]<5D>;V]q<><71>e<EFBFBD>w

View File

@@ -1,10 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA lQ3x2Yje/1js+SYkhWvkDtglDMOJySt8FyW+FfQY4Es
DfJ3VW7sIx9W7PaLxWod+GSMvYL2763QtI9EJ1Kxt90
-> ssh-ed25519 dRl0SQ iTLFTejTbILB/obvLiQB9vAVYBzqTAWaQFtU1iSFwAc
/d5xXO4FH57DZQ1bpOom6aX5uujD1SUIpXC9W5u/EKo
-> aHYOr}px-grease z x
ElchruvBqkjNuIDKNjIniZulfDwSc/0zvZDpmIUCjVk2jj2z/Cty0A6yRhDMpr7s
/S5arjCA2zk
--- V3FO3trpSDAmwYqDqiS50rzGT6WlOvb5irsfkTSabdY
Gf<EFBFBD><EFBFBD><1F><><EFBFBD>q<EFBFBD><71><EFBFBD>i \v~'<27><><EFBFBD>nr<6E><72>4<02>!<21><<3C><><EFBFBD><EFBFBD>9f<39><66><20><><EFBFBD>8-<2D>e<><65><EFBFBD>

View File

@@ -1,9 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA 4ZzMfDC10jWotfzunUhNdhMg3WPGztmKK2cVQKE9H0Q
9To1L2Zev0U9beZfrc563fliqm0dsQKRaWwOqzBT7Wk
-> ssh-ed25519 dRl0SQ I0l8bUdxSGFB0gcygz0FocuHbrDTJuQuyo8zu++AJns
daSQ3vwjjYfMl9x+gn+Nzr9klIEE8x2+9Zkos7aY5sA
-> ss#ACz=}-grease Xvlm; 1 @A
ou2BEyCRjko
--- KMysJrselsTKj8YQYe3VYdn3MzPFhTnnFAfLexvohIo
<EFBFBD><EFBFBD><07><><10>:<3A>h<>ZV<5A>ɅOCEЊE<><45><07><07><>ѓ<<3C>U<EFBFBD><55>aW<61>z |<7C>

View File

@@ -1,10 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA /9d1EdSTGvjj391MhHmCi34WcSd4YohJuE13f5Gqo24
BKFoKgiorkWk/J7LsRe14FeuAh8zcVPElOY1Ifapv1Y
-> ssh-ed25519 dRl0SQ BthbYG+p4HcrqcOxpc09n/Fo5OCUKfvVzhvcA3TslCQ
vapeXaR+9hu+eZecYchKxgFy9fSEiMzzpZliMGYx55c
-> V"-grease XZ7z!A^ cxOP:.6
z9ZbjqFMkBkGCylTNl9dt/5lshUV7kEvdMArCZH+Qc2pAULo6hctOO2sxvqeN9SG
7MlLRz/xhKB+jcxj5dD46LlneS6+dYQ49McCW1YA1l3dIlIVgi8KT0sVlw
--- Ylmc2BDrLW+jcmDs7bbeY3O9d+PjZ33Bs9gb2N7t7ww
O<EFBFBD><EFBFBD>6<EFBFBD>η<EFBFBD>SM<EFBFBD>`<60>+qQ<>W<EFBFBD><57>֠<EFBFBD>x<EFBFBD>k<EFBFBD><6B><EFBFBD>pv<70><76>Oc<4F> <0C><>[9<><39><EFBFBD>#<23>e<EFBFBD>t><3E><><EFBFBD><EFBFBD>Q<01><><EFBFBD><EFBFBD>Nl<4E><6C><11>

View File

@@ -1,10 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA 7KNI9wfwXEFEERfqr3YlNi3ZxaUVI3pk4dwzRRyr2G8
TGrNsb6pFzt3lUzCHScrZPdHvDGqvS8nZk0hZN1uU2g
-> ssh-ed25519 dRl0SQ BKqszxsI3ceZkzkNU07MKyF/lpknDgWEymAVkmHJLXA
XIVsjB6jDccNpACZtFyuUo5XpWs5A6lA3BNSbh+6Qlg
-> 31Zf-grease wB]Jb6x 3 2IrizaM N
QA2dGpOzD9vBzjNwbtYX
--- Tv3WURbEvNjLuG2NAjTk7EtpyvlXYvesK/35I7Omkq8
Z<><5A> <0B><>g<EFBFBD> <0C><1E>$N<>4S#X<>,<2C><10><><EFBFBD><EFBFBD><15><>z<EFBFBD><7A><EFBFBD>
'<27><>$3<1C><><EFBFBD><EFBFBD><EFBFBD>J<EFBFBD><4A>

View File

@@ -1,11 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA wvUcfFupWO5SAjQAEPgsnzA/X9sZs1OKOtj2TbklwmU
4ALAG2v7XDtmfxzMYPHWVpsS+AJjPClV6JXd1UShdJY
-> ssh-ed25519 dRl0SQ +5YXwSUS1Sjm2m2ekhP9kQEUw8NId1WzMPg3PZ+3cQk
39p6XM4GzHM8azI7yq+o1REscLv/10zRQsGtbLsa9b4
-> 0+6U-grease V;Z uy r*_k
Vkn3nufoGWiL2JadGeBB5WV7VnFeiKgC27sL5HBimNuk4q1K6zRG+mZcgFYs/N+r
alQKxZe7BB3mUCrCbv12rtJRSXqcx3wXOri+t+ERljO5r5j+4x0EBRru2Gw
--- c0FP/81ZSdLz7nwnjPA+ZDB515CUm7sYkvv4EQBbsMA
9<>I<>}h<><68><1B><>kw쯱<77>t<EFBFBD>NS^<5E>1%<25>ɩ<><C9A9><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>cN_<4E><5F><EFBFBD><EFBFBD><EFBFBD>nA<6E>
<EFBFBD><EFBFBD>

View File

@@ -1,9 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA e5rW7H9HgvaH+pBahXl0NVLHauyTiMJZ09Y25uE7oFU
iZf1dOAdiXMhL6X6Wz9F+Qjn1gOkOIRGkpd5FkNKmJA
-> ssh-ed25519 dRl0SQ o22AeR8iBA2BqiBoR1bBzEJ4VUK7l3li7W0/CxpfaWQ
glw7c+VY2hWOOfPaGt1dTGXOMovZ4L6FHELNLqsYpgM
-> I:-grease QNX|`\ `,>k[ z!/ajk} ~OE
IDHem1mSEg
--- K5e+NoqGSWtZ0iwNiWviniiORG0yT0qvf/xoqIxofiw
Q<01>0C<30><43><EFBFBD><EFBFBD>`<60><><EFBFBD><EFBFBD><EFBFBD> ٭<><D9AD>|X<>ydb<64>73<37><33>`x%<25>ƺ<EFBFBD>{

Binary file not shown.

View File

@@ -1,11 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 owVgDA LAiIoN6jO47UdnkN2rZiayFuYNLDzvPYTrBIcyoNego
t0O3SjuBGqWl7apz8LIdemxWIOYgJtml0uTpihbu+UY
-> ssh-ed25519 dRl0SQ YB735jB9c4KHDcoPL9AdgDWlJ01MDzioenShpCEuSHw
ePM/LJ5b3Lc6mH8sYSEgnw40cHpxcSBLTT+BRThPc8o
-> sf;0zl-grease \R8 XL!~>Q#
vqybxsDF6ttWkv27cUrFrrpToAmTvq03nDYiMEYO5OA8n8tIN5HVri7hxJOVCLwJ
5TkgdX2a+JiODe0vM8Tp3UaQIHeyuQA8FzMhowJ5gY+3vNtiJvxa/XZeQ/gsx//4
5w
--- 48SbG3pL8jLUA3EteqZ3AC3s8gC84VHgfrxnUqCpeX8
x<EFBFBD>t{<7B><>ׂ$%z<>V<EFBFBD><56><EFBFBD><EFBFBD><EFBFBD>۵<EFBFBD>U<EFBFBD><55>Վ-<05><01>.<2E>|<15>>ǪM<04>5<EFBFBD><35>' Z<><5A><EFBFBD><EFBFBD>X;K)ƙ2<C699><32>|<7C>i

View File

@@ -1,22 +0,0 @@
let
server =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN82ukcaWQZcihgh+n0h+ihwTafm64SO1wngibOA6Vro root@server";
pc =
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMkvr+vT7Ik0fjquxb9xQBfVVWJPgrfC+vJZsyG2V+/G thiloho@pc";
in {
"hedgedoc-environment-file.age".publicKeys = [ server pc ];
"discord-bot-token.age".publicKeys = [ server pc ];
"todos-environment-file.age".publicKeys = [ server pc ];
"restic/minecraft-password.age".publicKeys = [ server pc ];
"restic/minecraft-environment-file.age".publicKeys = [ server pc ];
"restic/minecraft-repository.age".publicKeys = [ server pc ];
"restic/hedgedoc-password.age".publicKeys = [ server pc ];
"restic/hedgedoc-environment-file.age".publicKeys = [ server pc ];
"restic/hedgedoc-repository.age".publicKeys = [ server pc ];
"restic/todos-password.age".publicKeys = [ server pc ];
"restic/todos-environment-file.age".publicKeys = [ server pc ];
"restic/todos-repository.age".publicKeys = [ server pc ];
"restic/discord-bot-password.age".publicKeys = [ server pc ];
"restic/discord-bot-environment-file.age".publicKeys = [ server pc ];
"restic/discord-bot-repository.age".publicKeys = [ server pc ];
}

Binary file not shown.