Compare commits

..

4 commits

Author SHA1 Message Date
28156ae8aa flake.lock: Update
All checks were successful
/ test (push) Successful in 11m1s
Flake lock file updates:

• Updated input 'arion':
    'github:hercules-ci/arion/01777136c6e15251d2a2f2b72a5609cea7d42f29' (2024-06-24)
  → 'github:hercules-ci/arion/555e7ba634cf2564737dfc18ad607134e39f52a6' (2024-06-26)
• Updated input 'disko':
    'github:nix-community/disko/dd4d1663ccf7fbdb32361b9afe9e71206584cd4c' (2024-06-24)
  → 'github:nix-community/disko/d185770ea261fb5cf81aa5ad1791b93a7834d12c' (2024-06-30)
• Updated input 'dream2nix':
    'github:nix-community/dream2nix/aa983fd908a0d7e235a8c8a77b803231b9ff2e4a' (2024-06-25)
  → 'github:nix-community/dream2nix/1b5e01219a32324c8f6889fe1f4db933ec7932f6' (2024-06-29)
• Updated input 'dream2nix/nixpkgs':
    'github:NixOS/nixpkgs/cfb89a95f19bea461fc37228dc4d07b22fe617c2' (2024-06-25)
  → 'github:NixOS/nixpkgs/1e3deb3d8a86a870d925760db1a5adecc64d329d' (2024-06-27)
• Updated input 'hercules-ci-agent':
    'github:hercules-ci/hercules-ci-agent/42cfc9fe1593e1bcabbcd643a926cd2efc5339e9' (2024-06-12)
  → 'github:hercules-ci/hercules-ci-agent/c37b2ada2dd001bc4be6771bcdea680b0b93fb94' (2024-06-26)
• Updated input 'hercules-ci-agent/nixpkgs':
    'github:NixOS/nixpkgs/c7b821ba2e1e635ba5a76d299af62821cbcb09f3' (2024-06-09)
  → 'github:NixOS/nixpkgs/2893f56de08021cffd9b6b6dfc70fd9ccd51eb60' (2024-06-24)
• Updated input 'homeManager':
    'github:nix-community/home-manager/6b1f90a8ff92e81638ae6eb48cd62349c3e387bb' (2024-06-23)
  → 'github:nix-community/home-manager/36317d4d38887f7629876b0e43c8d9593c5cc48d' (2024-06-29)
• Updated input 'lix':
    'git+https://git@git.lix.systems/lix-project/lix?ref=refs/heads/main&rev=4ac2c496d499a4a0e2d64edf32eb855268e7aa8d' (2024-06-25)
  → 'git+https://git@git.lix.systems/lix-project/lix?ref=refs/heads/main&rev=5dc85e8b72d1ba433f69200537146275ff1c4a03' (2024-06-26)
• Updated input 'nix-fast-build':
    'github:Mic92/nix-fast-build/02c50df6881266f5425f06f475d504e90e491767' (2024-06-25)
  → 'github:Mic92/nix-fast-build/030e586195c97424844965d2ce680140f6565c02' (2024-06-27)
• Updated input 'nixd':
    'github:nix-community/nixd/61075576703ed1e1c82134ec780c768b4c3d4e00' (2024-06-25)
  → 'github:nix-community/nixd/60a925008bc353136ba5babce437f42819c1645c' (2024-06-26)
• Updated input 'nixosHardware':
    'github:NixOS/nixos-hardware/caabc425565bbd5c8640630b0bf6974961a49242' (2024-06-25)
  → 'github:NixOS/nixos-hardware/a59f00f5ac65b19382617ba00f360f8bc07ed3ac' (2024-06-29)
• Updated input 'nixpkgsStable':
    'github:NixOS/nixpkgs/906320ae02f769d13a646eb3605a9821df0d6ea2' (2024-06-23)
  → 'github:NixOS/nixpkgs/90bd1b26e23760742fdcb6152369919098f05417' (2024-06-24)
• Updated input 'nixpkgsUnstable':
    'github:NixOS/nixpkgs/2893f56de08021cffd9b6b6dfc70fd9ccd51eb60' (2024-06-24)
  → 'github:NixOS/nixpkgs/b2852eb9365c6de48ffb0dc2c9562591f652242a' (2024-06-27)
2024-06-30 08:09:26 +00:00
6978e1ad5b
Bump flake inputs
All checks were successful
/ test (push) Successful in 25s
2024-06-28 15:35:28 +02:00
9620ca8ca3
Things
All checks were successful
/ test (push) Successful in 18m47s
2024-06-09 09:09:15 +02:00
f7302479b3
Switch to catppuccin
Some checks failed
/ test (push) Has been cancelled
2024-06-01 08:39:18 +02:00
54 changed files with 8617 additions and 607 deletions

356
flake.lock generated
View file

@ -21,6 +21,27 @@
"type": "github"
}
},
"arion": {
"inputs": {
"flake-parts": "flake-parts",
"haskell-flake": "haskell-flake",
"hercules-ci-effects": "hercules-ci-effects",
"nixpkgs": "nixpkgs_2"
},
"locked": {
"lastModified": 1719400670,
"narHash": "sha256-TnTKhDBHX2J/ISs6sKcSF4P09I4k0aabisUvd/oYpDo=",
"owner": "hercules-ci",
"repo": "arion",
"rev": "555e7ba634cf2564737dfc18ad607134e39f52a6",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "arion",
"type": "github"
}
},
"ccrEmacs": {
"inputs": {
"emacs-overlay": "emacs-overlay",
@ -32,8 +53,8 @@
"extra-package-meow-tree-sitter": "extra-package-meow-tree-sitter",
"extra-package-nix-ts-mode": "extra-package-nix-ts-mode",
"extra-package-notmuch-notify": "extra-package-notmuch-notify",
"flake-parts": "flake-parts",
"hercules-ci-effects": "hercules-ci-effects",
"flake-parts": "flake-parts_3",
"hercules-ci-effects": "hercules-ci-effects_2",
"nixpkgs": [
"ccrEmacs",
"emacs-overlay",
@ -83,11 +104,11 @@
]
},
"locked": {
"lastModified": 1719577781,
"narHash": "sha256-uZCmo/UxoZM9Cz46ReKir6EvJPO4nMcB9wJdptBLjz8=",
"lastModified": 1719733833,
"narHash": "sha256-6h2EqZU9bL9rHlXE+2LCBgnDImejzbS+4dYsNDDFlkY=",
"owner": "nix-community",
"repo": "disko",
"rev": "e8ef4773dd101bde4331bf78c69f9144ab92aab9",
"rev": "d185770ea261fb5cf81aa5ad1791b93a7834d12c",
"type": "github"
},
"original": {
@ -98,16 +119,16 @@
},
"dream2nix": {
"inputs": {
"nixpkgs": "nixpkgs_4",
"nixpkgs": "nixpkgs_5",
"purescript-overlay": "purescript-overlay",
"pyproject-nix": "pyproject-nix"
},
"locked": {
"lastModified": 1719513340,
"narHash": "sha256-on3zRua52KZ8G5kBOXMQOzrsA07ywVMNdcIWJEeotfo=",
"lastModified": 1719685993,
"narHash": "sha256-04gy1icwnGO3ZXF6r96yBm/C0PNPzeLxA/8xzzq0dBI=",
"owner": "nix-community",
"repo": "dream2nix",
"rev": "4d441820e0d0916c97d7af6c4d4f6843d676e242",
"rev": "1b5e01219a32324c8f6889fe1f4db933ec7932f6",
"type": "github"
},
"original": {
@ -119,7 +140,7 @@
"emacs-overlay": {
"inputs": {
"flake-utils": "flake-utils",
"nixpkgs": "nixpkgs_2",
"nixpkgs": "nixpkgs_3",
"nixpkgs-stable": "nixpkgs-stable"
},
"locked": {
@ -298,6 +319,84 @@
}
},
"flake-parts": {
"inputs": {
"nixpkgs-lib": [
"arion",
"nixpkgs"
]
},
"locked": {
"lastModified": 1717285511,
"narHash": "sha256-iKzJcpdXih14qYVcZ9QC9XuZYnPc6T8YImb6dX166kw=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "2a55567fcf15b1b1c7ed712a2c6fadaec7412ea8",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_10": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_5"
},
"locked": {
"lastModified": 1714606777,
"narHash": "sha256-bMkNmAXLj8iyTvxaaD/StcLSadbj1chPcJOjtuVnLmA=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "4d34ce6412bc450b1d4208c953dc97c7fc764f1a",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_11": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_6"
},
"locked": {
"lastModified": 1678379998,
"narHash": "sha256-TZdfNqftHhDuIFwBcN9MUThx5sQXCTeZk9je5byPKRw=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "c13d60b89adea3dc20704c045ec4d50dd964d447",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_2": {
"inputs": {
"nixpkgs-lib": [
"arion",
"hercules-ci-effects",
"nixpkgs"
]
},
"locked": {
"lastModified": 1712014858,
"narHash": "sha256-sB4SWl2lX95bExY2gMFG5HIzvva5AVMJd4Igm+GpZNw=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "9126214d0a59633752a136528f5f3b9aa8565b7d",
"type": "github"
},
"original": {
"id": "flake-parts",
"type": "indirect"
}
},
"flake-parts_3": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib"
},
@ -315,7 +414,7 @@
"type": "github"
}
},
"flake-parts_2": {
"flake-parts_4": {
"inputs": {
"nixpkgs-lib": [
"ccrEmacs",
@ -336,7 +435,7 @@
"type": "indirect"
}
},
"flake-parts_3": {
"flake-parts_5": {
"inputs": {
"nixpkgs-lib": [
"hercules-ci-agent",
@ -357,7 +456,7 @@
"type": "github"
}
},
"flake-parts_4": {
"flake-parts_6": {
"inputs": {
"nixpkgs-lib": [
"hercules-ci-effects",
@ -377,7 +476,7 @@
"type": "indirect"
}
},
"flake-parts_5": {
"flake-parts_7": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_3"
},
@ -395,7 +494,7 @@
"type": "github"
}
},
"flake-parts_6": {
"flake-parts_8": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_4"
},
@ -413,7 +512,7 @@
"type": "github"
}
},
"flake-parts_7": {
"flake-parts_9": {
"inputs": {
"nixpkgs-lib": [
"nixThePlanet",
@ -434,42 +533,6 @@
"type": "indirect"
}
},
"flake-parts_8": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_5"
},
"locked": {
"lastModified": 1714606777,
"narHash": "sha256-bMkNmAXLj8iyTvxaaD/StcLSadbj1chPcJOjtuVnLmA=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "4d34ce6412bc450b1d4208c953dc97c7fc764f1a",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-parts_9": {
"inputs": {
"nixpkgs-lib": "nixpkgs-lib_6"
},
"locked": {
"lastModified": 1678379998,
"narHash": "sha256-TZdfNqftHhDuIFwBcN9MUThx5sQXCTeZk9je5byPKRw=",
"owner": "hercules-ci",
"repo": "flake-parts",
"rev": "c13d60b89adea3dc20704c045ec4d50dd964d447",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "flake-parts",
"type": "github"
}
},
"flake-root": {
"locked": {
"lastModified": 1713493429,
@ -576,6 +639,22 @@
}
},
"haskell-flake": {
"locked": {
"lastModified": 1675296942,
"narHash": "sha256-u1X1sblozi5qYEcLp1hxcyo8FfDHnRUVX3dJ/tW19jY=",
"owner": "srid",
"repo": "haskell-flake",
"rev": "c2cafce9d57bfca41794dc3b99c593155006c71e",
"type": "github"
},
"original": {
"owner": "srid",
"ref": "0.1.0",
"repo": "haskell-flake",
"type": "github"
}
},
"haskell-flake_2": {
"locked": {
"lastModified": 1684780604,
"narHash": "sha256-2uMZsewmRn7rRtAnnQNw1lj0uZBMh4m6Cs/7dV5YF08=",
@ -593,9 +672,9 @@
},
"hercules-ci-agent": {
"inputs": {
"flake-parts": "flake-parts_3",
"haskell-flake": "haskell-flake",
"nixpkgs": "nixpkgs_5"
"flake-parts": "flake-parts_5",
"haskell-flake": "haskell-flake_2",
"nixpkgs": "nixpkgs_6"
},
"locked": {
"lastModified": 1719398431,
@ -614,14 +693,17 @@
"hercules-ci-effects": {
"inputs": {
"flake-parts": "flake-parts_2",
"nixpkgs": "nixpkgs_3"
"nixpkgs": [
"arion",
"nixpkgs"
]
},
"locked": {
"lastModified": 1719226092,
"narHash": "sha256-YNkUMcCUCpnULp40g+svYsaH1RbSEj6s4WdZY/SHe38=",
"lastModified": 1713898448,
"narHash": "sha256-6q6ojsp/Z9P2goqnxyfCSzFOD92T3Uobmj8oVAicUOs=",
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"rev": "11e4b8dc112e2f485d7c97e1cee77f9958f498f5",
"rev": "c0302ec12d569532a6b6bd218f698bc402e93adc",
"type": "github"
},
"original": {
@ -633,7 +715,7 @@
"hercules-ci-effects_2": {
"inputs": {
"flake-parts": "flake-parts_4",
"nixpkgs": "nixpkgs_6"
"nixpkgs": "nixpkgs_4"
},
"locked": {
"lastModified": 1719226092,
@ -651,8 +733,27 @@
},
"hercules-ci-effects_3": {
"inputs": {
"flake-parts": "flake-parts_7",
"nixpkgs": "nixpkgs_8"
"flake-parts": "flake-parts_6",
"nixpkgs": "nixpkgs_7"
},
"locked": {
"lastModified": 1719226092,
"narHash": "sha256-YNkUMcCUCpnULp40g+svYsaH1RbSEj6s4WdZY/SHe38=",
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"rev": "11e4b8dc112e2f485d7c97e1cee77f9958f498f5",
"type": "github"
},
"original": {
"owner": "hercules-ci",
"repo": "hercules-ci-effects",
"type": "github"
}
},
"hercules-ci-effects_4": {
"inputs": {
"flake-parts": "flake-parts_9",
"nixpkgs": "nixpkgs_9"
},
"locked": {
"lastModified": 1701009247,
@ -717,11 +818,11 @@
]
},
"locked": {
"lastModified": 1719438532,
"narHash": "sha256-/Vmso2ZMoFE3M7d1MRsQ2K5sR8CVKnrM6t1ys9Xjpz4=",
"lastModified": 1719677234,
"narHash": "sha256-qO9WZsj/0E6zcK4Ht1y/iJ8XfwbBzq7xdqhBh44OP/M=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "1a4f12ae0bda877ec4099b429cf439aad897d7e9",
"rev": "36317d4d38887f7629876b0e43c8d9593c5cc48d",
"type": "github"
},
"original": {
@ -771,16 +872,15 @@
"lix": {
"flake": false,
"locked": {
"lastModified": 1714955862,
"narHash": "sha256-REWlo2RYHfJkxnmZTEJu3Cd/2VM+wjjpPy7Xi4BdDTQ=",
"ref": "refs/tags/2.90-beta.1",
"rev": "b6799ab0374a8e1907a48915d3187e07da41d88c",
"revCount": 15501,
"lastModified": 1719439912,
"narHash": "sha256-Qn0y/WEYcBL/SKEnpJq1e9tDpVi57YGDiJM2MgavLXM=",
"ref": "refs/heads/main",
"rev": "5dc85e8b72d1ba433f69200537146275ff1c4a03",
"revCount": 15900,
"type": "git",
"url": "https://git@git.lix.systems/lix-project/lix"
},
"original": {
"ref": "refs/tags/2.90-beta.1",
"type": "git",
"url": "https://git@git.lix.systems/lix-project/lix"
}
@ -810,9 +910,25 @@
"url": "https://git.lix.systems/lix-project/nixos-module"
}
},
"mobile-nixos": {
"flake": false,
"locked": {
"lastModified": 1715627339,
"narHash": "sha256-HJ6V7hc64iBqXlZ8kH4sXmUzPH+0Hn6wYURmZmL5LFk=",
"owner": "NixOS",
"repo": "mobile-nixos",
"rev": "655c8830d5fe2eae79c8fc0bab8033b34c8456eb",
"type": "github"
},
"original": {
"owner": "NixOS",
"repo": "mobile-nixos",
"type": "github"
}
},
"nix-fast-build": {
"inputs": {
"flake-parts": "flake-parts_5",
"flake-parts": "flake-parts_7",
"nixpkgs": [
"nixpkgsUnstable"
],
@ -859,7 +975,7 @@
"inputs": {
"home-manager": "home-manager_2",
"nix-formatter-pack": "nix-formatter-pack",
"nixpkgs": "nixpkgs_7",
"nixpkgs": "nixpkgs_8",
"nixpkgs-docs": "nixpkgs-docs",
"nixpkgs-for-bootstrap": "nixpkgs-for-bootstrap",
"nmd": "nmd_2"
@ -900,8 +1016,8 @@
},
"nixThePlanet": {
"inputs": {
"flake-parts": "flake-parts_6",
"hercules-ci-effects": "hercules-ci-effects_3",
"flake-parts": "flake-parts_8",
"hercules-ci-effects": "hercules-ci-effects_4",
"nixpkgs": [
"nixpkgsUnstable"
],
@ -924,9 +1040,9 @@
},
"nixd": {
"inputs": {
"flake-parts": "flake-parts_8",
"flake-parts": "flake-parts_10",
"flake-root": "flake-root",
"nixpkgs": "nixpkgs_9"
"nixpkgs": "nixpkgs_10"
},
"locked": {
"lastModified": 1719387257,
@ -944,11 +1060,11 @@
},
"nixosHardware": {
"locked": {
"lastModified": 1719552654,
"narHash": "sha256-PX3msbC5KdwCDnucGtir3qzlzv+1fuiU4tk17nljFIE=",
"lastModified": 1719681865,
"narHash": "sha256-Lp+l1IsREVbz8WM35OJYZz8sAH0XOjrZWUXVB5bJ2qg=",
"owner": "NixOS",
"repo": "nixos-hardware",
"rev": "3980e7816c99d9e4da7a7b762e5b294055b73b2f",
"rev": "a59f00f5ac65b19382617ba00f360f8bc07ed3ac",
"type": "github"
},
"original": {
@ -1145,11 +1261,11 @@
},
"nixpkgsUnstable": {
"locked": {
"lastModified": 1719254875,
"narHash": "sha256-ECni+IkwXjusHsm9Sexdtq8weAq/yUyt1TWIemXt3Ko=",
"lastModified": 1719506693,
"narHash": "sha256-C8e9S7RzshSdHB7L+v9I51af1gDM5unhJ2xO1ywxNH8=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "2893f56de08021cffd9b6b6dfc70fd9ccd51eb60",
"rev": "b2852eb9365c6de48ffb0dc2c9562591f652242a",
"type": "github"
},
"original": {
@ -1176,6 +1292,22 @@
}
},
"nixpkgs_10": {
"locked": {
"lastModified": 1714562304,
"narHash": "sha256-Mr3U37Rh6tH0FbaDFu0aZDwk9mPAe7ASaqDOGgLqqLU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "bcd44e224fd68ce7d269b4f44d24c2220fd821e7",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_11": {
"locked": {
"lastModified": 1678470307,
"narHash": "sha256-OEeMUr3ueLIXyW/OaFUX5jUdimyQwMg/7e+/Q0gC/QE=",
@ -1192,6 +1324,22 @@
}
},
"nixpkgs_2": {
"locked": {
"lastModified": 1717196966,
"narHash": "sha256-yZKhxVIKd2lsbOqYd5iDoUIwsRZFqE87smE2Vzf6Ck0=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "57610d2f8f0937f39dbd72251e9614b1561942d8",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_3": {
"locked": {
"lastModified": 1719075281,
"narHash": "sha256-CyyxvOwFf12I91PBWz43iGT1kjsf5oi6ax7CrvaMyAo=",
@ -1207,7 +1355,7 @@
"type": "github"
}
},
"nixpkgs_3": {
"nixpkgs_4": {
"locked": {
"lastModified": 1713714899,
"narHash": "sha256-+z/XjO3QJs5rLE5UOf015gdVauVRQd2vZtsFkaXBq2Y=",
@ -1223,13 +1371,13 @@
"type": "github"
}
},
"nixpkgs_4": {
"nixpkgs_5": {
"locked": {
"lastModified": 1719436386,
"narHash": "sha256-NBGYaic5FLRg8AWSj6yr4g2IlMPUxNCVjRK6+RNuQBc=",
"lastModified": 1719468428,
"narHash": "sha256-vN5xJAZ4UGREEglh3lfbbkIj+MPEYMuqewMn4atZFaQ=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "c66e984bda09e7230ea7b364e677c5ba4f0d36d0",
"rev": "1e3deb3d8a86a870d925760db1a5adecc64d329d",
"type": "github"
},
"original": {
@ -1239,7 +1387,7 @@
"type": "github"
}
},
"nixpkgs_5": {
"nixpkgs_6": {
"locked": {
"lastModified": 1719254875,
"narHash": "sha256-ECni+IkwXjusHsm9Sexdtq8weAq/yUyt1TWIemXt3Ko=",
@ -1255,7 +1403,7 @@
"type": "github"
}
},
"nixpkgs_6": {
"nixpkgs_7": {
"locked": {
"lastModified": 1713714899,
"narHash": "sha256-+z/XjO3QJs5rLE5UOf015gdVauVRQd2vZtsFkaXBq2Y=",
@ -1271,7 +1419,7 @@
"type": "github"
}
},
"nixpkgs_7": {
"nixpkgs_8": {
"locked": {
"lastModified": 1708172716,
"narHash": "sha256-3M94oln0b61m3dUmLyECCA9hYAHXZEszM4saE3CmQO4=",
@ -1286,7 +1434,7 @@
"type": "github"
}
},
"nixpkgs_8": {
"nixpkgs_9": {
"locked": {
"lastModified": 1697723726,
"narHash": "sha256-SaTWPkI8a5xSHX/rrKzUe+/uVNy6zCGMXgoeMb7T9rg=",
@ -1302,22 +1450,6 @@
"type": "github"
}
},
"nixpkgs_9": {
"locked": {
"lastModified": 1714562304,
"narHash": "sha256-Mr3U37Rh6tH0FbaDFu0aZDwk9mPAe7ASaqDOGgLqqLU=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "bcd44e224fd68ce7d269b4f44d24c2220fd821e7",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixpkgs-unstable",
"repo": "nixpkgs",
"type": "github"
}
},
"nmd": {
"flake": false,
"locked": {
@ -1487,9 +1619,9 @@
"rock5b": {
"inputs": {
"fan-control": "fan-control",
"flake-parts": "flake-parts_9",
"flake-parts": "flake-parts_11",
"kernel-src": "kernel-src",
"nixpkgs": "nixpkgs_10",
"nixpkgs": "nixpkgs_11",
"nixpkgs-kernel": "nixpkgs-kernel",
"panfork": "panfork",
"tow-boot": "tow-boot",
@ -1512,16 +1644,18 @@
"root": {
"inputs": {
"agenix": "agenix",
"arion": "arion",
"ccrEmacs": "ccrEmacs",
"disko": "disko",
"dream2nix": "dream2nix",
"flakeParts": "flakeParts",
"hercules-ci-agent": "hercules-ci-agent",
"hercules-ci-effects": "hercules-ci-effects_2",
"hercules-ci-effects": "hercules-ci-effects_3",
"homeManager": "homeManager",
"homeManagerGitWorkspace": "homeManagerGitWorkspace",
"lix": "lix",
"lix-module": "lix-module",
"mobile-nixos": "mobile-nixos",
"nix-fast-build": "nix-fast-build",
"nix-on-droid": "nix-on-droid",
"nixDarwin": "nixDarwin",

View file

@ -54,7 +54,7 @@
nix-on-droid.url = "github:nix-community/nix-on-droid";
nixd.url = "github:nix-community/nixd";
lix = {
url = "git+https://git@git.lix.systems/lix-project/lix?ref=refs/tags/2.90-beta.1";
url = "git+https://git@git.lix.systems/lix-project/lix";
flake = false;
};
lix-module = {
@ -62,6 +62,11 @@
inputs.lix.follows = "lix";
inputs.nixpkgs.follows = "nixpkgsUnstable";
};
mobile-nixos = {
url = "github:NixOS/mobile-nixos";
flake = false;
};
arion.url = "github:hercules-ci/arion";
};
outputs = inputs @ {flakeParts, ...}:

View file

@ -9,7 +9,7 @@
extraPolicies = {
ExtensionSettings = {};
};
nativeMessagingHosts = [pkgs.tridactyl-native pkgs.fx-cast-bridge];
nativeMessagingHosts = [pkgs.tridactyl-native];
};
profiles.${username} = {
extensions = with pkgs.nur.repos.rycee.firefox-addons; [

View file

@ -1,5 +1,16 @@
{lib, ...}: {
programs.foot = {
{
lib,
pkgs,
...
}: {
programs.foot = let
catppuccin = pkgs.fetchFromGitHub {
owner = "catppuccin";
repo = "foot";
rev = "307611230661b7b1787feb7f9d122e851bae97e9";
hash = "sha256-mkPYHDJtfdfDnqLr1YOjaBpn4lCceok36LrnkUkNIE4=";
};
in {
enable = true;
server.enable = true;
settings = {
@ -9,11 +20,13 @@
# Using dpi-aware = "yes" font size is too small on my external monitor
# Scaling that output in sway is inefficient and make XWayland apps blurred
dpi-aware = "no";
horizontal-letter-offset = "1";
include = "${catppuccin}/themes/catppuccin-mocha.ini";
font = let
size = "12";
size = "13";
in
lib.concatStringsSep ", " [
"Fira Code:size=${size}"
"Iosevka Comfy:size=${size}"
"Symbols Nerd Font:size=${size}"
"JoyPixels:size=${size}"
];
@ -22,10 +35,6 @@
mouse = {
hide-when-typing = "yes";
};
colors = {
background = "282C34";
};
};
};
}

View file

@ -25,12 +25,11 @@ in {
./hyprpaper.nix
../waybar
../swayidle
# ../mako
../swaync
../gammastep
# ../kitty
../wezterm
# ../wezterm
../wayvnc
../swaync
../foot
];
home.packages = with pkgs; [wl-clipboard waypipe];
@ -55,32 +54,32 @@ in {
};
};
services.kanshi = {
enable = true;
systemdTarget = "hyprland-session.target";
profiles = {
undocked = {
outputs = [
{
status = "enable";
criteria = "eDP-1";
}
];
};
docked = {
outputs = [
{
status = "disable";
criteria = "eDP-1";
}
{
status = "enable";
criteria = "DP-1";
}
];
};
};
};
# services.kanshi = {
# enable = true;
# systemdTarget = "hyprland-session.target";
# profiles = {
# undocked = {
# outputs = [
# {
# status = "enable";
# criteria = "eDP-1";
# }
# ];
# };
# docked = {
# outputs = [
# {
# status = "disable";
# criteria = "eDP-1";
# }
# {
# status = "enable";
# criteria = "DP-1";
# }
# ];
# };
# };
# };
wayland.windowManager.hyprland = {
enable = true;
@ -110,10 +109,7 @@ in {
windowrulev2 = float, title:^(floating)$
bind = $mod, b, exec, firefox
bind = $mod SHIFT, b , exec, ${pkgs.waypipe}/bin/waypipe --compress lz4=10 ssh mothership.fleet firefox
bind = $mod SHIFT, RETURN, exec, ${config.programs.wezterm.package}/bin/wezterm ssh mothership.fleet
bind = $mod, m, exec, ${config.programs.wezterm.package}/bin/wezterm start -- mosh mothership.fleet
bind = $mod, t, exec, ${config.programs.wezterm.package}/bin/wezterm
bind = $mod, t, exec, foot
bind = $mod, RETURN, exec, emacsclient -c --eval "(ccr/start-eshell)"
bind = $mod, x, exec, emacsclient -c
bind = $mod SHIFT, n, exec, emacsclient --eval '(ccr/org-capture "n")' -c -F '((name . "floating"))'
@ -125,7 +121,6 @@ in {
bind = , XF86MonBrightnessDown, exec, ${pkgs.brightnessctl}/bin/brightnessctl s 5%-
bind = $mod, code:60, exec, ${pkgs.brightnessctl}/bin/brightnessctl s +5%
bind = $mod, code:59, exec, ${pkgs.brightnessctl}/bin/brightnessctl s 5%-
bind = $mod SHIFT, t, exec, ${config.services.swaync.package}/bin/swaync-client -t
bind = $mod SHIFT, q, killactive

View file

@ -4,6 +4,7 @@
pkgs,
age,
fleetFlake,
hostname,
...
}: {
programs.bat.enable = true;
@ -123,11 +124,14 @@
programs.fish = {
enable = true;
shellInit = ''
fish_config theme choose "dracula"
fish_config theme choose "Catppuccin Mocha"
export CACHIX_AUTH_TOKEN=$(cat ${age.secrets.cachix-personal-token.path})
'';
shellInit =
''
fish_config theme choose "dracula"
fish_config theme choose "Catppuccin Mocha"
''
+ lib.optionalString (builtins.hasAttr "cachix-personal-token" age.secrets) ''
export CACHIX_AUTH_TOKEN=$(cat ${age.secrets.cachix-personal-token.path})
'';
shellAliases = {
"cat" = "bat";
};
@ -207,22 +211,25 @@
# '';
# };
home.packages = with pkgs; [
thefuck
htop-vim
bottom
dig.dnsutils
lsof
zsh-completions
nix-zsh-completions
comma
# carapace # used by nushell
nil # TODO probably not best place
fleetFlake.inputs.nixd.packages.${pkgs.system}.nixd # TODO probably not best place
terraform-lsp # TODO probably not best place
python3Packages.jedi-language-server # TODO probably not best place
nodePackages.typescript-language-server # TODO probably not best place
cntr # TODO probably not best place
# nom # FIXME disable on aarch64-linux, breaks everything :(
];
home.packages = with pkgs;
[
thefuck
htop-vim
bottom
dig.dnsutils
lsof
zsh-completions
nix-zsh-completions
comma
carapace # used by nushell
]
++ (lib.optionals (builtins.elem hostname ["kirk" "picard"]) [
nil # TODO probably not best place
(fleetFlake.inputs.nixd.packages.${pkgs.system}.nixd) # TODO probably not best place
terraform-lsp # TODO probably not best place
python3Packages.jedi-language-server # TODO probably not best place
nodePackages.typescript-language-server # TODO probably not best place
cntr # TODO probably not best place
nom # FIXME disable on aarch64-linux, breaks everything :(
]);
}

7319
hmModules/wezterm/Cargo.lock generated Normal file

File diff suppressed because it is too large Load diff

View file

@ -1,9 +1,70 @@
{...}: {
{
pkgs,
hostname,
...
}: {
programs.wezterm = {
enable = true;
package =
if hostname == "pircard"
then
(pkgs.wezterm.overrideAttrs (old: rec {
pname = "wezterm";
version = "20240406-cce0706";
src = pkgs.fetchFromGitHub {
owner = "wez";
repo = "${pname}";
rev = "cce0706b1f2a9e2d1f02c57f2d1cd367c91df1ae";
fetchSubmodules = true;
hash = "sha256-BBPxidOpFrw/tIRTqMSREyJF3QEWOwlIoVRT3FD62sQ=";
};
cargoDeps = pkgs.rustPlatform.importCargoLock {
lockFile = "${src}/Cargo.lock";
outputHashes = {
"xcb-imdkit-0.3.0" = "sha256-fTpJ6uNhjmCWv7dZqVgYuS2Uic36XNYTbqlaly5QBjI=";
};
};
patches =
(old.patches or [])
++ [
(pkgs.fetchpatch {
# fix(wayland): ensure repaint event is sent in show
url = "https://patch-diff.githubusercontent.com/raw/wez/wezterm/pull/5264.patch";
hash = "sha256-c+frVaBEL0h3PJvNu3AW2iap+uUXBY8olbm7Wsxuh4Q=";
})
(pkgs.writeText
"wezterm-remove_capabilities.patch"
''
diff --git a/window/src/os/wayland/seat.rs b/window/src/os/wayland/seat.rs
index 3798f4259..e91591130 100644
--- a/window/src/os/wayland/seat.rs
+++ b/window/src/os/wayland/seat.rs
@@ -65,9 +65,15 @@ impl SeatHandler for WaylandState {
_conn: &Connection,
_qh: &QueueHandle<Self>,
_seat: WlSeat,
- _capability: smithay_client_toolkit::seat::Capability,
+ capability: smithay_client_toolkit::seat::Capability,
) {
- todo!()
+ if capability == Capability::Keyboard && self.keyboard.is_some() {
+ self.keyboard.take().unwrap().release();
+ }
+
+ if capability == Capability::Pointer && self.pointer.is_some() {
+ self.pointer = None;
+ }
}
fn remove_seat(&mut self, _conn: &Connection, _qh: &QueueHandle<Self>, _seat: WlSeat) {
'')
];
}))
else pkgs.wezterm;
extraConfig = ''
return {
enable_wayland = false; -- https://github.com/wez/wezterm/issues/4483
-- enable_wayland = false; -- https://github.com/wez/wezterm/issues/4483
font = wezterm.font_with_fallback {
{
family = 'Iosevka Comfy',

View file

@ -0,0 +1,22 @@
{
pkgs,
lib,
...
}: {
home.packages = [pkgs.zmkBATx];
systemd.user.services.zmkBATx = {
Install.WantedBy = ["graphical-session.target"];
Unit = {
Description = "zmkBATx";
PartOf = ["graphical-session.target"];
};
Service = {
ExecStart = lib.getExe pkgs.zmkBATx;
Restart = "on-failure";
RestartSec = 3;
};
};
}

View file

@ -72,6 +72,30 @@
# "chatgpt-token".owner = "ccr";
# };
# };
deltaflyer = {
nixpkgs = let
# keep in sync with https://github.com/NixOS/mobile-nixos/blob/development/pkgs.nix
rev = "44d0940ea560dee511026a53f0e2e2cde489b4d4";
in
builtins.getFlake "github:NixOS/nixpkgs/${rev}";
extraHmModules = [
inputs.ccrEmacs.hmModules.default
];
vpn = {
ip = "10.100.0.5";
publicKey = "6bzmBx2b5yzMdW0aK0KapoBesNcxTv5+qdo+pGmG+jc=";
};
homeManager = builtins.getFlake "github:nix-community/home-manager/670d9ecc3e46a6e3265c203c2d136031a3d3548e";
extraModules = [
(import "${inputs.mobile-nixos}/lib/configuration.nix" {device = "oneplus-fajita";})
];
secrets = {
"deltaflyer-wireguard-private-key" = {};
"chatgpt-token".owner = "ccr";
};
};
kirk = {
vpn = {
ip = "10.100.0.3";
@ -80,6 +104,7 @@
extraModules = [
inputs.disko.nixosModules.disko
inputs.nixosHardware.nixosModules.lenovo-thinkpad-x1-7th-gen
inputs.lix-module.nixosModules.default
];
extraHmModules = [
inputs.ccrEmacs.hmModules.default
@ -103,6 +128,7 @@
extraModules = [
inputs.disko.nixosModules.disko
inputs.nixThePlanet.nixosModules.macos-ventura
inputs.lix-module.nixosModules.default
# inputs.hercules-ci-agent.nixosModules.agent-service
];
extraHmModules = [
@ -127,13 +153,14 @@
sisko = {
system = "aarch64-linux";
nixpkgs = inputs.nixpkgsUnstableForSisko; # using more recent `nixpkgsUnstable` it fails to restart
vpn = {
ip = "10.100.0.1";
publicKey = "bc5giljukT1+ChbbyTLdOfejfR3c8RZ4XoXmQM54nTY=";
};
extraModules = with inputs; [
disko.nixosModules.disko
arion.nixosModules.arion
# lix-module.nixosModules.default
# inputs.hercules-ci-agent.nixosModules.agent-service;
# rock5b.nixosModules.default
];

View file

@ -0,0 +1,146 @@
{
fleetModules,
config,
lib,
pkgs,
fleetFlake,
...
}: {
imports =
fleetModules [
"common"
"ssh"
"ccr"
"nix"
"bluetooth"
"dbus"
"networkmanager"
"pam"
"fonts"
"waydroid"
"wireguard-client"
]
++ [
# ./mobile-nixos-branding.nix
./plasma-mobile.nix
];
# options.home-manager.services.kanshi.attrTag = null;
config = lib.mkMerge [
# INSECURE STUFF FIRST
# Users and hardcoded passwords.
{
users.users.root.password = "nixos";
# users.users.ccr.password = "1234";
# Automatically login as defaultUserName.
# services.xserver.displayManager.autoLogin = {
# user = "ccr";
# };
}
# Networking, modem and misc.
{
# Ensures any rndis config from stage-1 is not clobbered by NetworkManager
networking.networkmanager.unmanaged = ["rndis0" "usb0"];
# Setup USB gadget networking in initrd...
mobile.boot.stage-1.networking.enable = lib.mkDefault true;
}
# SSH
{
# Start SSH by default...
# Not a good idea given the fact this config is insecure (well-known password).
services.openssh = {
settings.PermitRootLogin = lib.mkForce "yes";
};
mobile.adbd.enable = true;
ccr = {
enable = true;
autologin = true;
modules = [
"git"
"shell"
"helix"
"hyprland"
"emacs"
"firefox"
"mpv"
"xdg"
];
extraGroups = [
"dialout"
"feedbackd"
"networkmanager"
"video"
"wheel"
];
backupPaths = [];
};
}
{
system.stateVersion = "24.11";
nixpkgs.config.allowUnfreePredicate = pkg:
builtins.elem (lib.getName pkg) [
"oneplus-sdm845-firmware-zstd"
"oneplus-sdm845-firmware-xz"
"oneplus-sdm845-firmware"
];
nixpkgs.crossSystem = lib.mkForce null;
nixpkgs.localSystem.system = "aarch64-linux"; # we use an aarch64 nix remote builder or binfmt
# mobile.boot.stage-1.kernel.useStrictKernelConfig = lib.mkDefault true;
ccr.extraModules = [
{
programs.fish.loginShellInit = ''
pgrep Hypr >/dev/null || exec dbus-run-session Hyprland
'';
wayland.windowManager.hyprland.extraConfig = lib.mkAfter ''
monitor = DSI-1, 1080x2340, 0x0, 2, transform, 1
input {
touchdevice {
transform = 1
}
}
bind = $mod, r, exec, rotate-screen hor
bind = $mod SHIFT, r, exec, rotate-screen ver
'';
home.packages = let
rotateScript = pkgs.writeShellApplication {
name = "rotate-screen";
runtimeInputs = [pkgs.hyprland];
text = ''
if [[ "$1" == "hor" ]]; then
hyprctl keyword monitor DSI-1,1080x2340,0x0,2,transform,1
hyprctl keyword input:touchdevice:transform 1
elif [[ "$1" == "ver" ]]; then
hyprctl keyword monitor DSI-1,1080x2340,0x0,2,transform,0
hyprctl keyword input:touchdevice:transform 0
fi
'';
};
in [rotateScript];
services.swayidle.enable = lib.mkForce false;
}
];
environment.systemPackages = [
# (pkgs.writeShellApplication {
# name = "start-win98";
# text = fleetFlake.inputs.nixThePlanet.apps.aarch64-linux.win98.program;
# })
pkgs.libreoffice
pkgs.superTuxKart
pkgs.chromium
pkgs.dolphin-emu
];
zramSwap.enable = lib.mkDefault true;
boot.binfmt.emulatedSystems = lib.mkForce ["x86_64-linux" "i686-linux" "i386-linux" "i486-linux" "i586-linux"];
}
];
}

View file

@ -0,0 +1,52 @@
#
# Minimum config used to enable Plasma Mobile.
#
{
config,
lib,
pkgs,
...
}: {
mobile.beautification = {
silentBoot = lib.mkDefault false;
splash = lib.mkDefault false;
};
services.xserver = {
enable = true;
# # desktopManager.plasma5.mobile.enable = true;
# displayManager.autoLogin = {
# enable = true;
# };
# displayManager.session = [{
# manage = "desktop";
# name = "hyprland";
# start = ''
# ${pkgs.hyprland}/bin/Hyprland &
# waitPID=$!
# '';
# }];
# displayManager.defaultSession = "hyprland";
# displayManager.lightdm = {
# enable = true;
# # Workaround for autologin only working at first launch.
# # A logout or session crashing will show the login screen otherwise.
# extraSeatDefaults = ''
# session-cleanup-script=${pkgs.procps}/bin/pkill -P1 -fx ${pkgs.lightdm}/sbin/lightdm
# '';
# };
libinput.enable = true;
};
hardware.bluetooth.enable = true;
hardware.pulseaudio.enable = lib.mkDefault true; # mkDefault to help out users wanting pipewire
networking.networkmanager.enable = true;
networking.wireless.enable = false;
powerManagement.enable = true;
}

View file

@ -32,6 +32,7 @@
"syncthing"
"mount-rock5b"
"adb"
"calibre"
]
++ [
./disko.nix

View file

@ -103,6 +103,11 @@ in {
type = lib.types.anything;
default = inputs.nixpkgsUnstable;
};
homeManager = lib.mkOption {
description = "Used home-manager";
type = lib.types.anything;
default = inputs.homeManager;
};
vpn = {
ip = lib.mkOption {
description = "Wireguard VPN ip";
@ -206,7 +211,6 @@ in {
nixpkgs.overlays = config.overlays;
})
"${self.outPath}/hosts/${hostname}"
inputs.lix-module.nixosModules.default
]
++ (lib.optionals (config.secrets != []) [
inputs.agenix.nixosModules.default
@ -234,7 +238,7 @@ in {
user = config.extraHmModulesUser;
extraHmModules = config.extraHmModules;
in [
inputs.homeManager.nixosModule
config.homeManager.nixosModule
({
config,
pkgs,

View file

@ -55,6 +55,7 @@
"helix"
"shell"
"element"
"zmkbatx"
"emacs"
"firefox"
"gpg"
@ -125,10 +126,10 @@
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
hardware.enableRedistributableFirmware = lib.mkDefault true;
hardware.opengl = {
hardware.graphics = {
enable = true;
driSupport = true;
driSupport32Bit = true;
# driSupport = true;
enable32Bit = true;
};
zramSwap = {

View file

@ -1,6 +1,7 @@
{
fleetModules,
pkgs,
fleetFlake,
config,
...
}: {
@ -27,6 +28,7 @@
# "matrix"
"forgejo"
# "jellyfin"
"immich"
]
++ [
./disko.nix
@ -34,19 +36,23 @@
# FIXME why is this needed?
nixpkgs.config.permittedInsecurePackages = ["openssl-1.1.1w"];
boot.kernelPackages = pkgs.linuxKernel.packages.linux_testing;
# boot.kernelPackages = pkgs.linuxKernel.packages.linux_6_8;
# boot.kernelPackages = pkgs.linuxPackagesFor pkgs.linux_testing;
# boot.kernelPackages = pkgs.linuxPackagesFor (pkgs.linux_testing.override {
boot.kernelPackages = let
pkgs = fleetFlake.inputs.nixpkgsUnstableForSisko.legacyPackages.aarch64-linux;
in
pkgs.linuxPackagesFor pkgs.linux_testing;
# boot.kernelPackages = pkgs.linuxPackagesFor (pkgs.linux_6_9.override {
# argsOverride = {
# src = pkgs.fetchFromGitLab {
# domain = "gitlab.collabora.com";
# owner = "hardware-enablement/rockchip-3588";
# repo = "linux";
# rev = "b07290444a7fb5cf56a5200d2bad7f927e77e8b8";
# sha256 = "sha256-ruD9+vRwFQOXf5PWB+QxtA8DWfOcIydD0nSekoQTqWw=";
# rev = "23bb9c65a88c114bbe945b7ef5366bb02d3d9b80";
# sha256 = "sha256-6TygOl5r7/N2jlcPznWlvJfVVeXKSR8yMoGuTDbIdTA=";
# };
# version = "6.7";
# modDirVersion = "6.7.0";
# version = "6.9";
# modDirVersion = "6.9.0";
# };
# });

17
hosts/test/default.nix Normal file
View file

@ -0,0 +1,17 @@
{
fleetModules,
lib,
config,
pkgs,
...
}: {
imports =
fleetModules [
"common"
"ssh"
"nix"
]
++ [
./disko.nix
];
}

33
hosts/test/disko.nix Normal file
View file

@ -0,0 +1,33 @@
{
disko.devices = {
disk = {
vdb = {
device = "/dev/disk/by-path/pci-0000:02:00.0-nvme-1";
type = "disk";
content = {
type = "gpt";
partitions = {
ESP = {
end = "500M";
type = "EF00";
content = {
type = "filesystem";
format = "vfat";
mountpoint = "/boot";
};
};
root = {
name = "root";
end = "-0";
content = {
type = "filesystem";
format = "bcachefs";
mountpoint = "/";
};
};
};
};
};
};
};
}

View file

@ -12,6 +12,7 @@
sisko = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIKPBaKPx0HsJpGmMT//vo2GXvGh4ULoItq49ltCMzVw4";
pbp = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFF05LScu9m5BXMlFAT1g+g/AkAi7kvq1dY6W3Rzqq3f";
picard = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ1+1z1IsLVJ6aGarMgzw3NbmFKcpYVgdUjl7xDsewxT";
deltaflyer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPETMwELvGTnhKJbpK0oFs4lK8vm/kV9KdgL9wufYDDQ";
};
};
}

View file

@ -1,8 +1,8 @@
{
services.adguardhome = {
enable = true;
port = 3000;
settings = {
bind_port = 3000;
openFirewall = true;
};
};

View file

@ -5,6 +5,7 @@
fleetHmModules,
fleetFlake,
vpn,
options,
...
}: let
cfg = config.ccr;
@ -69,46 +70,49 @@ in {
};
};
config = lib.mkIf cfg.enable {
# FIXME shouldn't set these groups by default
ccr.extraGroups = ["wheel" "fuse" "video" "dialout" "systemd-journal" "camera"];
ccr.modules = ["shell" "git" "nix-index" "btop"];
config = lib.mkIf cfg.enable (lib.mkMerge [
(lib.optionalAttrs (builtins.hasAttr "backup" options) {
backup.paths = cfg.backupPaths;
})
{
# FIXME shouldn't set these groups by default
ccr.extraGroups = ["wheel" "fuse" "video" "dialout" "systemd-journal" "camera"];
ccr.modules = ["shell" "git" "nix-index" "btop"];
backup.paths = cfg.backupPaths;
users.users.${cfg.username} = {
inherit (config.ccr) hashedPassword extraGroups description;
uid = 1000;
isNormalUser = true;
shell = cfg.shell;
openssh.authorizedKeys.keys = config.ccr.authorizedKeys;
};
users.users.${cfg.username} = {
inherit (config.ccr) hashedPassword extraGroups description;
uid = 1000;
isNormalUser = true;
shell = cfg.shell;
openssh.authorizedKeys.keys = config.ccr.authorizedKeys;
};
programs.fish.enable = true;
programs.fish.enable = true;
services.getty.autologinUser =
if config.ccr.autologin
then cfg.username
else null;
services.getty.autologinUser =
if config.ccr.autologin
then cfg.username
else null;
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.${cfg.username} = {
imports =
fleetHmModules cfg.modules
++ [
{
_module.args = {
inherit (config.age) secrets;
inherit (cfg) username;
inherit vpn;
hostname = config.networking.hostName;
};
}
]
++ cfg.extraModules;
home.packages = cfg.packages;
home.stateVersion = config.system.stateVersion;
};
};
home-manager.useGlobalPkgs = true;
home-manager.useUserPackages = true;
home-manager.users.${cfg.username} = {
imports =
fleetHmModules cfg.modules
++ [
{
_module.args = {
inherit (config.age) secrets;
inherit (cfg) username;
inherit vpn;
hostname = config.networking.hostName;
};
}
]
++ cfg.extraModules;
home.packages = cfg.packages;
home.stateVersion = config.system.stateVersion;
};
}
]);
}

View file

@ -15,6 +15,7 @@
"matrix.aciceri.dev"
"syncv3.matrix.aciceri.dev"
"jellyfin.aciceri.dev"
"photos.aciceri.dev"
];
apiTokenFile = config.age.secrets.cloudflare-dyndns-api-token.path;
};

View file

@ -4,8 +4,7 @@
...
}: {
virtualisation.podman.enable = true;
virtualisation.docker.enable = true;
users.users.${config.ccr.username}.extraGroups = ["docker"];
# virtualisation.docker.enable = true;
environment.systemPackages = with pkgs; [
docker-compose
podman-compose

View file

@ -1,81 +1,221 @@
{
config,
fleetFlake,
pkgs,
lib,
...
}: let
typesenseApiKeyFile = pkgs.writeText "typesense-api-key" "12318551487654187654"; # api key not ime, stolen from upstram PR
pkgsImmich = fleetFlake.inputs.nixpkgsImmich.legacyPackages.${pkgs.system}.extend (final: prev: {
python = prev.python.override {
packageOverrides = final: prev: {
insightface = prev.insightface.overrideAttrs (_: {
pythonCatchConflictsPhase = "";
});
};
};
});
# { lib, pkgs, config, ... }:
# let
# immichRoot = "/mnt/hd/immich";
# immichData = "${immichRoot}/data";
# # immichVersion = "v1.105.1";
# immichVersion = "v1.105.1";
# sharedEnv = {
# # You can find documentation for all the supported env variables at https://immich.app/docs/install/environment-variables
# # The location where your uploaded files are stored
# UPLOAD_LOCATION="./library";
# DB_DATA_LOCATION="./postgres";
# IMMICH_VERSION=immichVersion;
# DB_PASSWORD="postgres";
# DB_USERNAME="postgres";
# DB_DATABASE_NAME="immich";
# DB_HOSTNAME="postgres";
# REDIS_HOSTNAME = "redis";
# };
# postgresRoot = "${immichRoot}/pgsql";
# machineLearning = "${immichRoot}/ml-cache";
# in {
# systemd.tmpfiles.rules = [
# "d ${immichRoot} 770 ccr wheel"
# "d ${immichData} 770 ccr wheel"
# "d ${postgresRoot} 770 ccr wheel"
# "d ${machineLearning} 770 ccr wheel"
# ];
# virtualisation.docker.enable = lib.mkForce false;
# virtualisation.podman.enable = lib.mkForce true;
# virtualisation.podman.dockerSocket.enable = lib.mkForce true;
# virtualisation.podman.defaultNetwork.settings.dns_enabled = lib.mkForce true;
# networking.firewall.interfaces."podman+".allowedUDPPorts = [53 5353];
# environment.systemPackages = [
# pkgs.arion
# ];
# virtualisation.arion = {
# backend = lib.mkForce "podman-socket";
# projects.immich = {
# serviceName = "immich";
# settings = {
# project.name = "immich";
# networks.default = {
# name = "immich";
# };
# services = {
# "server" = {
# service = {
# image = "ghcr.io/immich-app/immich-server:${immichVersion}";
# container_name = "server";
# command = ["start.sh" "immich"];
# environment = sharedEnv // {
# # NODE_ENV = "production";
# };
# ports = [
# "2283:3001"
# ];
# volumes = [
# "${immichData}:/usr/src/app/upload:rw"
# "/etc/localtime:/etc/localtime:ro"
# ];
# depends_on = ["redis" "postgres"];
# restart = "always";
# };
# };
# "microservices" = {
# service = {
# image = "ghcr.io/immich-app/immich-server:${immichVersion}";
# container_name = "microservices";
# command = ["start.sh" "microservices"];
# environment = sharedEnv;
# volumes = ["${immichData}:/usr/src/app/upload:rw"];
# depends_on = ["redis" "postgres"];
# restart = "always";
# };
# };
# "machine_learning" = {
# service = {
# image = "ghcr.io/immich-app/immich-machine-learning:${immichVersion}";
# container_name = "machine_learning";
# volumes = [
# "${machineLearning}:/cache"
# ];
# restart = "always";
# environment = sharedEnv // {
# # NODE_ENV = "production";
# };
# };
# };
# "redis" = {
# service = {
# image = "docker.io/redis:6.2-alpine";
# container_name = "redis";
# restart = "always";
# tmpfs = ["/data"];
# };
# };
# "postgres" = {
# service = {
# image = "docker.io/tensorchord/pgvecto-rs:pg14-v0.2.0";
# container_name = "postgres";
# volumes = [
# "${postgresRoot}:/var/lib/postgresql/data"
# ];
# restart = "always";
# environment = {
# POSTGRES_PASSWORD = sharedEnv.DB_PASSWORD;
# POSTGRES_USER = sharedEnv.DB_USERNAME;
# POSTGRES_DB = sharedEnv.DB_DATABASE_NAME;
# POSTGRES_INITDB_ARGS = "--data-checksums";
# };
# };
# };
# };
# };
# };
# };
# }
{config, ...}: let
immichHost = "immich.example.com"; # TODO: put your immich domain name here
immichRoot = "/mnt/hd/immich"; # TODO: Tweak these to your desired storage locations
immichPhotos = "${immichRoot}/photos";
immichAppdataRoot = "${immichRoot}/appdata";
immichVersion = "release";
# immichExternalVolume1 = "/tank/BackupData/Google Photos/someone@example.com"; # TODO: if external volumes are desired
postgresRoot = "${immichAppdataRoot}/pgsql";
postgresPassword = "immich"; # TODO: put a random password here
postgresUser = "immich";
postgresDb = "immich";
in {
imports = ["${fleetFlake.inputs.nixpkgsImmich}/nixos/modules/services/web-apps/immich.nix"];
# The primary source for this configuration is the recommended docker-compose installation of immich from
# https://immich.app/docs/install/docker-compose, which linkes to:
# - https://github.com/immich-app/immich/releases/latest/download/docker-compose.yml
# - https://github.com/immich-app/immich/releases/latest/download/example.env
# and has been transposed into nixos configuration here. Those upstream files should probably be checked
# for serious changes if there are any upgrade problems here.
#
# After initial deployment, these in-process configurations need to be done:
# - create an admin user by accessing the site
# - login with the admin user
# - set the "Machine Learning Settings" > "URL" to http://immich_machine_learning:3003
services.immich = {
package = pkgsImmich.immich;
enable = true;
server.mediaDir = "/mnt/hd/immich";
server.typesense.apiKeyFile = typesenseApiKeyFile;
virtualisation.oci-containers.containers.immich_server = {
image = "ghcr.io/immich-app/immich-server:${immichVersion}";
ports = ["127.0.0.1:2283:3001"];
extraOptions = [
"--pull=newer"
# Force DNS resolution to only be the podman dnsname name server; by default podman provides a resolv.conf
# that includes both this server and the upstream system server, causing resolutions of other pod names
# to be inconsistent.
"--dns=10.88.0.1"
];
cmd = ["start.sh" "immich"];
environment = {
IMMICH_VERSION = immichVersion;
DB_HOSTNAME = "immich_postgres";
DB_USERNAME = postgresUser;
DB_DATABASE_NAME = postgresDb;
DB_PASSWORD = postgresPassword;
REDIS_HOSTNAME = "immich_redis";
};
volumes = [
"${immichPhotos}:/usr/src/app/upload"
"/etc/localtime:/etc/localtime:ro"
# "${immichExternalVolume1}:${immichExternalVolume1}:ro"
];
};
services.typesense = {
enable = true;
# In a real setup you should generate an api key for immich
# and not use the admin key!
apiKeyFile = typesenseApiKeyFile;
settings.server.api-address = "127.0.0.1";
virtualisation.oci-containers.containers.immich_microservices = {
image = "ghcr.io/immich-app/immich-server:${immichVersion}";
extraOptions = [
"--pull=newer"
# Force DNS resolution to only be the podman dnsname name server; by default podman provides a resolv.conf
# that includes both this server and the upstream system server, causing resolutions of other pod names
# to be inconsistent.
"--dns=10.88.0.1"
];
cmd = ["start.sh" "microservices"];
environment = {
IMMICH_VERSION = immichVersion;
DB_HOSTNAME = "immich_postgres";
DB_USERNAME = postgresUser;
DB_DATABASE_NAME = postgresDb;
DB_PASSWORD = postgresPassword;
REDIS_HOSTNAME = "immich_redis";
};
volumes = [
"${immichPhotos}:/usr/src/app/upload"
"/etc/localtime:/etc/localtime:ro"
# "${immichExternalVolume}1:${immichExternalVolume1}:ro"
];
};
systemd.tmpfiles.rules = [
"d /mnt/hd/immich 770 immich immich"
];
virtualisation.oci-containers.containers.immich_machine_learning = {
image = "ghcr.io/immich-app/immich-machine-learning:${immichVersion}";
extraOptions = ["--pull=newer"];
environment = {
IMMICH_VERSION = immichVersion;
};
volumes = [
"${immichAppdataRoot}/model-cache:/cache"
];
};
# networking.firewall.allowedTCPPorts = [8080];
# virtualisation.oci-containers.containers.immich = {
# image = "ghcr.io/imagegenius/immich:latest";
# extraOptions = ["--network=host"];
# volumes = [
# "/mnt/immich/photos:/photos"
# "/mnt/immich/config:/config"
# ];
# environment = {
# PUID=builtins.toString config.users.users.ccr.uid;
# PGID=builtins.toString config.users.groups.wheel.gid;
# TZ="Europe/Rome";
# DB_HOSTNAME="localhost";
# DB_USERNAME="postgres";
# DB_PASSWORD="postgres";
# DB_DATABASE_NAME="immich";
# DB_PORT="54320";
# REDIS_HOSTNAME="localhost";
# DISABLE_MACHINE_LEARNING="false";
# DISABLE_TYPESENSE="false";
# };
# };
virtualisation.oci-containers.containers.immich_redis = {
image = "redis:6.2-alpine@sha256:80cc8518800438c684a53ed829c621c94afd1087aaeb59b0d4343ed3e7bcf6c5";
};
# virtualisation.oci-containers.containers.immich-redis = {
# image = "redis";
# extraOptions = ["--network=host"];
# };
# virtualisation.oci-containers.containers.immich-postgres = {
# image = "postgres:14";
# extraOptions = ["--network=host"];
# environment = {
# POSTGRES_USER = "postgres";
# POSTGRES_PASSWORD = "postgres";
# POSTGRES_DB = "immich";
# PGPORT = "54320";
# };
# volumes = [
# "/mnt/immich/postgres:/var/lib/postgresql/data"
# ];
# };
virtualisation.oci-containers.containers.immich_postgres = {
image = "tensorchord/pgvecto-rs:pg14-v0.1.11";
environment = {
POSTGRES_PASSWORD = postgresPassword;
POSTGRES_USER = postgresUser;
POSTGRES_DB = postgresDb;
};
volumes = [
"${postgresRoot}:/var/lib/postgresql/data"
];
};
}

5
modules/immich/env Normal file
View file

@ -0,0 +1,5 @@
PUBLIC_LOGIN_PAGE_MESSAGE=
IMMICH_WEB_URL=http://immich-web:3000
IMMICH_SERVER_URL=http://immich-server:3001
IMMICH_MACHINE_LEARNING_URL=http://immich-machine-learning:3003

View file

@ -15,7 +15,6 @@
auto-optimise-store = true;
trusted-users = [
"root"
config.ccr.username
"@wheel"
];
netrc-file = "/etc/nix/netrc";
@ -23,14 +22,20 @@
# "s3://cache?profile=default&region=eu-south-1&scheme=https&endpoint=cache.aciceri.dev"
"https://cache.iog.io"
"https://cache.lix.systems"
"https://nix-community.cachix.org"
"https://mlabs.cachix.org"
];
trusted-public-keys = [
# "cache.aciceri.dev~1:nJMfcBnYieY2WMbYDG0s9S5qUhU+V4RPL+X9zcxXxZY="
"hydra.iohk.io:f/Ea+s+dFdN+3Y/G+FDgSq+a5NEWhJGzdjvKNGv0/EQ="
"cache.lix.systems:aBnZUw8zA7H35Cz2RyKFVs3H4PlGTLawyY5KRbvJR8o="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"mlabs.cachix.org-1:gStKdEqNKcrlSQw5iMW6wFCj3+b+1ASpBVY2SYuNV2M="
];
};
nixPath = ["nixpkgs=${fleetFlake.inputs.nixpkgsUnstable}"];
extraOptions = ''
experimental-features = nix-command flakes ca-derivations impure-derivations
builders-use-substitutes = true
@ -42,55 +47,58 @@
options = "--delete-older-than 180d";
};
registry = lib.mkForce {
nixpkgs.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
nixpkgsUnstable.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
nixpkgsStable.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsStable;
};
n.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
nixfleet.to = {
type = "path";
path = "/home/${config.ccr.username}/projects/aciceri/nixfleet";
};
fleet.to = {
type = "path";
path = "/home/${config.ccr.username}/projects/aciceri/nixfleet";
};
ccrEmacs.to = {
type = "path";
path = "/home/${config.ccr.username}/.config/emacs";
};
};
registry = lib.mkForce ({
nixpkgs.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
nixpkgsUnstable.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
nixpkgsStable.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsStable;
};
n.to = {
type = "path";
path = fleetFlake.inputs.nixpkgsUnstable;
};
}
// (lib.optionalAttrs (builtins.hasAttr "ccr" config) {
nixfleet.to = {
type = "path";
path = "/home/${config.ccr.username}/projects/aciceri/nixfleet";
};
fleet.to = {
type = "path";
path = "/home/${config.ccr.username}/projects/aciceri/nixfleet";
};
ccrEmacs.to = {
type = "path";
path = "/home/${config.ccr.username}/.config/emacs";
};
}));
distributedBuilds = false;
buildMachines = lib.lists.optional (config.networking.hostName == "picard") {
hostName = "sisko.fleet";
system = "aarch64-linux";
maxJobs = 4;
supportedFeatures = ["kvm" "nixos-test" "big-parallel" "benchmark"];
protocol = "ssh-ng";
sshUser = "root";
sshKey = "/home/${config.ccr.username}/.ssh/id_rsa";
};
# ++ (lib.lists.optional (config.networking.hostName == "picard") {
# hostName = "mac.staging.mlabs.city";
# system = "x86_64-darwin";
# maxJobs = 4;
# supportedFeatures = ["kvm" "nixos-test" "big-parallel" "benchmark"];
# protocol = "ssh-ng";
# sshUser = "root";
# sshKey = "/home/${config.ccr.username}/.ssh/id_rsa";
# });
distributedBuilds = true;
buildMachines =
lib.lists.optional (config.networking.hostName == "picard") {
hostName = "sisko.fleet";
system = "aarch64-linux";
maxJobs = 7;
supportedFeatures = ["kvm" "nixos-test" "big-parallel" "benchmark"];
protocol = "ssh-ng";
sshUser = "root";
sshKey = "/home/${config.ccr.username}/.ssh/id_rsa";
}
++ (lib.lists.optional (config.networking.hostName == "picard") {
hostName = "mac.staging.mlabs.city";
system = "x86_64-darwin";
maxJobs = 4;
supportedFeatures = ["kvm" "nixos-test" "big-parallel" "benchmark"];
protocol = "ssh-ng";
sshUser = "root";
sshKey = "/home/${config.ccr.username}/.ssh/id_rsa";
});
};
}

View file

@ -35,6 +35,18 @@
proxyPass = "http://localhost:${builtins.toString config.services.invidious.port}";
};
};
"photos.aciceri.dev" = {
extraConfig = ''
client_max_body_size 50000M;
'';
forceSSL = true;
enableACME = true;
locations."/" = {
proxyPass = "http://localhost:2283";
proxyWebsockets = true;
};
};
# "jellyfin.aciceri.dev" = {
# forceSSL = true;
# enableACME = true;

Binary file not shown.

View file

@ -1,31 +1,32 @@
age-encryption.org/v1
-> ssh-rsa /AagBw
e/Y3VF5qpO1NGFkw8OvTLlS27Ot392y5PE2XBK0W6kzQVFg87MZHfwmvYSZBEFe+
gKcdfZ67aX/PoVXr90hJPy69etv7YhEW7/FS/ef29QcF8tZF6yuF6m+ldU49vfgt
QVI5OiNSXcf6hPPMJKUYkmEm+0TnETkE76VxVWiySMAv5d90gQ94YrU/ZSj730JG
VXXIhlNQ/u/8HI7t2liwXMqao43dU3hTsMeQG0EeT9K4jlcwy7EKrKCTxLjPCzHw
ZonRrtCesYn6lIm0VZcxmABn2sZekex5QvAGurfN6WvWY+vZxrzyM+qRgMvnSMab
s0/sqqmzXxFk1n0LC6xLv4IGLGvJpySUS/1Wyp9Nc4D/8+7qQbVpLPxJk7Eyo14I
jgvAwOMIDEG2sB5NMrOk+7Kj8okBqlPU35HQLtcy2SMvq0N7pguGe+1k5zNufT+e
mm7fjPpul/Osp5q/XWcyOlJO24X9M/uzm43u2Vj6v5Mzjnwrv0VWc+522pLexnBf
gm/MG5Y+/xiFdvCbGrYuP6WmPlWHzB1y0XlDNg93TUa6F5lh6n0U44aJ/nWr2GY7
MYCZkalftw0C+kXgSngQLOf0Uj0WLPugMfwsuZyvesQUDeEpxhcPYV77cpW4OPxe
M9+NZJaavSsQBugW0iaE7+zrAU4y547AqqjGNmA2X/c
LejiskurhcggIU/f+WpXpYAU+5Ct+wgO6qLU4l8Zw991t7+LQoDYdZThQt4aFDRY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-> ssh-rsa QHr3/A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-> ssh-ed25519 /WmILg fYkFiW4cU6EGdY8IM5JTn96K2D+SXV2ClWQUmX7jmyQ
4K3OgB/nio8D3HdhjdGBF53Wl9pPNKdrGgg65SMrTAk
-> ssh-ed25519 +vdRnA RuHhMY7yemWrFkekX096f5G+3go+HK2YZfZ1edFkUyo
5hnY+JJozH5KrMLCECTuJjYoQfhj/0U5bcvxNIuzEw8
--- /ex5rKGPkyXdSW5wbipbDHltDF8GZ2k3mvGT26sRAZk
°™BLºHòígÝ3¤Ö"§\~ ýPS<50>m§sm²7;Bb šBŒâ´VK84ß5t¶!T²ø4Z9(ßES.o}ìwrk †$šÜ]ñ?,Ú$g0-x¼À[_ý"Œ
rSEk04k0mOPyll5cN5D9ktP9WTb39cUqFX8EGG8BhIWd9xwO7vF1xWXtCzpDOYCv
PxfqiwCsNcCCNAd1CWYT52PY6P9zaTOV/ptk2U8nhpi8s6EDdyne3z8zR0SS1Wvz
53Ml1fUjiTguulzANoRnZtEsaqoF0VPW03wjkTl6XUZUrNMC0Kgq6VP1tmt0kn08
eGuD/P8BGiaaKAVN1iJK6U58O43Y4uB0od913BgALKsBjtcH4WvHcgcF359YrdNx
qwQkiWTDjDtuOKm9djuZyuewosRAYsCZmHONmNnMGMVeZbcUipFMHsjeU3CfidaE
pfxnAqB2G8x1M8qg9w7IiOxH5cH/qcfGk9yIxt25E0pyvaLziYCsKxzhuwnPW5sR
ZOgIeECljKTywStX13/ze1hlWikj5ej3JerEbKn1WOD8NEV2vPP/9G9EHLJth2fT
Si+2ZosRyWPmg1M391Dlr99Rjb/mXCtW3XBX9GeuL/puwg3I9QnGo5CQHx+GarhW
RBcRO9SAYhoQtxba0/0mm80RxKn8Tdbe5ej6yzD7gdkywTArIRM/rMLLyKi2Im/k
lDDDIjYp+fje0iUaQQO6K+hhW01EnG2HrELdq/VYs01tclGPdK6lI3lloeOXJ96c
crlJfD+b5tK06w91w89w+itqUPIgZsbiq5qVFhfKyRY
-> ssh-ed25519 /WmILg RogWvabCGwzKFKQ78EVKpnpupZr5tKOXNsL6mpE1pzg
QQcSAgC6Lb/Fk9eYG1q+o12ty/KyhFJbZyVB+3ANSxY
-> ssh-ed25519 +vdRnA jBfvf1o18lTbKfx2tKMzUJBmws8s5MMwGDlhUDHn5zY
nZLNNbcy21SXXlTLT1tCRDfvlYOE347p6R4CLmEiWw8
--- xARfOI6GMc1FZ580lD6fGWmk2AjJVIoxsD+YETvcT0o
mBË'ÂÚ‘ë"q
űoŮ3»fŁôŤ˝xŇůđn_lÝëG'¬U5‡:?˘QźÉ§q-ržÁLTvÇśÓđ~'ІiÎ{Ç…Učá8Ţ!ó±xí_8P©ąaNxd­°UŻ®€ý

View file

@ -1,30 +1,31 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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P7Wn4/FoKxWdlxKlaSW05cajdFzxCZZaASHvHHvzJGxPsX/gmCXpsZ7nFZlJvtfV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-> ssh-rsa QHr3/A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-> ssh-ed25519 q+UPnA LwTheu9P44Ck2svaymUiIlBhIka26KA/10Rq3tWNCmw
p6+PVYapVanJ3RJdx3SXYHM61DzSEZ6aZVVuEi44BcE
--- RT1bAdguuX89XQSBppUNoIqX+l+5uh30rkQNC3Mqcbc
¨!>ƒŠ™wïæ§ÁMµÈ“¿Â®D%P“Šr¶âfór®'Á‰öW®DBOð)ÔeU¯òágÂ[ŒÒÒ§m€¤üV‰+D |N×ÂM<C382>Í× „“zô<7A>´ý(»}ij²ri >æâZ ¶Š°áRÒÆGé„[‰•
dxo°Ï8}VtûCÂNÊÕà>
ta6ztr+/tCBmQKGub2ZCB79SrN6Nna3fxStfGaLqgmEUsnM2kAh6Hp9+W3jbFEWM
5L2mMusmoytYtXcR/JjAK8F199p/TrJifXHTnot6dmHKm428tauFRjMxsbWsaT6i
X2rqtrIwXW6QEUFuya+WHI6t29aMZipzmhXjpTdcWyorUyGyNo9YaOt5ohRXzTPW
f3ELf1aYVBZMxXmVC6E4cbH8dOWKlus/TPTcOirJzR0m3KjeAr5CNRct2qIVxixT
WMViwu9xQgWjcUfra8YKO8LEBf/PaEk5BeszIHt7qwWr9sJt4v+206LNQvW8row/
sIgdllzVklaqZtkukger7FHkxSasQXLdP1DPE9h4bwSN1H2pEMgJlAVGt8/m4n6T
w5qUeDr2HV5kuz/kjdJl1hv6Ihf4de6yS2+7jtMN1FnICIVq67A/shsvA/JDNoOz
kLM4WdgBVsqtGCEfmXQCRbz96yBb+ie3N8raJDKhNwWuQ4f3YJNwpVKmySrfUTly
WFjWeuTDXv8LwHbUWtzFaXBmoS97EIlRibZqK0caOpmUU+doG03vDlJskfEfBD00
nKBPTIiKGoQkbnhMl8YMW7uqhZVvJbPtPGUCpq2w87Um0lh5BuvBTPxNEQ26A/sJ
XDByA5rIZqVIw29CjhBsZptR83nhFSa3OUshxoYR6xY
-> ssh-ed25519 q+UPnA Y8JxsQsN0qxfPDBVhiVuUYL3OImhUc4RyRpxr4Fff1E
Ai1PLAYzoCrm6H9P+U/jA93IE0Mgc2B71AraDnsB6Lc
--- EAiuid1wt44o2ZGCLWO0tCcWm2ao7CuHrYdGmYx+yFQ
ƒðE'Ú¨Jý'î”êÈT\¡ˆ…S0:#z<>
Í×íý®Ù`¥ä˵˜àÍiaG‰…vBs“©…Ú;éÒC×ÉH=Å™‡Nu Ê©ßòR3¯×ŠBz‡Ç…ç†ïŽ»+¡×c†7­%†Z¾uw)jÕ;ø¹iœ²:·•Ås
KäŽi„a=#/O·)4ªï

Binary file not shown.

Binary file not shown.

View file

@ -1,30 +1,30 @@
age-encryption.org/v1
-> ssh-rsa /AagBw
GUZxWUXT8fTjT55D1hf93Juw4BUEGxhmvWbHhY0GqEmxaT5KGDppEKm5PEg2dEvY
9lVvJ5gOgzgINPPekNOnMdxX1YVKgppgvKEA/dVY/5u8qSNuOIsi2O7F4x+olEUB
28W5QsBtJjmpwR5C+vVAfKlvoMxvA7dtsRz+DhqvZHauyCGfSKRPWztGFRdwFC54
EvQygYy4GsEQiRsmE9zBdSKm8h26PRvPnwbfNCR9GvKWLElNCCHuVO3KXIOE5SLb
qOWhsS/c7uTzd2TjJ7K5x6VUWabQfMRORtD2O/7TkI5aTwR6iTEY0G8++U7FAs5O
VtN5Tr7Da3n7Zt186/zy0qpG26QCQcqA4UhHwY5nZn5YzxeqV9SfyEF8cOoNgN2+
XiuWUS302BS6yecT0Z3xvQ1q5k4W21rhU+ANMhvASmaB/sHnzO8N6sTWrWYSgSE6
05ig226JIM3HA32nGtGL0KRQBf5J5WvhfzpMs3iuHIXfuxlFv6s5T8sYLJvbXUwY
I/m9Sq5Qp7x0/gSYqzrChlajrrTSDdBeJM2nRiCRL1mBq3REJGkQyTOk4GqIiol2
LYRpZHiwANQtRvlJNHjFyKnXXuGE8H51xj6EXCh0xRUc5NEW10nObfnU3Y510fhm
vxcAlLhOywpGHkJQVa4MpO+9Z9FSIofFRd6OYdMTzI0
K5GB/dRGaRFYq0dxuUFPubpdceMq6jOGSWuFuKgtRbtvC+P7qd8g56AZYTyo97jZ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-> ssh-rsa QHr3/A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-> ssh-ed25519 +vdRnA FM8l5xooEHvbwvTsM70TrDNxLATyinEftcFDy4qfWh8
0NRZMOZYUVhLtAxbUVfvir1uiBJJmH7tv4+cgvnb9cY
--- 5OwygAtbwYRQ3akLwQiXjG0ECE78dg02TtwurYRui9Q
qÞ6§Üñ
ÅYªa­ÁßZ,d¬ùpï&PG-3ó^=#aγÞQЊ=†2y9þÝGmŠ<6D>ÿiUîÖN÷ý<C3B7>MÀù%ö“ÎpQRS, ]òPiùÿéa´y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-> ssh-ed25519 +vdRnA lCY+mIpl7nNGi4wD5Z2CJPlIpqTECUyOncW+FuKzqxs
3g0+X5fVGjo+EnETlDlO1VQl83Loi4bEBHshRz1/q0A
--- iUTAy7LeDZTABLGEMw/Bkc/qbujLcdpHdQ/TuodhmaM
Ó¤şţµ˝;{Ö?‡®Ă`t™Ö8Ź+—­‡ţt˙ý0m 0ÁçľÜĽůě”ĘAÓŁm¨x}ÁŚZ2žóŔ„ľN±Ö2
xĺ<‡IVüć#­W„ôúŠLĹÚż

Binary file not shown.

View file

@ -1,30 +1,29 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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KzSLRxyFMN7W5Qt1uKkq6Kv83/tCQVf1DtjEbXak8DQhEfBH+CCQkVGqq4ainTxW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-> ssh-rsa QHr3/A
k9zecZPt3mXsc/PE5DsETkoppXw7PEXUKPMg2GpjxmwJwAobB7DrmxQDpUq1ImQg
1A32jJTetoVuebY2WSMefYHnIRpV2OFawbt9xqlb2N8UJm+nYMhdMlDRaKjuv4/0
+Qjfe4XpOOAKzO+ghqNY3L+psw6sh+abBpA9eQMYuVWnd7ryp9Pufq3I/98eMJxO
eAN2VlaFuKZ211ho6TaAlFF8inEl9Y/BnGsjFjq0DofmG8xFfN9qR8ISc1Yktp5R
V7mCpxq7rCCARX+65LzE6jPlqTX32bYRzOlJRFukgD0HZ8amDacyC6JBAm/+d7OH
YUtPIesMJLu1hJgTWWrgAOdGcFPm7HX1XsbPnseqT5vK6QQ9Yu5l+KzTTy0cRr/y
PV9917aaC1FexQS2SaD+SKHlOOX4rmPQhrqIhmsbshFU30kps9TGYW12Dwpsp19h
uzpNAbZ69Vif9Clh7A7p7b+Ds9KKhEZSF0HXdFB8GQ5Ru1aNDJDxQu9sLLi/oZ7l
oN/AXBT0XiLTasPM9qR0uGk6yoS4sfUKH4t7GLBAc8UTLl3Lf7qLf1gtYLgrBptF
KCQCMq+MTrHIdjTchAdvbwthW8M7QoeB6OLcW73+0L5tuq4rOqadnq+6wODQbYg+
4A+C3cUhndnSEQut+GLGEX4TLHgGNU9kiL9jF11FDqE
-> ssh-ed25519 /WmILg 3o1zcD8VTn7yU5QbqORPGlMR1U38Sp6B/a4EMOfl5gc
O4i2VexgADirOZ+Ptu2eNd+IuHlFvCYbaBSE7R2LIK0
--- 2Hkjuqj+B/gS/JcW256ZrtUlWE001xGaA8W7OiJWm0Y
¿Xª=Ì<Ø:Ï(Ô^<5E>
¾{ ùœ)Wãê¼5*VkW%k!âhwõ<77>º»nŠØXaú1`=§ÕËŒ‰Fiœ °z†Ü[&–ì[´øßÎ.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-> ssh-ed25519 /WmILg DXuUNsdlALUPr3ULUpoEQ5fRlhRkrnUcHTWAxdy7DCY
+StTEHWk8y+fU+TxXfmh/EoNovME9arXHMu1m1HLeQM
--- VTojICHlhNNmITiRWucloGuIArtXxIV9ttGrK2DROgw
PcëÌ!&|Ú)«Ò2Mˆ]Pä,§\0äÒ%%ÍOó»2AßÜr4e(VŽm»ž&Âሗ²`ºÛ\­L¸ÊHnP­ß gvp½çt5pÎT°

Binary file not shown.

View file

@ -1,34 +1,33 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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l8D9gFFyPNJpXMGJoPt1WNpR/4JDI5rgr1h3kN2kNOOP4nBmE0NtbmgmTrBrAmfM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-> ssh-rsa QHr3/A
B2YBE0TJ9CKMWcGctzY14eYIu7ND0045uPycpaP5NzbTtm0GhXu0K9BJsWCrgnQ3
5HV+tORW7s5qEVjcN1ARebLQjpxiMmTPVdQLxGnjEgecSfNIvvOYTZBYiD2cFHk8
ZMUYj52r02j05DGdTX0VUOd56k6NKxe5XzEGcFvF+AjMBvg6KDPiKkfnBoAe92Cv
TdfLAah3DmbARGOYgi9JZPr36ktFC+bxdprbfFuBxroDNtJeJVTlAA4v+ao2iefK
OQ7qBGsSLud5HdA1WqfKYmMW0buqDnRjxcX026GpwC2NOP41RuG8ivQGcyVeCYAU
cYAr/gQlWv6JyhsLE0fOr7Wt6yDrfO7f8aTz9lnyC3e6kMfIX7Bc6Akgs2ndnIOl
Wa6ZxnTKD1w9k3YY+onFJL6COa//eHzkCXpOoQ4K+OmNAzm7o7F1+oAiNgYk5Tuo
jRWh3rQHgqOSj1AYOXgrS5wPMtDNPUV002agKp51iV8i0Zt0fGWFcU6GuxHcv3Yw
9O7gwW3Lix3H1LSD24f8/R/SGeXGID2eeZzxFOy6SSl5e5KxvR4e6t+njeTGf10y
v40W9eeGAnY3F0pXJv3IxqACOcLT9IHmRNagcMx0TEaXQGL4U9eO0TRuUlWXB8OY
zThdSUUS3rrYQfddE4tWLciUHTGDvxYawgT+CPcW6mk
-> ssh-ed25519 q+UPnA 5cNPwQ4TsvgxZDyVGbfn/Jg28Quz2zfBnCMi9l62ryU
9LjFsw0oKa0WKxO8hXfyMMsuuWs9Ji0wnvjJqaBQOCg
-> ssh-ed25519 /yLdGQ VuUXa/hvustaqmiRWag5HUauzJE5a5jfwKPGQs57Djk
kwbOEbJl6834uxfCp1C5v4VRRk77n/yAW3gAKfqta5g
-> ssh-ed25519 /WmILg 9dFGe9jW6BUHofjPSlcMwQBtRTrIMkbRNOk3PqQPLGw
IQh/mJNRlr3kBtyUqB3LRxB1zk2PcEXvCBwSSXO59ko
--- rAbAXar0Ad3RywEwkHOi5AgI3qE85Fo+ZAfemNF4OA0
ÈâãÖ][z×^J ÒØL4#óãyÝ™a¶LÃbÏï.z* {NZˆœ/<2F>ÃÃâ×+CSüŠój/×Ý<C397>Àº
ÛÉ_cYòÀ€CN90-
Z9y6Vu201Nlwwk+3TeFOoDpukvUkFBuV6JkToEUdrbndnDnSIf0OoNXL4iCYbqnt
dbR1OYUrEM/k1V/zJqjPRP/gMaCUGvFgX862NDGmzzXGk6wjLtlUWdFSGnScOGFS
c2ToY1y+MkXunCQ/HxRvaIRA7UhTwrOhnJLITbFH3oQ2cClUINmcgozZLmh6mQvM
0VmpQUJ5J6wsu1sNXv0nmvCNb0Yb7YWnnA9nDNlxha98wwyRvUOcllMNYvEm2KRI
OgGaUqRkXPI1WPnOeMY2pIdtwsH+Mr/WXX4yeTLSbWavD5hU0q7axwvuD6VLiwzL
zxuUGnMzTyvOdDWeZKSKECdE20ZomiMuAGVqJJfPrp9oB+fP2eLwJtYRd9FZvCpJ
NHr8dDcNla0yu86wPd9+A7gg0jXuYonIxQouoyPCU6ehkq20H2bTj5WXncUr3ykK
ddFOTV8VK0AsMRnR4f4RRKhEYTrv3e1jHbuhhmrYRFQfwRC9MSk1H1rXM9mCnzKI
uKVP10+9l98jtbT9jhdUIwFa1Pi+Pzg6qEqVY9Op6qKKqO0cL8PFxYl7kKr18hsQ
lpKyaDyLU3JmeeBBN+zc9V1Q3IqFMhsB2PaGkpCORkczOQgRLaJHnErjHfuPJy9I
gMSZcnKlmg+A1Q8eLtqPpvIuWLDt2KbQpaT6YXAWRBo
-> ssh-ed25519 q+UPnA fcSil1+qsZBucOPvkhYpUN27jkivaVWcCLBbdN4JOmk
YZNIqx7oVBjpwr0Vma/ptzB0h225jmz9i/CPtzAvk4Y
-> ssh-ed25519 /yLdGQ lIwhzVRkYK9wSfj0d2lGGdQX+s4S4cUINe8TbaDRgSg
r/l4OdWRbl26Lktk+wer3cyGmLNN9QB5rpPoLPxD1iY
-> ssh-ed25519 /WmILg H411Xc0YhBctelzz46HC4FOWWQsPbLJcbi/GbgAHgQ0
TE5POCRIgSBlgmJNcE9go8LnXSie3+TfR50GwhKKurU
--- TnlU1FiLZrtOsqzbjqVzc5Y/pG6YxqlinedIAh320mg
±Üć˙t®‡ü˙§-Y×fß9_ťÝŻGScâ•^Zt„‡ŐzĘťëˇîĘä¦rd¨ź<C2A8>¶ĆIŤ†ű`őţ]ľn®ič(ĺNzkëq÷T†

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -1,31 +1,31 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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Gy7+4P/3PLgJPnir/FY164mMTBJ9UpDUxDjsJBiTcgg4i8f5BVyjF2fYPscUPXuj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-> ssh-rsa QHr3/A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-> ssh-ed25519 q+UPnA PGWumbw8pA+rNbpp9CkuaSGCIq9H9R3IsO48qJhKGFc
sXk530yDtVLKOprAPZ7TrPQ+sKNc4zCRTEXWbFzIj38
-> ssh-ed25519 /yLdGQ 30MqhmP649yXU6HVb7ozJOdvCE/BpN2k8Wnu/7bgDUM
QL7dVDiWbK3Vl86I6NTg7CsuO8joDrjfur1vVUUkMMM
--- DrVYDG26Bhaqa651iNKZN7V1hHjVHflk2gicRt2E7Is
/Dá»Ð¡Ç º<>S ´¼Ž†a§Äè«6pðµžZDÒ wU¯fWùà^lê^<11>d”mx¡Û<>åíè<C3AD>´Ý,¶¬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-> ssh-ed25519 q+UPnA O+16+Um35CFPFkj506piwZ86j53RLGwTfPPOLAcUPD8
od1Uq94VCnbvSl6hqKoeCgeMIfVstj2smIuU8b1jRUM
-> ssh-ed25519 /yLdGQ EkYYMh/wqk3w5mfEL1sIyeCP7Cq4kNB+mR37i/835xI
cRA2WfSRaluB1F2WxIouDkYgvr/gXB+yejXFvTtdA38
--- Cj/TVrIh2XcGnGLJsrbbPR1VvhacW8vmYpfDItMLU9o
Q3äã  lÃ˽6iÌ™4ƒ‹ƒ ˜²O$˜=®ç0^"U§† Y¦ì÷C;Êzî£L²@ö¦ÈúPPÑ;¾ª3èÀ

View file

@ -1,30 +1,30 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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LyWGdc/bqB5xeZBpGUdfY+h8A9LnrO1ayy0B6nKs5lS1GkCjOOZYBg/K/KNN3dv4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-> ssh-rsa QHr3/A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-> ssh-ed25519 +vdRnA wPAuSoi5AHD8HVVplO8bYh47rtOPQYXiiDCISWsrtXg
achfOaMNd9zwda3dpDlKQFI0TYcfTrJdwy0kzDD+fJU
--- frT3QYeKdE/sWQBCuxrNLCw/IEerr2jpJBEmAVwP2aw
ž{F*â)„ŕ ţëÍ!ĄĽ÷xÎ<78>růôq Ęr„ŮnťxńiŤJ>ÜŐtM߉ŚřËĐÇI«b 8ô ú/Z?bŰ
djn“bŔ ¶ŕS.¨÷ľś©koę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-> ssh-ed25519 +vdRnA TxbWEdi2XEMh16Vv0iiwUyYuuTKzpwL8ZILCoBnH5hQ
8S1hpfBI8vc+Gqk8kW4ZlvrLuYe0g4f7Uad+DBVel0U
--- BQ3vUfo8FPKjIPIQ3Rztw6bpLAAejuWXWozFla5hfDY
sÐRTÓ çÊ1†]ëWV׉60sÙ•œ$®ÙI®%<25> /hâNG'cÔ
bä*ŸeXÏ]ß5U΋ÉG;<ѵøÛ‹ "cu¸RÓ4ÚŠØÔų•

View file

@ -1,32 +1,31 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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E12H0QXFFjXnEV7aCEg3O40q9BSrFndat5RnprDO/4cIvW9EDi28WL9vAylS+AsP
42SaqwpFgEM1x7yAfhR0Say4s31WNE4U6ZbJ69GCTDgo1/BLUb2G/ZDAD22la833
ZFJ5kkumuoQAn8U9CHQlhKmkngyCcpOUuKh2PQhnYRbTFLpGPgazRVjCPGXhP8zB
29+bV+Ona2LhEUfMNYCI7sQsD2llZr3AvJy6lT0+kfn3+rWOz2Ef2VAhuxNEOmlZ
Rj7hE/26JFLObWupfHRye+tuW9CMd4zDHo+oQwbmX3Z6TyF/HGIqMdUNhQgRcNY9
qBO/O6URtMOK8Ep3dexkarpI+BswFDfF4CxqdQMySvgjlc4AI7WaUXYJ3yolcdPn
NrNhHbBjOthNpsFCgpRxUo32fZM0+Hn+1acgxM0+PqHynLJ3uCKAsLFcfcYN3Iux
43vy+VZfSaVAknSilXMz+5KmDlP9KD25+CzAqOkSttrARVAUDY8y48IXatd7oyPO
i7mFQU0YeGWNXIfkqH/XTyUauNVpLB2/P1b/8NJ2l6qbsVu+t5NRlaGPnR2Itepu
gnFE7MJ0RwOdpsLOQwIWEbu3dN4Qsi3KBiComwiVwlj+8201f0znGPixD6qX9S0I
IS/J1+TUphqiAq1Cfeck2WGu1i9/YGubkGCMt9l4kqA
-> ssh-rsa QHr3/A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-> ssh-ed25519 /WmILg 6xd8CKcY4ydx5YKJwYi7p2aCNYZBLyNH80Sc6rnzwCc
jj+lPwu/nKz3VBo8GJDSCOOMYWrTLj9ENs43VGxspBs
-> ssh-ed25519 +vdRnA Mjl2eVOiqhK4gmRET1pvlG2O/UdtXRovoVQ8NyjK5EY
KOPdxuBvvL8BN9DjZUwnjBh022bH3KsV1bnRg4mQ8ic
--- MUOpOmKTLQoq+TJ6nddXVlw9CDyCU00yWOXvvINLli4
êdW¦»vö<76>xyFò€ûÞ È¥S+]É&…^ ¥÷=ó)6â,„ܺ;mAÆ\ÿtÀ>s"“°È°fl•Ñ ¤S¯À
f ˆ_¡½”ó šBYQÿî+8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-> ssh-ed25519 /WmILg 5zR9ToCpPvD3gfX/DZkSViSyH/k/mc17r9PkHyTUBRY
Dr1vkLrZaxQrksmkDNHCIuvcWW66vnfMX6ApHo2VtlY
-> ssh-ed25519 +vdRnA B6tOXNobJUtx1AXG/a2rGb7a2lTXox3b6CvsNg9AhyI
M6VWGHl07La5b4xfLa2fq1fPn8rM8ZER36HVIiMSctE
--- ZYI6+FsdFDX4gXbp/tfcmGdN4mZM6CSuYB+C62M+JVI
×Y +ßí¡X¨¤ ¨Lsºz\Û‰Ç/°:—žŠåQ_P£%Ý"¸ëB`440ë|DáÅYŽ0TÓä<C393>otôB¨<>·k*êm8ç¹<þÎ^ZÅñÜÙvm

Binary file not shown.

Binary file not shown.

View file

@ -17,7 +17,7 @@ in
"aws-credentials.age".publicKeys = [ccr-ssh ccr-gpg picard sisko];
"nextcloud-admin-pass.age".publicKeys = [ccr-ssh ccr-gpg sisko];
"home-planimetry.age".publicKeys = [ccr-ssh ccr-gpg sisko];
"chatgpt-token.age".publicKeys = [ccr-ssh ccr-gpg kirk mothership picard];
"chatgpt-token.age".publicKeys = [ccr-ssh ccr-gpg kirk mothership picard deltaflyer];
"cloudflare-dyndns-api-token.age".publicKeys = [ccr-ssh ccr-gpg sisko];
"restic-hetzner-password.age".publicKeys = [ccr-ssh ccr-gpg picard sisko kirk];
"hass-ssh-key.age".publicKeys = [ccr-ssh ccr-gpg sisko];
@ -30,4 +30,5 @@ in
"picard-wireguard-private-key.age".publicKeys = [ccr-ssh ccr-gpg picard];
"sisko-wireguard-private-key.age".publicKeys = [ccr-ssh ccr-gpg sisko];
"kirk-wireguard-private-key.age".publicKeys = [ccr-ssh ccr-gpg kirk];
"deltaflyer-wireguard-private-key.age".publicKeys = [ccr-ssh ccr-gpg deltaflyer];
}

View file

@ -1,29 +1,30 @@
age-encryption.org/v1
-> ssh-rsa /AagBw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cvRfm6k7zHvcAWGj9Kpu0HphlcfmYdZtp21VZUKx5RWH7hcijvSxo2mgk26JVwb9
D8sB3n0QoLlE5+Ej3bmpepJUCeaUVKhbLiwMzeKGNUxlzGhbOlh+aj14iWM9aWVZ
kn7f1TlnzhEqn572z7DvKqVptDHiCJ+b3eeGUr9Znhgnp6THvoMIKdr2wK798oxT
RBnL0bCZDDJUM9rYZb6qF871ijKAqxpCtkjzYfSGKHBcgQ+lsehRQxH7t5O79j/b
PXIvg5ZZLjjXsUo4tO1P7TCv0L6CheQwlibCHgkwdy0u5VpZ/Za2IyRAxLD803QI
K0JTjlgOVkPHMWeG7VMgr/DLxn7xhK4ZpnrzglaLe2+wueK+VxxSkInoEgbHWfBx
vj0MUaY/lHcAs6RJIu+7U2Y6NnV1+kNpE7qqiDRCi/pz2fAAgIbeM64ymkNsNDOM
J0yv5guQNG+gHWqGK0B4BnNQUANZhhr2tljzGL/PTwDHPXSQ2Qz0tFqHO3VxSHEH
uyqhAe9oC0IunIcukbPYB8dPPM5LBeLvaT3l63B/I0HosRUK6Q/ts0hZsBgr37oK
MVuLibW0Trj491UmSNEfLoLTvXv+sHQy83IjtU3Ubwa4fXxpg6ql7WbE9sHJGPR9
8u4JDj8b9iYAWa6+SUUf+a3y664FRFrMSWWw8uINKCA
-> ssh-rsa QHr3/A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-> ssh-ed25519 +vdRnA LSVfv42i4lO78CU9lcvukt+0jg2DznEgnLQ2Bt0pWTE
18xZ5+AD0HQjjd1ZDsJZy2pB7/Xk/6icoiTYOvG+4ho
--- A9c502feTNWqMWr+WnVYihe+SBw/qeFhCi4iLEJPr6Y
¡“páÖ½Íwr׺#žoï´M‰€¼&¥Ú“©òVOãNw$J<AÀµDúB s3¢<R „°#ý<>—xYÙ,½SÖÆ“˜Q6ÂaG®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-> ssh-ed25519 +vdRnA pKUeraMwzhFh8kCFPf2Tm7NVvQkX5NPB8emAk/gY1jI
0q4Kzyxs4Izmo/NpL7HSt26KWFpkhT4TUdbSdMtgHLI
--- /W7t86EbCxe1cpyDfpD9wzk4nqycHHqNiNzaZ17YiJk
ǶüAŸ+n¢TW“¯­–<¼^™µØpæ {-<0E>¥{§
m¹'<27>1 m¿!¾Üëlɯu¦Ð'<27>²ãF0ûË韙B¸?ø?$ày¿