pluh 🗣

This commit is contained in:
Lukas Wurzinger 2025-03-09 16:37:21 +01:00
parent 668140531b
commit 516b647ed4
No known key found for this signature in database
35 changed files with 204 additions and 119 deletions

View file

@ -0,0 +1,6 @@
{pkgs, ...}: {
# TODO: wrap
environment.systemPackages = [
pkgs.vscodium
];
}

View file

@ -1,3 +1,7 @@
{ {inputs, ...}: {
imports = [
inputs.flatpak.nixosModules.nix-flatpak
];
services.flatpak.enable = true; services.flatpak.enable = true;
} }

View file

@ -1,4 +1,4 @@
{ {pkgs, ...}: {
xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk]; xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk];
programs.dconf.enable = true; programs.dconf.enable = true;

View file

@ -1,16 +1,10 @@
{pkgs, ...}: { {
hardware = { hardware = {
bluetooth.enable = true; bluetooth.enable = true;
steam-hardware.enable = true; steam-hardware.enable = true;
xone.enable = true; xone.enable = true;
xpadneo.enable = true; xpadneo.enable = true;
opentabletdriver.enable = true; opentabletdriver.enable = true;
graphics = { graphics.enable = true;
enable = true;
extraPackages = [
pkgs.libvdpau-va-gl
pkgs.vaapiVdpau
];
};
}; };
} }

View file

@ -1,20 +1,24 @@
{ {
config,
lib,
...
}: {
services.grafana = { services.grafana = {
enable = true; enable = true;
settings.server = {
domain = "grafana.pele"; domain = "grafana.pele";
port = 9010; http_port = 9010;
addr = "127.0.0.1"; http_addr = "127.0.0.1";
root_url = "http://192.168.1.10:8010"; # TODO
# WARNING: this should match nginx setup!
# prevents "Request origin is not authorized"
rootUrl = "http://192.168.1.10:8010"; # helps with nginx / ws / live
protocol = "http"; protocol = "http";
};
analytics.reporting.enable = false; analytics.reporting.enable = false;
provision = { provision = {
enable = true; enable = true;
datasources = [ datasources.settings.datasources = [
{ {
name = "Prometheus"; name = "Prometheus";
type = "prometheus"; type = "prometheus";
@ -31,11 +35,11 @@
}; };
}; };
services.nginx.virtualHosts.${config.services.grafana.domain} = { services.nginx.virtualHosts.${config.services.grafana.settings.server.domain} = {
locations."/" = { locations."/" = {
proxyPass = "http://${lib.formatHostPort { proxyPass = "http://${lib.formatHostPort {
host = config.services.grafana.addr; host = config.services.grafana.settings.server.http_addr;
inherit (config.services.grafana) port; port = config.services.grafana.settings.server.http_port;
}}"; }}";
proxyWebsockets = true; proxyWebsockets = true;
}; };

View file

@ -1,4 +1,4 @@
{ {config, ...}: {
services.loki = { services.loki = {
enable = true; enable = true;
configuration = { configuration = {
@ -25,10 +25,10 @@
schema_config = { schema_config = {
configs = [ configs = [
{ {
from = "2022-06-06"; from = "2022-06-06"; #TODO
store = "boltdb-shipper"; store = "tsdb";
object_store = "filesystem"; object_store = "filesystem";
schema = "v12"; schema = "v13";
index = { index = {
prefix = "index_"; prefix = "index_";
period = "24h"; period = "24h";
@ -38,9 +38,9 @@
}; };
storage_config = { storage_config = {
boltdb_shipper = { tsdb_shipper = {
active_index_directory = "/var/lib/loki/boltdb-shipper-active"; active_index_directory = "${config.services.loki.dataDir}/tsdb-shipper-active";
cache_location = "/var/lib/loki/boltdb-shipper-cache"; cache_location = "${config.services.loki.dataDir}/tsdb-shipper-cache";
cache_ttl = "24h"; cache_ttl = "24h";
shared_store = "filesystem"; shared_store = "filesystem";
}; };
@ -65,7 +65,7 @@
}; };
compactor = { compactor = {
working_directory = "/var/lib/loki"; working_directory = config.services.loki.dataDir;
shared_store = "filesystem"; shared_store = "filesystem";
compactor_ring = { compactor_ring = {
kvstore = { kvstore = {
@ -74,6 +74,5 @@
}; };
}; };
}; };
# user, group, dataDir, extraFlags, (configFile)
}; };
} }

View file

@ -10,6 +10,7 @@
exporters = { exporters = {
node = { node = {
enable = true; enable = true;
listenAddress = "127.0.0.1";
port = 3021; port = 3021;
enabledCollectors = ["systemd"]; enabledCollectors = ["systemd"];
}; };
@ -22,7 +23,7 @@
{ {
targets = let targets = let
target = lib.formatHostPort { target = lib.formatHostPort {
host = config.services.prometheus.exporters.node.listenAddr; host = config.services.prometheus.exporters.node.listenAddress;
inherit (config.services.prometheus.exporters.node) port; inherit (config.services.prometheus.exporters.node) port;
}; };
in [target]; in [target];

View file

@ -37,6 +37,5 @@
} }
]; ];
}; };
# extraFlags
}; };
} }

View file

@ -0,0 +1,12 @@
{
services.tailscale = {
enable = true;
openFirewall = true; #TODO
};
networking.firewall = {
checkReversePath = "loose";
trustedInterfaces = ["tailscale0"];
allowedUDPPorts = [config.services.tailscale.port];
};
}

View file

@ -1,5 +1,6 @@
{ {
config, config,
lib,
inputs, inputs,
pkgs, pkgs,
... ...

View file

@ -1,4 +1,4 @@
{ {pkgs, ...}: {
xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk]; xdg.portal.extraPortals = [pkgs.xdg-desktop-portal-gtk];
programs.dconf.enable = true; programs.dconf.enable = true;

View file

@ -1,16 +1,9 @@
{pkgs, ...}: { {
hardware = { hardware = {
bluetooth.enable = true; bluetooth.enable = true;
steam-hardware.enable = true; steam-hardware.enable = true;
xone.enable = true; xone.enable = true;
xpadneo.enable = true; xpadneo.enable = true;
opentabletdriver.enable = true; graphics.enable = true;
graphics = {
enable = true;
extraPackages = [
pkgs.libvdpau-va-gl
pkgs.vaapiVdpau
];
};
}; };
} }

View file

@ -1,6 +0,0 @@
{pkgs, ...}: {
services.mullvad-vpn = {
enable = true;
package = pkgs.mullvad-vpn;
};
}

View file

@ -1,6 +0,0 @@
{
environment.sessionVariables = {
NIXOS_OZONE_WL = "1";
SDL_VIDEODRIVER = "wayland";
};
}

View file

@ -95,11 +95,11 @@
"nixpkgs": "nixpkgs_4" "nixpkgs": "nixpkgs_4"
}, },
"locked": { "locked": {
"lastModified": 1740678151, "lastModified": 1741348424,
"narHash": "sha256-q0tKL+Yny0wkLCHRBHQ97YhjorNLnbnyjc+FnQZyKkM=", "narHash": "sha256-nPwbJpX8AxmzbgRd2m6KHIbyN1xavq1BaBdJzO/lkW0=",
"owner": "cachix", "owner": "cachix",
"repo": "devenv", "repo": "devenv",
"rev": "af151da5e3d7391fe778050da00d8e7cefa2d087", "rev": "8f8c96bb1e0c6a59a97592328dc61b9fdbe7474b",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -153,6 +153,22 @@
} }
}, },
"flake-compat_3": { "flake-compat_3": {
"flake": false,
"locked": {
"lastModified": 1717312683,
"narHash": "sha256-FrlieJH50AuvagamEvWMIE6D2OAnERuDboFDYAED/dE=",
"owner": "nix-community",
"repo": "flake-compat",
"rev": "38fd3954cf65ce6faf3d0d45cd26059e059f07ea",
"type": "github"
},
"original": {
"owner": "nix-community",
"repo": "flake-compat",
"type": "github"
}
},
"flake-compat_4": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1733328505, "lastModified": 1733328505,
@ -195,11 +211,11 @@
"nixpkgs-lib": "nixpkgs-lib" "nixpkgs-lib": "nixpkgs-lib"
}, },
"locked": { "locked": {
"lastModified": 1738453229, "lastModified": 1741352980,
"narHash": "sha256-7H9XgNiGLKN1G1CgRh0vUL4AheZSYzPm+zmZ7vxbJdo=", "narHash": "sha256-+u2UunDA4Cl5Fci3m7S643HzKmIDAe+fiXrLqYsR2fs=",
"owner": "hercules-ci", "owner": "hercules-ci",
"repo": "flake-parts", "repo": "flake-parts",
"rev": "32ea77a06711b758da0ad9bd6a844c5740a87abd", "rev": "f4330d22f1c5d2ba72d3d22df5597d123fdb60a9",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -257,11 +273,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1737465171, "lastModified": 1740849354,
"narHash": "sha256-R10v2hoJRLq8jcL4syVFag7nIGE7m13qO48wRIukWNg=", "narHash": "sha256-oy33+t09FraucSZ2rZ6qnD1Y1c8azKKmQuCvF2ytUko=",
"owner": "cachix", "owner": "cachix",
"repo": "git-hooks.nix", "repo": "git-hooks.nix",
"rev": "9364dc02281ce2d37a1f55b6e51f7c0f65a75f17", "rev": "4a709a8ce9f8c08fa7ddb86761fe488ff7858a07",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -316,11 +332,11 @@
}, },
"hardware": { "hardware": {
"locked": { "locked": {
"lastModified": 1740646007, "lastModified": 1741325094,
"narHash": "sha256-dMReDQobS3kqoiUCQIYI9c0imPXRZnBubX20yX/G5LE=", "narHash": "sha256-RUAdT8dZ6k/486vnu3tiNRrNW6+Q8uSD2Mq7gTX4jlo=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "009b764ac98a3602d41fc68072eeec5d24fc0e49", "rev": "b48cc4dab0f9711af296fc367b6108cf7b8ccb16",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -423,6 +439,26 @@
"type": "github" "type": "github"
} }
}, },
"nixos-cosmic": {
"inputs": {
"flake-compat": "flake-compat_3",
"nixpkgs": "nixpkgs_6",
"nixpkgs-stable": "nixpkgs-stable_2"
},
"locked": {
"lastModified": 1741532023,
"narHash": "sha256-wPoRT99r7dMQiXWzDe9v/2OSXOmGOWad/0q9norshvs=",
"owner": "lilyinstarlight",
"repo": "nixos-cosmic",
"rev": "364761eb5ba3f1514446b6a0eb8e8651c5bc4c67",
"type": "github"
},
"original": {
"owner": "lilyinstarlight",
"repo": "nixos-cosmic",
"type": "github"
}
},
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1703013332, "lastModified": 1703013332,
@ -441,14 +477,17 @@
}, },
"nixpkgs-lib": { "nixpkgs-lib": {
"locked": { "locked": {
"lastModified": 1738452942, "lastModified": 1740877520,
"narHash": "sha256-vJzFZGaCpnmo7I6i416HaBLpC+hvcURh/BQwROcGIp8=", "narHash": "sha256-oiwv/ZK/2FhGxrCkQkB83i7GnWXPPLzoqFHpDD3uYpk=",
"type": "tarball", "owner": "nix-community",
"url": "https://github.com/NixOS/nixpkgs/archive/072a6db25e947df2f31aab9eccd0ab75d5b2da11.tar.gz" "repo": "nixpkgs.lib",
"rev": "147dee35aab2193b174e4c0868bd80ead5ce755c",
"type": "github"
}, },
"original": { "original": {
"type": "tarball", "owner": "nix-community",
"url": "https://github.com/NixOS/nixpkgs/archive/072a6db25e947df2f31aab9eccd0ab75d5b2da11.tar.gz" "repo": "nixpkgs.lib",
"type": "github"
} }
}, },
"nixpkgs-stable": { "nixpkgs-stable": {
@ -467,6 +506,22 @@
"type": "github" "type": "github"
} }
}, },
"nixpkgs-stable_2": {
"locked": {
"lastModified": 1741332913,
"narHash": "sha256-ri1e8ZliWS3Jnp9yqpKApHaOo7KBN33W8ECAKA4teAQ=",
"owner": "NixOS",
"repo": "nixpkgs",
"rev": "20755fa05115c84be00b04690630cb38f0a203ad",
"type": "github"
},
"original": {
"owner": "NixOS",
"ref": "nixos-24.11",
"repo": "nixpkgs",
"type": "github"
}
},
"nixpkgs_2": { "nixpkgs_2": {
"locked": { "locked": {
"lastModified": 1733212471, "lastModified": 1733212471,
@ -533,11 +588,11 @@
}, },
"nixpkgs_6": { "nixpkgs_6": {
"locked": { "locked": {
"lastModified": 1740695751, "lastModified": 1741379970,
"narHash": "sha256-D+R+kFxy1KsheiIzkkx/6L63wEHBYX21OIwlFV8JvDs=", "narHash": "sha256-Wh7esNh7G24qYleLvgOSY/7HlDUzWaL/n4qzlBePpiw=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "6313551cd05425cd5b3e63fe47dbc324eabb15e4", "rev": "36fd87baa9083f34f7f5027900b62ee6d09b1f2f",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -549,11 +604,11 @@
}, },
"nixpkgs_7": { "nixpkgs_7": {
"locked": { "locked": {
"lastModified": 1740019556, "lastModified": 1741310760,
"narHash": "sha256-vn285HxnnlHLWnv59Og7muqECNMS33mWLM14soFIv2g=", "narHash": "sha256-aizILFrPgq/W53Jw8i0a1h1GZAAKtlYOrG/A5r46gVM=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "dad564433178067be1fbdfcce23b546254b6d641", "rev": "de0fe301211c267807afd11b12613f5511ff7433",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -565,16 +620,16 @@
}, },
"phps": { "phps": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_3", "flake-compat": "flake-compat_4",
"nixpkgs": "nixpkgs_7", "nixpkgs": "nixpkgs_7",
"utils": "utils" "utils": "utils"
}, },
"locked": { "locked": {
"lastModified": 1740296995, "lastModified": 1741496686,
"narHash": "sha256-M0bsnyYP5DqO7EKL9ujwXCWKwwlg9F2xUklpMvbd/0s=", "narHash": "sha256-dJJ6n2w4OIemUWwfOy3yufKhggE0ncNOklbKgfa8CRY=",
"owner": "fossar", "owner": "fossar",
"repo": "nix-phps", "repo": "nix-phps",
"rev": "6a6be7dd7f86f305deab7799a17af50aff0e3218", "rev": "f40909d5223656db01879d3325a8306883bcc668",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -619,7 +674,11 @@
"flatpak": "flatpak", "flatpak": "flatpak",
"hardware": "hardware", "hardware": "hardware",
"lanzaboote": "lanzaboote", "lanzaboote": "lanzaboote",
"nixpkgs": "nixpkgs_6", "nixos-cosmic": "nixos-cosmic",
"nixpkgs": [
"nixos-cosmic",
"nixpkgs"
],
"phps": "phps" "phps": "phps"
} }
}, },

View file

@ -14,6 +14,8 @@
phps.url = "github:fossar/nix-phps"; phps.url = "github:fossar/nix-phps";
lanzaboote.url = "github:nix-community/lanzaboote/v0.4.2"; lanzaboote.url = "github:nix-community/lanzaboote/v0.4.2";
flatpak.url = "github:gmodena/nix-flatpak?ref=latest"; flatpak.url = "github:gmodena/nix-flatpak?ref=latest";
nixpkgs.follows = "nixos-cosmic/nixpkgs";
nixos-cosmic.url = "github:lilyinstarlight/nixos-cosmic";
}; };
outputs = { outputs = {
@ -57,14 +59,10 @@
]; ];
}; };
packages = packages = self.lib.packagesFromDirectoryRecursive {
self.lib.genAttrs [ inherit (pkgs) callPackage;
"puter" directory = ./packages;
"disk" };
"musicomp"
] (
name: pkgs.callPackage ./packages/${name} {}
);
}; };
}; };
} }

View file

@ -0,0 +1,5 @@
{
services.flatpak.packages = [
"io.gitlab.librewolf-community"
];
}

View file

@ -0,0 +1,5 @@
{
services.flatpak.packages = [
"io.gitlab.librewolf-community"
];
}

View file

@ -1,5 +1,5 @@
{ {
services.flatpak.packages = [ services.flatpak.packages = [
"org.mozilla.firefox" "com.valvesoftware.Steam"
]; ];
} }

View file

@ -0,0 +1,9 @@
{
services.headscale = {
enable = true;
address = "127.0.0.1";
port = 3122; # TODO
settings = {
};
};
}

View file

@ -0,0 +1,5 @@
{
services.flatpak.packages = [
"io.gitlab.librewolf-community"
];
}

View file

@ -6,7 +6,7 @@
inherit (config.users) mainUser; inherit (config.users) mainUser;
in { in {
users = { users = {
mainUser = lib.mkForce "user"; mainUser = lib.mkForce "insomniac";
users.${mainUser}.description = lib.mkForce "User"; users.${mainUser}.description = lib.mkForce "Insomniac";
}; };
} }

View file

@ -67,7 +67,8 @@ lib: _: {
}; };
dirsIn = dir: dirsIn = dir:
lib.pipe (builtins.readDir dir) [ lib.pipe dir [
builtins.readDir
(lib.filterAttrs (_: type: type == "directory")) (lib.filterAttrs (_: type: type == "directory"))
builtins.attrNames builtins.attrNames
]; ];

View file

@ -54,8 +54,8 @@ bootlbl=BOOT
mainlbl=main mainlbl=main
cryptmainlbl=cryptmain cryptmainlbl=cryptmain
mapping=main mapping=main
bootflags= bootflags=()
mainflags= mainflags=()
fatflags=() fatflags=()
ext4flags=() ext4flags=()
skips=() skips=()

View file

@ -29,7 +29,7 @@ args=$(
eval set -- "$args" eval set -- "$args"
if [[ -n $PUTER_FLAKEREF ]]; then if [[ -v PUTER_FLAKEREF && -n $PUTER_FLAKEREF ]]; then
flakeref=$PUTER_FLAKEREF flakeref=$PUTER_FLAKEREF
fi fi
flags=( flags=(

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -1,11 +1,12 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 SFHVrw ftLkHrbUjgc35OAhuE3+E3V7hLCv23gzHTVqUWIsmiw -> ssh-ed25519 SFHVrw Yo23v7ejgzBUv+EmyQHALyOhSKxFvVnhDFWJyiReuWc
JNUkQKzmX0s2xrcjIppqy0bx3lnlciXdNXzomfs3YNg jbPVHR+HK02tExnubKCqoGN7Hm32ER4SqogwGNQ/R98
-> ssh-ed25519 S+dwQQ vd73NCcRI3GayDfyg+qsI4TVjV1o7yqdaA0TBDiLghQ -> ssh-ed25519 S+dwQQ AGE5B27dUQ98FBCy/sFEki4G1ZbIiUjAJIr1kOdBDg4
iKnkpBuM6iDTSCgoufxmaVpKfYEAAPVXjImxWFo9Hr4 OzbdTrqlgcl+IxGWmZbSInlJ3jzHE542DMPWZznedD0
-> ssh-ed25519 bPbvlw cWnTTG7zTMkR66awD2o7RF8YlXqkhOh0mYwih4Q2CSE -> ssh-ed25519 bPbvlw KpvCpS6iMAt0Acagp111b57c2JSN3S9jQRGWNosrfRA
Lgw50YqS35S5rtOPQA5pEnfClx2tDK8Wpf5vq7iq+w8 O+CJBJN5RC0Ft01fWHgXCpy2SeUdgxGW7MNPdZvz4YE
-> ssh-ed25519 ffmsLw QjN349CibGpB9HMcc1qprvxgOfLrid5EMAGcdja3gwM -> ssh-ed25519 ffmsLw vVNUoviY5cG67VdILPhON1DDFOzpAaSZq/s9R5AICGE
6RS4vZAvsUjqLtyeZJdLsuPXsHK5fZPA6pesfJxA9NQ 0WMV/lM+oQtn8m45TMBEuBQV3/JUqzVW4kDtf3y+6TU
--- IWwGdacyhMgpnjPvdxPGMlyjAyWOp20Rjv6V9OoIGY0 --- SdYB9uVHXKT9B/+kKAkpnZt6rbqv8m1danRSXbz1NPk
üJR°jþð¯ÿ¾)ü€N[è%`31üÚµƒÄqλίg™hÙÒe€ƒ—¡ÏDF,Ã~ËJ «oYç<>@X“~e K<ÐÙšØ8Ë4(¨<>ÁÎIÒÙO€òö Šç5Êس A¿dvŽjìä×Áboâ¶$;K“­ÜJ.«øb ”¶ z<>·ÿ|sÚqÃ}óíGŽ@­;µ€ø¥¬!þ?
Õçÿ(Pø¥nö,PKáôÞJ§ÿ8étƒ

View file

@ -1,11 +1,12 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 SFHVrw /OTVcIQd3fJVTG7aEwQCY/x6lfTd+EZpn7Jc4MeEcE4 -> ssh-ed25519 SFHVrw piOZebIDKWjodO0VC2tlgc7gF0Dc1j7Pl/iJ18WhgCs
31r1WrTF9ZnrL5za6p57fafVJfQAj5iyY6lLQriIwaY 4LB/K71GW6t9VWO0bQD1i12wux6FxmSucFo/v+4GBxg
-> ssh-ed25519 S+dwQQ TmWs92CYRNXJVaJCCsfQc7wWek38gofuVzaZiTchcRA -> ssh-ed25519 S+dwQQ 0nz4PbGQjOFHkDDKWpC4Heg7ORRUl+LTqgU9dRq5njY
+zEDzASCzZbWn6weWXoBrCfDRLsOzKncFLLuXOTD/bc 3wuRZk4/qdTgMBg8UK8ELc1vBbkXSyFwNiA0elPcIi4
-> ssh-ed25519 bPbvlw UuI6fU6RpT5aZBUZjgypR/q7N24usjkTxdu+hemcH2Q -> ssh-ed25519 bPbvlw mfwxdgOF2PKM88ZL0vbKWaeWpdD1TZ/+AeRYKfkIGDA
AaqzU+V02ezyLuBLFpjiobv0qL87JaAI+CVur0nyuZ4 tKQarSGNY0Rdp0C+lLv2q0eFtRwewTB1Xn2MYUzldFs
-> ssh-ed25519 ffmsLw 41XX4wfkbdkgcOGV/QobtwxXjfyYEkpYrUSGjhg1wBw -> ssh-ed25519 ffmsLw tswVSO8AEvvTHlXtU7hlcQD8f5wFHbq6ikMGPpVcHX8
YZFSenGSwenFCuVxlmFQSLUACP1XUewZlKtRGYTuzRE zNFK1TD5Feiq4G/LsJWI5hTZs7tCR4U9E76v1mno2FM
--- FwFDJ/HQQyHH1Ik5HdCF4ZHihlNCvD9BYGxgM4KOims --- 8h7d7RCoKBPqA6xGX0W1XT85J6VSRu6X6QHDStN4/mA
F=Δ\*—%]8³×l»Tp•$Ó–š4mõ>;y¿Ï9ð½µâÀ<C3A2>gvÍ! ç7euDœ<tÔ<74>²ã<>(ªkq#Ä è<>”<bò°P çmí—Ü—;¨‰
²ãl%ý

Binary file not shown.

View file

@ -1,6 +1,6 @@
with import ../pubkeys.nix; { with import ../pubkeys.nix; {
"user-lukas.age".publicKeys = (builtins.attrValues users) ++ (builtins.attrValues (builtins.removeAttrs hosts ["insomniac"])); "user-lukas.age".publicKeys = (builtins.attrValues users) ++ (builtins.attrValues (builtins.removeAttrs hosts ["insomniac"]));
"user-user.age".publicKeys = (builtins.attrValues users) ++ [hosts.insomniac]; "user-insomniac.age".publicKeys = (builtins.attrValues users) ++ [hosts.insomniac];
"microbin.age".publicKeys = (builtins.attrValues users) ++ [hosts.abacus]; "microbin.age".publicKeys = (builtins.attrValues users) ++ [hosts.abacus];

BIN
secrets/user-insomniac.age Normal file

Binary file not shown.

Binary file not shown.

Binary file not shown.