mirror of
https://github.com/thiloho/nixos-config.git
synced 2025-11-22 03:21:35 +01:00
Remove server files
This commit is contained in:
21
flake.nix
21
flake.nix
@@ -8,26 +8,6 @@
|
||||
url = "github:nix-community/home-manager";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
website = {
|
||||
url = "github:thiloho/website";
|
||||
flake = false;
|
||||
};
|
||||
aurora-blog-template = {
|
||||
url = "github:thiloho/aurora";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
denbot = {
|
||||
url = "github:thiloho/discord-bot";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
todos = {
|
||||
url = "github:thiloho/todos";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
agenix = {
|
||||
url = "github:ryantm/agenix";
|
||||
inputs.nixpkgs.follows = "nixpkgs";
|
||||
};
|
||||
};
|
||||
|
||||
outputs = inputs@{ nixpkgs, home-manager, ... }: {
|
||||
@@ -51,7 +31,6 @@
|
||||
in {
|
||||
pc = mkSystem ./nixos-configurations/pc;
|
||||
laptop = mkSystem ./nixos-configurations/laptop;
|
||||
server = mkSystem ./nixos-configurations/server;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
{ config, pkgs, inputs, ... }:
|
||||
{ inputs, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
@@ -12,13 +12,7 @@
|
||||
|
||||
home-manager.users.thiloho = { pkgs, ... }: {
|
||||
programs.git.signing.key = "BFD8F6A55B1E4F11";
|
||||
home = {
|
||||
packages = with pkgs;
|
||||
[
|
||||
# ciscoPacketTracer8
|
||||
];
|
||||
stateVersion = "23.05";
|
||||
};
|
||||
home = { stateVersion = "23.05"; };
|
||||
};
|
||||
system.stateVersion = "23.05";
|
||||
}
|
||||
|
||||
@@ -4,28 +4,26 @@
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports =
|
||||
[ (modulesPath + "/installer/scan/not-detected.nix")
|
||||
];
|
||||
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "xhci_pci" "nvme" "usb_storage" "sd_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ "kvm-intel" ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" =
|
||||
{ device = "/dev/disk/by-uuid/c930419a-6c2f-452a-9e58-c92979ab8f3d";
|
||||
fsType = "ext4";
|
||||
};
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/c930419a-6c2f-452a-9e58-c92979ab8f3d";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" =
|
||||
{ device = "/dev/disk/by-uuid/EF76-673F";
|
||||
fsType = "vfat";
|
||||
};
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/EF76-673F";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[ { device = "/dev/disk/by-uuid/5ec2362b-c256-4097-8d48-5460002d0978"; }
|
||||
];
|
||||
[{ device = "/dev/disk/by-uuid/5ec2362b-c256-4097-8d48-5460002d0978"; }];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
@@ -36,5 +34,6 @@
|
||||
# networking.interfaces.wlp3s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
hardware.cpu.intel.updateMicrocode =
|
||||
lib.mkDefault config.hardware.enableRedistributableFirmware;
|
||||
}
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
{ pkgs, inputs, lib, ... }:
|
||||
{ inputs, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
|
||||
@@ -1,294 +0,0 @@
|
||||
{ inputs, pkgs, config, lib, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
inputs.agenix.nixosModules.default
|
||||
./hardware-configuration.nix
|
||||
../shared.nix
|
||||
];
|
||||
|
||||
nix.settings.trusted-users = [ "thiloho" ];
|
||||
|
||||
age.secrets = {
|
||||
hedgedoc-environment-file.file =
|
||||
../../secrets/hedgedoc-environment-file.age;
|
||||
discord-bot-token.file = ../../secrets/discord-bot-token.age;
|
||||
todos-environment-file.file = ../../secrets/todos-environment-file.age;
|
||||
"restic/minecraft-environment-file".file =
|
||||
../../secrets/restic/minecraft-environment-file.age;
|
||||
"restic/minecraft-repository".file =
|
||||
../../secrets/restic/minecraft-repository.age;
|
||||
"restic/minecraft-password".file =
|
||||
../../secrets/restic/minecraft-password.age;
|
||||
"restic/hedgedoc-environment-file".file =
|
||||
../../secrets/restic/hedgedoc-environment-file.age;
|
||||
"restic/hedgedoc-repository".file =
|
||||
../../secrets/restic/hedgedoc-repository.age;
|
||||
"restic/hedgedoc-password".file =
|
||||
../../secrets/restic/hedgedoc-password.age;
|
||||
"restic/todos-environment-file".file =
|
||||
../../secrets/restic/todos-environment-file.age;
|
||||
"restic/todos-repository".file = ../../secrets/restic/todos-repository.age;
|
||||
"restic/todos-password".file = ../../secrets/restic/todos-password.age;
|
||||
"restic/discord-bot-environment-file".file =
|
||||
../../secrets/restic/discord-bot-environment-file.age;
|
||||
"restic/discord-bot-repository".file =
|
||||
../../secrets/restic/discord-bot-repository.age;
|
||||
"restic/discord-bot-password".file =
|
||||
../../secrets/restic/discord-bot-password.age;
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [ nodejs_20 ];
|
||||
|
||||
networking = {
|
||||
hostName = "server";
|
||||
firewall = {
|
||||
allowedTCPPorts = [ 80 443 25565 3232 ];
|
||||
allowedUDPPorts = [ 80 443 25565 3232 ];
|
||||
};
|
||||
};
|
||||
|
||||
services = {
|
||||
openssh = {
|
||||
enable = true;
|
||||
settings.PasswordAuthentication = false;
|
||||
};
|
||||
minecraft-server = {
|
||||
enable = true;
|
||||
eula = true;
|
||||
declarative = true;
|
||||
openFirewall = true;
|
||||
whitelist = {
|
||||
thilo_ho = "4e4d744d-7748-46bc-add8-b3e8ca3b4cf5";
|
||||
Liaxswan = "ccbf3468-a6b4-4d7b-9837-5a2451deca79";
|
||||
};
|
||||
serverProperties = {
|
||||
difficulty = 3;
|
||||
max-players = 10;
|
||||
motd = "Thilo's SMP";
|
||||
white-list = true;
|
||||
};
|
||||
};
|
||||
nginx = {
|
||||
enable = true;
|
||||
recommendedProxySettings = true;
|
||||
recommendedTlsSettings = true;
|
||||
virtualHosts = {
|
||||
"thilohohlt.com" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
root = inputs.website;
|
||||
};
|
||||
"aurora.thilohohlt.com" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
root = inputs.aurora-blog-template.packages.${pkgs.system}.default;
|
||||
};
|
||||
"collab.thilohohlt.com" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/".proxyPass = "http://localhost:3300";
|
||||
locations."/socket.io/" = {
|
||||
proxyPass = "http://localhost:3300";
|
||||
proxyWebsockets = true;
|
||||
extraConfig = "proxy_ssl_server_name on;";
|
||||
};
|
||||
};
|
||||
"todos.thilohohlt.com" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/".proxyPass = "http://localhost:5173";
|
||||
};
|
||||
"git.thilohohlt.com" = {
|
||||
enableACME = true;
|
||||
forceSSL = true;
|
||||
locations."/".proxyPass = "http://localhost:3001";
|
||||
};
|
||||
};
|
||||
};
|
||||
hedgedoc = {
|
||||
enable = true;
|
||||
settings = {
|
||||
port = 3300;
|
||||
domain = "collab.thilohohlt.com";
|
||||
db = {
|
||||
dialect = "postgres";
|
||||
host = "/run/postgresql";
|
||||
database = "hedgedoc";
|
||||
};
|
||||
protocolUseSSL = true;
|
||||
allowAnonymous = false;
|
||||
allowEmailRegister = false;
|
||||
email = false;
|
||||
};
|
||||
environmentFile = config.age.secrets.hedgedoc-environment-file.path;
|
||||
};
|
||||
gitea = {
|
||||
enable = true;
|
||||
appName = "Gitea instance of Thilo";
|
||||
database = {
|
||||
type = "postgres";
|
||||
host = "/run/postgresql";
|
||||
};
|
||||
settings.service.DISABLE_REGISTRATION = true;
|
||||
settings.server = {
|
||||
DOMAIN = "thilohohlt.com";
|
||||
ROOT_URL = "https://git.thilohohlt.com";
|
||||
HTTP_PORT = 3001;
|
||||
};
|
||||
};
|
||||
invidious = {
|
||||
enable = true;
|
||||
port = 3232;
|
||||
domain = "invidious.thilohohlt.com";
|
||||
nginx.enable = true;
|
||||
settings = {
|
||||
db.user = "invidious";
|
||||
registration_enabled = false;
|
||||
};
|
||||
};
|
||||
postgresql = {
|
||||
enable = true;
|
||||
package = pkgs.postgresql_15;
|
||||
ensureDatabases = [ "dcbot" "hedgedoc" "todos" "gitea" ];
|
||||
ensureUsers = [
|
||||
{
|
||||
name = "hedgedoc";
|
||||
ensureDBOwnership = true;
|
||||
}
|
||||
{
|
||||
name = "gitea";
|
||||
ensureDBOwnership = true;
|
||||
}
|
||||
];
|
||||
authentication = lib.mkForce ''
|
||||
#type database DBuser auth-method
|
||||
local all all trust
|
||||
'';
|
||||
};
|
||||
restic.backups = {
|
||||
minecraft-backup = {
|
||||
initialize = true;
|
||||
|
||||
environmentFile =
|
||||
config.age.secrets."restic/minecraft-environment-file".path;
|
||||
repositoryFile = config.age.secrets."restic/minecraft-repository".path;
|
||||
passwordFile = config.age.secrets."restic/minecraft-password".path;
|
||||
|
||||
paths = [ "/var/lib/minecraft/world" ];
|
||||
|
||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
|
||||
};
|
||||
hedgedoc-database-backup = {
|
||||
initialize = true;
|
||||
|
||||
environmentFile =
|
||||
config.age.secrets."restic/hedgedoc-environment-file".path;
|
||||
repositoryFile = config.age.secrets."restic/hedgedoc-repository".path;
|
||||
passwordFile = config.age.secrets."restic/hedgedoc-password".path;
|
||||
|
||||
paths =
|
||||
[ "/var/lib/hedgedoc/uploads" "/var/lib/hedgedoc/hedgedoc.dump" ];
|
||||
|
||||
backupPrepareCommand = ''
|
||||
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc hedgedoc > /var/lib/hedgedoc/hedgedoc.dump
|
||||
'';
|
||||
|
||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
|
||||
};
|
||||
todos-database-backup = {
|
||||
initialize = true;
|
||||
|
||||
environmentFile =
|
||||
config.age.secrets."restic/todos-environment-file".path;
|
||||
repositoryFile = config.age.secrets."restic/todos-repository".path;
|
||||
passwordFile = config.age.secrets."restic/todos-password".path;
|
||||
|
||||
paths = [ "/var/lib/todos.dump" ];
|
||||
|
||||
backupPrepareCommand = ''
|
||||
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc todos > /var/lib/todos.dump
|
||||
'';
|
||||
|
||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
|
||||
};
|
||||
discord-bot-database-backup = {
|
||||
initialize = true;
|
||||
|
||||
environmentFile =
|
||||
config.age.secrets."restic/discord-bot-environment-file".path;
|
||||
repositoryFile =
|
||||
config.age.secrets."restic/discord-bot-repository".path;
|
||||
passwordFile = config.age.secrets."restic/discord-bot-password".path;
|
||||
|
||||
paths = [ "/var/lib/dcbot.dump" ];
|
||||
|
||||
backupPrepareCommand = ''
|
||||
${config.services.postgresql.package}/bin/pg_dump -U postgres -Fc dcbot > /var/lib/dcbot.dump
|
||||
'';
|
||||
|
||||
pruneOpts = [ "--keep-daily 7" "--keep-weekly 5" "--keep-monthly 12" ];
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
security = {
|
||||
acme = {
|
||||
acceptTerms = true;
|
||||
defaults.email = "thilo.hohlt@tutanota.com";
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services = {
|
||||
todoapp = {
|
||||
description = "Todo application to plan your daily tasks effectively";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
Environment =
|
||||
"PORT=5173 DOTENV_CONFIG_PATH=${config.age.secrets.todos-environment-file.path}";
|
||||
ExecStart = "${pkgs.nodejs_20}/bin/node -r dotenv/config .";
|
||||
WorkingDirectory = inputs.todos.packages.${pkgs.system}.default;
|
||||
Restart = "always";
|
||||
};
|
||||
};
|
||||
todoapp-check-due-dates = {
|
||||
description =
|
||||
"Set is_overdue for todo in database to true if todo is overdue";
|
||||
wantedBy = [ "timers.target" ];
|
||||
path = [ pkgs.postgresql_15 ];
|
||||
script = ''
|
||||
psql -d todos -c "UPDATE user_todo SET is_overdue = true WHERE DATE_TRUNC('day', NOW() AT TIME ZONE 'CET') > due_date AND is_completed = false AND is_overdue = false"
|
||||
'';
|
||||
serviceConfig = { User = "postgres"; };
|
||||
partOf = [ "todoapp.service" ];
|
||||
startAt = "daily";
|
||||
};
|
||||
denbot = {
|
||||
description = "Thilo's Den discord bot";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig = {
|
||||
Type = "simple";
|
||||
ExecStartPre = [
|
||||
"${pkgs.nodejs_20}/bin/node dbInit.js"
|
||||
"${pkgs.nodejs_20}/bin/node deploy-commands.js --token=${config.age.secrets.discord-bot-token.path} --clientId=1142441791459704912"
|
||||
];
|
||||
ExecStart =
|
||||
"${pkgs.nodejs_20}/bin/node index.js --token=${config.age.secrets.discord-bot-token.path}";
|
||||
WorkingDirectory = inputs.denbot.packages.${pkgs.system}.default;
|
||||
Restart = "always";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
users.users.thiloho.openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMkvr+vT7Ik0fjquxb9xQBfVVWJPgrfC+vJZsyG2V+/G thiloho@pc"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ5jOELdhQ85uKV8l2QkbLhjdPr142p1AmPzpawaJ7ws thiloho@laptop"
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA2jCxyYIisj7/tFdFewdCvxMHk3fNDkL8cFjowub7wV thiloho@pixelphone"
|
||||
];
|
||||
|
||||
home-manager.users.thiloho = { pkgs, lib, ... }: {
|
||||
home = { stateVersion = "23.05"; };
|
||||
};
|
||||
system.stateVersion = "23.05";
|
||||
}
|
||||
@@ -1,36 +0,0 @@
|
||||
# Do not modify this file! It was generated by ‘nixos-generate-config’
|
||||
# and may be overwritten by future invocations. Please make changes
|
||||
# to /etc/nixos/configuration.nix instead.
|
||||
{ config, lib, pkgs, modulesPath, ... }:
|
||||
|
||||
{
|
||||
imports = [ (modulesPath + "/profiles/qemu-guest.nix") ];
|
||||
|
||||
boot.initrd.availableKernelModules =
|
||||
[ "ahci" "xhci_pci" "virtio_pci" "virtio_scsi" "sd_mod" "sr_mod" ];
|
||||
boot.initrd.kernelModules = [ ];
|
||||
boot.kernelModules = [ ];
|
||||
boot.extraModulePackages = [ ];
|
||||
|
||||
fileSystems."/" = {
|
||||
device = "/dev/disk/by-uuid/950d0289-1ae9-4c4b-8792-3f369e2d0f05";
|
||||
fsType = "ext4";
|
||||
};
|
||||
|
||||
fileSystems."/boot" = {
|
||||
device = "/dev/disk/by-uuid/08B5-9946";
|
||||
fsType = "vfat";
|
||||
};
|
||||
|
||||
swapDevices =
|
||||
[{ device = "/dev/disk/by-uuid/d3ecc375-0371-4391-ad48-b79168737ec7"; }];
|
||||
|
||||
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
|
||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||
# still possible to use this option, but it's recommended to use it in conjunction
|
||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||
networking.useDHCP = lib.mkDefault true;
|
||||
# networking.interfaces.enp1s0.useDHCP = lib.mkDefault true;
|
||||
|
||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||
}
|
||||
@@ -55,8 +55,9 @@
|
||||
programs = {
|
||||
firefox = {
|
||||
enable = true;
|
||||
package =
|
||||
pkgs.firefox-devedition.override { cfg = { speechSynthesisSupport = true; }; };
|
||||
package = pkgs.firefox-devedition.override {
|
||||
cfg = { speechSynthesisSupport = true; };
|
||||
};
|
||||
};
|
||||
chromium = {
|
||||
enable = true;
|
||||
|
||||
@@ -1,4 +1,4 @@
|
||||
{ inputs, pkgs, ... }:
|
||||
{ pkgs, ... }:
|
||||
|
||||
{
|
||||
boot = {
|
||||
@@ -30,11 +30,8 @@
|
||||
enable = true;
|
||||
shellAliases = {
|
||||
rbs = "sudo nixos-rebuild switch --flake .";
|
||||
off = "sudo systemctl poweroff";
|
||||
cleanup =
|
||||
"nix store optimise && nix-collect-garbage -d && sudo nix store optimise && sudo nix-collect-garbage -d";
|
||||
listboots =
|
||||
"nix profile history --profile /nix/var/nix/profiles/system";
|
||||
};
|
||||
};
|
||||
helix = {
|
||||
@@ -43,6 +40,5 @@
|
||||
settings.theme = "ayu_dark";
|
||||
};
|
||||
};
|
||||
home.packages = [ inputs.agenix.packages."x86_64-linux".default ];
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,9 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA GIWZXYxMprQgnKyf6eHbmdAbm2BQ8qmXcNOCx6xACAM
|
||||
KxoFMCq6BqOW0ZL+mPz084AsrJiYwd65TQbT3lm5C7Q
|
||||
-> ssh-ed25519 dRl0SQ 0lwzyhATdftLsGB+9yk3MWIjROdVDNiXUZ3zlSGMtXQ
|
||||
C1PQpcq6mftSr9nWP7wteHQnK4/jNEzWBDPrVdlYg5Q
|
||||
-> H\-grease ika_t} ('9'r F[ z6"b$
|
||||
FjkIPhH4Cd1a
|
||||
--- ERGBSp2uqfpO5fYXK8QfCmM6MOb2oGJ/PchtAV4INdA
|
||||
7<EFBFBD><EFBFBD><1E>扷><3E>q<EFBFBD><02>bk<><6B><EFBFBD>q>$<24><>[<5B><<<+뺣w<0B><><18>rt<72>;u<>_R<08><>(<28><>0za.<2E>ɼ<7F><C9BC><EFBFBD>4f<34>,<2C>y<EFBFBD>kk<6B>7<EFBFBD><37><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>ļ<EFBFBD><C4BC><EFBFBD>5<EFBFBD>ߋޮW<DEAE>7!
|
||||
Binary file not shown.
Binary file not shown.
@@ -1,10 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA ch9l8hAmzPcDLcDqgHx7CvEHya5Cc+W6WPG5NFWVWAg
|
||||
T+Mb5yxPCSo32EKbpxj/Ll8reLe4sosTd9ENjYV3B0c
|
||||
-> ssh-ed25519 dRl0SQ lPdA7HcBt03GR/EYXs+9N2gPMwEksgQKCSEJHiUYnAU
|
||||
QXruj7Ao1Tap/ai5JYOmxBjIYvocmMYVX2GuCyxSqdI
|
||||
-> SN)(9z-grease CF C B!|*qlm
|
||||
GobRjNqLfEwntbsGa3MpYqYFqkh80ZmtmXVesUKTjAaykeon9mGkW6cI3weL91Dp
|
||||
Jyk5IF10fScpCERAqgUCMPkQ56oFtGESwnZUILqeKIk0QWAZMJWtkBse+AqizX8
|
||||
--- LTF3BpAb4BipCsqr+igNNnu3Guc1JBIgczy5+0S8W4Q
|
||||
<EFBFBD><EFBFBD>]<18><>[Y<>W<>F<EFBFBD>#<08><>p<EFBFBD>FYh@<40><>Ґ<EFBFBD>|<7C><><EFBFBD><EFBFBD><F288AAAE>]<5D>;V]q<><71>e<EFBFBD>w
|
||||
@@ -1,10 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA lQ3x2Yje/1js+SYkhWvkDtglDMOJySt8FyW+FfQY4Es
|
||||
DfJ3VW7sIx9W7PaLxWod+GSMvYL2763QtI9EJ1Kxt90
|
||||
-> ssh-ed25519 dRl0SQ iTLFTejTbILB/obvLiQB9vAVYBzqTAWaQFtU1iSFwAc
|
||||
/d5xXO4FH57DZQ1bpOom6aX5uujD1SUIpXC9W5u/EKo
|
||||
-> aHYOr}px-grease z x
|
||||
ElchruvBqkjNuIDKNjIniZulfDwSc/0zvZDpmIUCjVk2jj2z/Cty0A6yRhDMpr7s
|
||||
/S5arjCA2zk
|
||||
--- V3FO3trpSDAmwYqDqiS50rzGT6WlOvb5irsfkTSabdY
|
||||
Gf<EFBFBD><EFBFBD><1F><><EFBFBD>q<EFBFBD><71><EFBFBD>i \v~'<27><><EFBFBD>nr<6E><72>4<02>!<21><<3C><><EFBFBD><EFBFBD>9f<39><66>YŽ <20><><EFBFBD>8-<2D>e<><65><EFBFBD>
|
||||
Binary file not shown.
@@ -1,9 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA 4ZzMfDC10jWotfzunUhNdhMg3WPGztmKK2cVQKE9H0Q
|
||||
9To1L2Zev0U9beZfrc563fliqm0dsQKRaWwOqzBT7Wk
|
||||
-> ssh-ed25519 dRl0SQ I0l8bUdxSGFB0gcygz0FocuHbrDTJuQuyo8zu++AJns
|
||||
daSQ3vwjjYfMl9x+gn+Nzr9klIEE8x2+9Zkos7aY5sA
|
||||
-> ss#ACz=}-grease Xvlm; 1 @A
|
||||
ou2BEyCRjko
|
||||
--- KMysJrselsTKj8YQYe3VYdn3MzPFhTnnFAfLexvohIo
|
||||
<EFBFBD><EFBFBD><07><><10>:<3A>h<>ZV<5A>ɅOCEЊE<><45><07><07><>ѓ<<3C>U<EFBFBD><55>aW<61>z |<7C>
|
||||
@@ -1,10 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA /9d1EdSTGvjj391MhHmCi34WcSd4YohJuE13f5Gqo24
|
||||
BKFoKgiorkWk/J7LsRe14FeuAh8zcVPElOY1Ifapv1Y
|
||||
-> ssh-ed25519 dRl0SQ BthbYG+p4HcrqcOxpc09n/Fo5OCUKfvVzhvcA3TslCQ
|
||||
vapeXaR+9hu+eZecYchKxgFy9fSEiMzzpZliMGYx55c
|
||||
-> V"-grease XZ7z!A^ cxOP:.6
|
||||
z9ZbjqFMkBkGCylTNl9dt/5lshUV7kEvdMArCZH+Qc2pAULo6hctOO2sxvqeN9SG
|
||||
7MlLRz/xhKB+jcxj5dD46LlneS6+dYQ49McCW1YA1l3dIlIVgi8KT0sVlw
|
||||
--- Ylmc2BDrLW+jcmDs7bbeY3O9d+PjZ33Bs9gb2N7t7ww
|
||||
O<EFBFBD><EFBFBD>6<EFBFBD>η<EFBFBD>SM<EFBFBD>`<60>+qQ<>W<EFBFBD><57>֠<EFBFBD>x<EFBFBD>k<EFBFBD><6B><EFBFBD>pv<70><76>Oc<4F><0C><>[9<><39><EFBFBD>#<23>e<EFBFBD>t><3E><><EFBFBD><EFBFBD>Q<01><><EFBFBD><EFBFBD>Nl<4E><6C><11>
|
||||
Binary file not shown.
@@ -1,10 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA 7KNI9wfwXEFEERfqr3YlNi3ZxaUVI3pk4dwzRRyr2G8
|
||||
TGrNsb6pFzt3lUzCHScrZPdHvDGqvS8nZk0hZN1uU2g
|
||||
-> ssh-ed25519 dRl0SQ BKqszxsI3ceZkzkNU07MKyF/lpknDgWEymAVkmHJLXA
|
||||
XIVsjB6jDccNpACZtFyuUo5XpWs5A6lA3BNSbh+6Qlg
|
||||
-> 31Zf-grease wB]Jb6x 3 2IrizaM N
|
||||
QA2dGpOzD9vBzjNwbtYX
|
||||
--- Tv3WURbEvNjLuG2NAjTk7EtpyvlXYvesK/35I7Omkq8
|
||||
Z<><5A><0B><>g<EFBFBD><0C><1E>$N<>4S#X<>,<2C><10><><EFBFBD><EFBFBD><15><>z<EFBFBD><7A><EFBFBD>
|
||||
'<27><>$3<1C><><EFBFBD><EFBFBD><EFBFBD>J<EFBFBD><4A>
|
||||
@@ -1,11 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA wvUcfFupWO5SAjQAEPgsnzA/X9sZs1OKOtj2TbklwmU
|
||||
4ALAG2v7XDtmfxzMYPHWVpsS+AJjPClV6JXd1UShdJY
|
||||
-> ssh-ed25519 dRl0SQ +5YXwSUS1Sjm2m2ekhP9kQEUw8NId1WzMPg3PZ+3cQk
|
||||
39p6XM4GzHM8azI7yq+o1REscLv/10zRQsGtbLsa9b4
|
||||
-> 0+6U-grease V;Z uy r*_k
|
||||
Vkn3nufoGWiL2JadGeBB5WV7VnFeiKgC27sL5HBimNuk4q1K6zRG+mZcgFYs/N+r
|
||||
alQKxZe7BB3mUCrCbv12rtJRSXqcx3wXOri+t+ERljO5r5j+4x0EBRru2Gw
|
||||
--- c0FP/81ZSdLz7nwnjPA+ZDB515CUm7sYkvv4EQBbsMA
|
||||
9<>I<>}h<><68><1B><>kw쯱<77>t<EFBFBD>NS^<5E>1%<25>ɩ<><C9A9><EFBFBD><EFBFBD><EFBFBD><EFBFBD><EFBFBD>PЩcN_<4E><5F><EFBFBD><EFBFBD><EFBFBD>nA<6E>
|
||||
<EFBFBD><EFBFBD>
|
||||
@@ -1,9 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA e5rW7H9HgvaH+pBahXl0NVLHauyTiMJZ09Y25uE7oFU
|
||||
iZf1dOAdiXMhL6X6Wz9F+Qjn1gOkOIRGkpd5FkNKmJA
|
||||
-> ssh-ed25519 dRl0SQ o22AeR8iBA2BqiBoR1bBzEJ4VUK7l3li7W0/CxpfaWQ
|
||||
glw7c+VY2hWOOfPaGt1dTGXOMovZ4L6FHELNLqsYpgM
|
||||
-> I:-grease QNX|`\ `,>k[ z!/ajk} ~OE
|
||||
IDHem1mSEg
|
||||
--- K5e+NoqGSWtZ0iwNiWviniiORG0yT0qvf/xoqIxofiw
|
||||
Q<01>0C<30><43><EFBFBD><EFBFBD>`<60><><EFBFBD><EFBFBD><EFBFBD> ٭<><D9AD>|X<>ydb<64>73<37><33>`x%<25>ƺ<EFBFBD>{
|
||||
Binary file not shown.
@@ -1,11 +0,0 @@
|
||||
age-encryption.org/v1
|
||||
-> ssh-ed25519 owVgDA LAiIoN6jO47UdnkN2rZiayFuYNLDzvPYTrBIcyoNego
|
||||
t0O3SjuBGqWl7apz8LIdemxWIOYgJtml0uTpihbu+UY
|
||||
-> ssh-ed25519 dRl0SQ YB735jB9c4KHDcoPL9AdgDWlJ01MDzioenShpCEuSHw
|
||||
ePM/LJ5b3Lc6mH8sYSEgnw40cHpxcSBLTT+BRThPc8o
|
||||
-> sf;0zl-grease \R8 XL!~>Q#
|
||||
vqybxsDF6ttWkv27cUrFrrpToAmTvq03nDYiMEYO5OA8n8tIN5HVri7hxJOVCLwJ
|
||||
5TkgdX2a+JiODe0vM8Tp3UaQIHeyuQA8FzMhowJ5gY+3vNtiJvxa/XZeQ/gsx//4
|
||||
5w
|
||||
--- 48SbG3pL8jLUA3EteqZ3AC3s8gC84VHgfrxnUqCpeX8
|
||||
x<EFBFBD>t{<7B><>ׂ$%z<>V<EFBFBD><56><EFBFBD><EFBFBD><EFBFBD>۵<EFBFBD>U<EFBFBD><55>Վ-<05><01>.<2E>|<15>>ǪM<04>5<EFBFBD><35>'Z<><5A><EFBFBD><EFBFBD>X;K)ƙ2<C699><32>|<7C>i
|
||||
@@ -1,22 +0,0 @@
|
||||
let
|
||||
server =
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN82ukcaWQZcihgh+n0h+ihwTafm64SO1wngibOA6Vro root@server";
|
||||
pc =
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMkvr+vT7Ik0fjquxb9xQBfVVWJPgrfC+vJZsyG2V+/G thiloho@pc";
|
||||
in {
|
||||
"hedgedoc-environment-file.age".publicKeys = [ server pc ];
|
||||
"discord-bot-token.age".publicKeys = [ server pc ];
|
||||
"todos-environment-file.age".publicKeys = [ server pc ];
|
||||
"restic/minecraft-password.age".publicKeys = [ server pc ];
|
||||
"restic/minecraft-environment-file.age".publicKeys = [ server pc ];
|
||||
"restic/minecraft-repository.age".publicKeys = [ server pc ];
|
||||
"restic/hedgedoc-password.age".publicKeys = [ server pc ];
|
||||
"restic/hedgedoc-environment-file.age".publicKeys = [ server pc ];
|
||||
"restic/hedgedoc-repository.age".publicKeys = [ server pc ];
|
||||
"restic/todos-password.age".publicKeys = [ server pc ];
|
||||
"restic/todos-environment-file.age".publicKeys = [ server pc ];
|
||||
"restic/todos-repository.age".publicKeys = [ server pc ];
|
||||
"restic/discord-bot-password.age".publicKeys = [ server pc ];
|
||||
"restic/discord-bot-environment-file.age".publicKeys = [ server pc ];
|
||||
"restic/discord-bot-repository.age".publicKeys = [ server pc ];
|
||||
}
|
||||
Binary file not shown.
Reference in New Issue
Block a user