Compare commits

...

17 commits

Author SHA1 Message Date
Fiscal Velvet Poet
7e88a39c6e
trajto(reciproka-web): konverti al floko 2024-10-29 23:41:03 +10:00
Fiscal Velvet Poet
a900b37202
trajto(hollows): komenca transigi 2024-10-29 23:07:33 +10:00
Fiscal Velvet Poet
c963d41c67
feature(hakyll-skeleton): switch to flake 2024-10-29 00:44:14 +10:00
Fiscal Velvet Poet
b52f777884
chore(nixos): bumped to HEAD of 24.05 2024-10-27 23:27:37 +10:00
Fiscal Velvet Poet
3a294f84ff
chore(forgejo): move rego to correct stanza 2024-10-24 23:31:12 +10:00
Fiscal Velvet Poet
d5d3fd21ca
chore(nixos): bumped to HEAD of 24.05 2024-10-21 18:43:21 +10:00
Fiscal Velvet Poet
02be2527e3
chore(nixos): bumped to HEAD of 24.05 2024-10-14 14:42:34 +10:00
Fiscal Velvet Poet
92a664df68
chore(nix): move ragenix module to defaults 2024-10-09 18:16:21 +10:00
Fiscal Velvet Poet
d21da35c5f
chore(nixos): bumped to HEAD of 24.05 2024-10-08 16:14:47 +10:00
Fiscal Velvet Poet
afd8e99472
chore(nixpkgsUnstable): bumped to HEAD of master 2024-10-08 16:13:34 +10:00
Fiscal Velvet Poet
5eec3924c6
chore(nix): bumped to v2.24.6 2024-10-08 16:11:49 +10:00
Fiscal Velvet Poet
503ed02aa2
chore(nixos): bumped to HEAD of 24.05 2024-09-30 17:30:48 +10:00
Fiscal Velvet Poet
d3a90a962c
chore(nixos): bumped to HEAD of 24.05 2024-09-23 09:49:32 +10:00
Fiscal Velvet Poet
af2f1754e5
feature(pi3): set boot configuration limit 2024-09-11 23:57:46 +10:00
Fiscal Velvet Poet
4c96950ca4
chore(nixos): bumped to HEAD of 24.05 2024-09-10 23:32:37 +10:00
Fiscal Velvet Poet
f2c768a6d1
chore(nixos): bumped to HEAD of nixpkgsUnstable 2024-09-03 12:05:53 +10:00
Fiscal Velvet Poet
4a456a108c
chore(nixos): bumped to HEAD of 24.05 2024-09-03 12:03:44 +10:00
15 changed files with 1691 additions and 84 deletions

1601
flake.lock generated

File diff suppressed because it is too large Load diff

View file

@ -8,17 +8,15 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
hakyll-skeleton = { hakyll-skeleton = {
flake = false; url = "git+https://reciproka.dev/reciproka/hakyll-skeleton/?ref=consensus";
url = git+https://reciproka.dev/reciproka/hakyll-skeleton/?ref=consensus; inputs.nixpkgs.follows = "nixpkgs";
};
reciproka-web = {
flake = false;
url = git+https://reciproka.dev/reciproka/reciproka-web/?ref=consensus;
}; };
reciproka-web.url = "git+https://reciproka.dev/reciproka/reciproka-web/?ref=consensus";
resrok-web = { resrok-web = {
flake = false; flake = false;
url = git+https://reciproka.dev/resrok/resrok-web/?ref=consensus; url = git+https://reciproka.dev/resrok/resrok-web/?ref=consensus;
}; };
nix.url = github:NixOS/nix/?ref=2.24.6;
nixpkgs.url = github:NixOS/nixpkgs/?ref=nixos-24.05; nixpkgs.url = github:NixOS/nixpkgs/?ref=nixos-24.05;
nixpkgsUnstable.url = github:NixOS/nixpkgs/?ref=nixos-unstable; nixpkgsUnstable.url = github:NixOS/nixpkgs/?ref=nixos-unstable;
utils.url = "github:numtide/flake-utils"; utils.url = "github:numtide/flake-utils";

View file

@ -24,6 +24,7 @@
loader = { loader = {
generic-extlinux-compatible = { generic-extlinux-compatible = {
enable = true; # Enables the generation of /boot/extlinux/extlinux.conf enable = true; # Enables the generation of /boot/extlinux/extlinux.conf
configurationLimit = 5;
}; };
grub = { grub = {
enable = false; # NixOS wants to enable GRUB by default. enable = false; # NixOS wants to enable GRUB by default.

View file

@ -15,6 +15,7 @@
}: { }: {
imports = [ imports = [
../../../networks/pi3B_rack.nix ../../../networks/pi3B_rack.nix
../../../profiles/hakyll-skeleton.nix
]; ];
# Comment out deployment when building the SD Image. # Comment out deployment when building the SD Image.

View file

@ -0,0 +1,25 @@
# NixOS configuration for flemming
#
# Andy Flemming, AKA Slackbastard is the psuedonym of an Australian anarchist
# who hosts Yeah Nah Pasaran on radio 3CR and documents fascism and its
# grave diggers in Australia
#
# https://en.wikipedia.org/wiki/Andy_Fleming_(activist)
# https://slackbastard.anarchobase.com/
# https://www.3cr.org.au/yeahnahpasaran
{
config,
pkgs,
lib,
...
}: {
imports = [
../../../networks/pi3B_rack.nix
];
# Comment out deployment when building the SD Image.
deployment.targetHost = "10.42.0.203";
networking.hostName = "hollows"; # Define your hostname.
system.stateVersion = "22.05"; # The version of NixOS originally installed
}

View file

@ -13,7 +13,6 @@
}: { }: {
imports = [ imports = [
../../../networks/linode.nix ../../../networks/linode.nix
../../../profiles/hakyll-skeleton.nix
../../../profiles/reciproka-web.nix ../../../profiles/reciproka-web.nix
../../../profiles/reciproka-forgejo.nix ../../../profiles/reciproka-forgejo.nix
../../../profiles/resrok-web.nix ../../../profiles/resrok-web.nix

View file

@ -4,6 +4,7 @@
reciproka-web, reciproka-web,
ragenix, ragenix,
colmena, colmena,
nix,
nixpkgs, nixpkgs,
nixpkgsUnstable, nixpkgsUnstable,
resrok-web, resrok-web,
@ -17,6 +18,7 @@ in {
devShell = devShell =
pkgs.callPackage pkgs.callPackage
./shell.nix { ./shell.nix {
inherit (nix.packages."${pkgs.system}") nix;
inherit (ragenix.packages."${pkgs.system}") ragenix; inherit (ragenix.packages."${pkgs.system}") ragenix;
inherit (colmena.packages."${pkgs.system}") colmena; inherit (colmena.packages."${pkgs.system}") colmena;
inherit (nixpkgsUnstable.legacyPackages."${pkgs.system}") alejandra; inherit (nixpkgsUnstable.legacyPackages."${pkgs.system}") alejandra;
@ -32,22 +34,29 @@ in {
overlays = []; overlays = [];
}; };
}; };
defaults = {pkgs, ...}: {
imports = [
ragenix.nixosModules.default
];
};
flemming = { flemming = {
imports = [ imports = [
./nixos/hosts/flemming ./nixos/hosts/flemming
ragenix.nixosModules.default ];
};
hollows = {
imports = [
./nixos/hosts/hollows
]; ];
}; };
pred = { pred = {
imports = [ imports = [
./nixos/hosts/pred ./nixos/hosts/pred
ragenix.nixosModules.default
]; ];
}; };
toscano = { toscano = {
imports = [ imports = [
./nixos/hosts/toscano/configuration.nix ./nixos/hosts/toscano/configuration.nix
ragenix.nixosModules.default
]; ];
}; };
}; };

View file

@ -6,8 +6,8 @@
... ...
}: let }: let
flake = builtins.getFlake (toString ../.); flake = builtins.getFlake (toString ../.);
hakyll-skeleton = import flake.inputs.hakyll-skeleton {}; hakyll-skeleton = flake.inputs.hakyll-skeleton.packages."${pkgs.system}".default;
webdomain = "skeleton.reciproka.co"; webdomain = "skeleton.reciproka.dev";
in { in {
environment.sessionVariables = { environment.sessionVariables = {
LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive"; LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive";

View file

@ -25,7 +25,6 @@ in {
HTTP_PORT = 3002; # Provided unique port HTTP_PORT = 3002; # Provided unique port
ROOT_URL = "https://reciproka.dev/"; # Root web URL ROOT_URL = "https://reciproka.dev/"; # Root web URL
}; };
service.DISABLE_REGISTRATION = true;
in { in {
mailer = { mailer = {
ENABLED = true; ENABLED = true;
@ -35,6 +34,7 @@ in {
DEFAULT_BRANCH = "consensus"; DEFAULT_BRANCH = "consensus";
}; };
service = { service = {
DISABLE_REGISTRATION = true;
REGISTER_EMAIL_CONFIRM = true; REGISTER_EMAIL_CONFIRM = true;
}; };
"markup.restructuredtext" = { "markup.restructuredtext" = {

View file

@ -6,8 +6,8 @@
... ...
}: let }: let
flake = builtins.getFlake (toString ../.); flake = builtins.getFlake (toString ../.);
reciproka-web = import flake.inputs.reciproka-web {}; reciproka-web = flake.inputs.reciproka-web.packages."${pkgs.system}".default;
webdomain = "reciproka.co"; webdomain = "reciproka.net";
in { in {
environment.sessionVariables = { environment.sessionVariables = {
LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive"; LOCALE_ARCHIVE = "/run/current-system/sw/lib/locale/locale-archive";
@ -29,6 +29,13 @@ in {
"www.${webdomain}" = { "www.${webdomain}" = {
# Respect our elders :-) # Respect our elders :-)
locations."/".extraConfig = "return 301 $scheme://${webdomain}$request_uri;"; locations."/".extraConfig = "return 301 $scheme://${webdomain}$request_uri;";
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
};
"reciproka.co" = {
locations."/".extraConfig = "return 301 $scheme://${webdomain}$request_uri;";
enableACME = true; # Use ACME certs
forceSSL = true; # Force SSL
}; };
}; };
}; };
@ -36,10 +43,9 @@ in {
security.acme = { security.acme = {
acceptTerms = true; acceptTerms = true;
certs = { certs = {
"${webdomain}" = { "${webdomain}" = {email = "admin@${webdomain}";};
email = "admin@${webdomain}"; "www.${webdomain}" = {email = "admin@${webdomain}";};
#group = "matrix-synapse"; "reciproka.co" = {email = "admin@${webdomain}";};
};
}; };
}; };

View file

@ -1,18 +1,21 @@
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyAveERD YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyBSMUhj
RlloME0vRXYwbWtqVFpOdS83ODFpcSsvQUNmOHA3Qm01Mi9rSEYwCnBvT0V3NzU4 Zk9XdkxaZkpXYkF3K2lpbkR5dmZYYzJhUi9UanpBVEI1S2IvZXhNCnpyT09mZHNv
YUVFUmdwUDBoQjlMa0V2SzBGbWJGT1QwL1Nqd1NRV2xabDAKLT4gc3NoLWVkMjU1 YktCcUd5Y2w1bnNNajFjaWl6Um9yWFpUTkFGdjRINnZFRW8KLT4gc3NoLWVkMjU1
MTkgUWQwZXBRIDFjNnRyalVlMCsya1JvQXdXUGlBdFVsaTVFK3hDaDFneXJTM012 MTkgUWQwZXBRIHE3RXdLUC82TVNJdHIvU2xnWGF1QktCZGkxbFhsT0dxVDRZZWgy
dnFka2sKa3J5ZlBtekxGM01sK09SVnY1SmZEMi9HSUpONDI4ZFVudW9LbjRkaitU aVBUbDQKUkxqdTc5ZlhQaG5OOXhtSVBlR2FCR2c3ZGR2cnFUWnN0WkQxRDRlWlg1
cwotPiBzc2gtZWQyNTUxOSBaRDhsTXcgSnZ4djlnZlF1ZVI2UEhsSUl0dlRWTzJa YwotPiBzc2gtZWQyNTUxOSB1N1ozancgR2pTOVZ5cGpmdzMzT1ZYelAwTTI1TVpG
bU9SZ0IwYXNkdzJ2ZEEvcHgyWQp4VC9waVdRK09aSlZkT1hNbTh5RUV4ck8rNjMr QUdlZ0xBZEo4NkpoZlZEVGlFTQpFelJDQ0RKaFFsVlRESERmMWJIQjZJcmh1QzBI
SXpPK0cxME9VS01XaEs0Ci0+IHNzaC1lZDI1NTE5IGY1VGhBZyBsMm50NjZxK0RZ VFU3QmZGZ2JKcFMyNmJrCi0+IHNzaC1lZDI1NTE5IFpEOGxNdyBYSHdCdXJRTUVI
eUowTVJnQVpDWHlodTJmSitPekFnMVArZVdscVRtVVVJCjNEV0laQXNmcjJaVWFM eDFJZHRHY2JhUTRha1JNRFg5c3ppbVo0OGdQSXdPOUdJCjBFSTVpd2JWd2xkTjZx
R0tDdzFWdFNBaFFjU3YzQzZWckdVS3RBWG1CKzQKLT4gUzJeVD4iKC1ncmVhc2UK VDVuMlVHb1Z1aEhYU2kxWkpwV2hJUDZQRzNkckUKLT4gc3NoLWVkMjU1MTkgZjVU
L0xsMEtLejZxVHE4U0VLbGhIYTlDS2IzQWVsL2FpTmppay9sZUxWK01BCi0tLSB5 aEFnIG1zay9zeUFtd3dkOTJQUFR6S0ZnUm9jbmQ0TkJQU2pJTTYrMmNEaE5KeTAK
WWNJSVJOZUoxanlRbnRRQ1kvYzVrVFpSN293UWhuelZrRWVFQlltdllrCg3cGJL9 WXN2OFM2anNYYXF6Wk9rUnFjQzNGSjdhTGFyVDhhd1dORWxRaUpuRG9XUQotPiBe
MEIrfgtvsPdHOqpkp8TeeRVLIephesuve8S17Lujt2WPmigzf7fCQ1rc9/W/VMsT d3pXUTxFLWdyZWFzZSBvVT16IFw3Oz02IGQ/ZFVjQS4KVnBKTVc0YzR3SEhaOS80
g6tQhsdPeQTynPih1htXlweypUU8mdAMT49qV+TumR0SybuM0eff+emLK7juUQCw bzE1NXMxaHh1QStNaXZ4eGZrbDdrV0k5YW5rQTdKbGJsbzZsRzFLMi9veTAKLS0t
zoy8rZlsPnDI0zYuDpWsVYFdnkS3cm4YHd7CNlAyF+jWk2Z87C8BaGhPxWvDL92b IGdEblEzcTdkcWVFVURycTJsTUl5MHEySUdTRTJub1hMVnJNekMxQTAxTGcKot0G
DwZpLuniZKBB6uew 3I1FgBm5Hw3MkQXfRdX6FgzAAEmH0t+v8R087u7vDbzVFVwVWGm4qQuHTwYNa1Yu
5gcM8LAg9N/ZV6Mc7+OlqKoKTs6S+VhphfbuDPrwJZUJT/OO30MgEdgemZ+JtQoA
O5str1O/0MBTQRyqJglcIjD2rPQcl9cZQupvJeaTOkdoLQ3Pv8aUrZBg3yHg6JX4
N5siGxgv/NfGcpCvkUM=
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----

View file

@ -1,12 +1,13 @@
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyBFWmM3 YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyBuMjdR
SGVENHM5NFRwbmMxWFcxNXppV25reUNpbnFxejhPbWIyWTdKMlEwCk42VG9zemQ0 ZzN1QTRIend1TWhLSDZzQ0JQUG9tZFdGZUo4QUljV3pnaEdDR1VzCi9PRXFnTDlD
eXNzMjRtdXFZZGtVSW5XTEFvQzBjN1ZaUzJUdGZzeW1uYkEKLT4gc3NoLWVkMjU1 NFhtYW4reHphUFFqUVBDd2pxY2liOXgwRUlIZzcvZTdWWTAKLT4gc3NoLWVkMjU1
MTkgZjVUaEFnIEpkVVJpZkdiSHRBMjdyMFBZRXNrQXF2RG9mbVRLcFVjSWpyOEYv MTkgZjVUaEFnIGRvQUFSMzFzVmZLT0Z4SlczNmdicThCYklBbisvcmlzejI4b3Jm
L0tmQVEKdFlKbGx2ZElmVUxTcVdiZGkyVk1sMSswSnJ6VERXYWVLMWRDWTdwWU9j ZVRTVmsKWDlKTkV6STJaSEVDL0tMVmMvcUt0L3pOS0xXU281bjRXSkJDSXloLzZE
ZwotPiBiP0BeJk85Pi1ncmVhc2UgbCl0NGw2IHdOdjg1biBnIV89Wm83RyBFe31r OAotPiBVLWdyZWFzZSBCZTMgM01ZIEd0OWcKdnMvd0FJOEhmQTdTcElld0JsNXdD
ZTtoCklFVk83MWQ3MnRPL1RTQm9PU3RDY1RKajZkR21RLzVoVUVXS2ovTEpHWGY1 bS9hWUtHam1PR0tyTmowck1rVEEzZXc0QjhWNjVNZVU0anRCS1lrMkRtVApQcVdV
V0lNTWlsRm9IRktpTmwyYVFwZncKZ0ZDQmxuUDBMaFNHcmcKLS0tIG45U1prZUJX djJORHppTEFib1VLOC9LbG5OdWhNdEZKWGJyQ3Z6dUFTOEw5WjZsT2E4SDRSSUlK
Wi9iOGE5UDBiNzBOTVY0V1FFaTBpOXN4V1NpQVc2bm82cW8KWN4G2p4FkRBeVkKt aEpWRUNYRlZTdwotLS0geFBJK21QRGZxd3lZRjZRanhDeFRDTTd6T1p2UGhiNXBm
MR6puzAlFaXiQrE26RPrHepdfQz62+zu0eFKQd6+w/dwUMoyoElBCCZeWyiA NnhaWkptcDFsYwqWryUWy5DtJHpelFVJu9DnS2rUS9JVnjIHCj2MNYrs6f5cxzZP
4+CUjz1Agu+ODFUvsl/ccIvcaS0=
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----

View file

@ -1,19 +1,22 @@
-----BEGIN AGE ENCRYPTED FILE----- -----BEGIN AGE ENCRYPTED FILE-----
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyBGTW5o YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IHNzaC1lZDI1NTE5IFAvWjlQZyBsWm9s
dWVTNjFIN1AwV01tVlV4Sy9NcDZ1QjZZdDVMTkE0cTJxOHJ2NFFzCjYyRXBYNVhB UzB6bzM2VU9IR3Y2MUcrdmtJTk1nM3h0VFV4WFNaaU9pZ0pHMWxBClpiRDZ3VVU1
RUQwaVM2cFNpMEEzZTNHWVV4V0FDTXdGQ0FHLzNOaE14KzgKLT4gc3NoLWVkMjU1 VkE5SHhJZXc4RGJOenY3Qzc1eXN6Y1M2d1ZnU1dIbHFvQUUKLT4gc3NoLWVkMjU1
MTkgUWQwZXBRIDZTQmdzdFoxQ24waHNXb2N1cW9Uc3NMcnNWV0VOSmcwVmEzVzFS MTkgUWQwZXBRIGVCZURhelZkTFpoRldaVlZoZzVBenBjbEROUlIrTERnN2VpNmhP
elJuZ1kKV1lWUm1LZUMzdzYxdDQ4VDBGdDRXNnNMbTFIMFl1WFdSZ092dm5hWXRy dVFNSDQKNXNWNU5iOGRBV3ZMVzdSVXRPSTkvQzJpblVsbERJekM0VHdnbEwyd0tG
VQotPiBzc2gtZWQyNTUxOSBaRDhsTXcgbzdQYlpmQnBQVHEwV3EwNjNDU1hCSTlu VQotPiBzc2gtZWQyNTUxOSB1N1ozancgY2pvTllQbytTbDBZaHlSbVFxa2ZYbmFt
OWh5NDdrL0N6cDRPVUlyQndrTQptckpUNXR4YmhDMnJkR2FTK2Z6RzkwNFRjRjRP OTlvYTQrMUcybVdJd2gxb2Jsbwo4RXBLMkdYSFY3aHYxSGZnS0h4S21ablBueFBz
cThwNElxMHRxbkp3QjA4Ci0+IHNzaC1lZDI1NTE5IGY1VGhBZyB1K0dXUXVuMC9Z L2JFaEhaYWR5VFFNQzhVCi0+IHNzaC1lZDI1NTE5IFpEOGxNdyBDZGNmblJIWGtx
U0Vnbjg5U3J3eFRFOU9OYUNTLzlGYTE4aHZVd1k0Z0Z3CnpSQkswMjlScDBZV3ow QWhEeldzVGZmUWJ6anM4Y2hTT0tpUVNpNDVyRDJRQ240Clk2bmpCVlI4RWduRS80
NkdDdmZsN2UraFlxd1pzQ2xLWWVXbVBXU281OGMKLT4gQi9JLWdyZWFzZSB1UiU2 cVRVWWwycDdtdVpFS25BSDAzOEh5YUcxdW9GclkKLT4gc3NoLWVkMjU1MTkgZjVU
MiBzIGI4RWVOdyAhbUJhVHRTXgpKSGs2Sk44WkNMSUlvWjVLUTdsOGJkM3pNNzVL aEFnIDZBbXVIQVdoaVl6TlZXR1FmeEtwL0hBNWc4c0lvSFlQTzZVc1VJZ09PMXcK
clVPR1hkOXM3Tk1aUUszUnViN2xPM3EvVEhjZGpmSGhQOE5CCk5FWVdzTkx6SkND VnhFVVg4eTZiRU1YbUhxUzJrYXRUeWpVVFdOSWpUNHNvUWZCRXd1U3Y3VQotPiBB
QW9PU1pyV0I4Wm9Jdnh4RQotLS0gQ2JRYnA0Y2I5a1ZpZStidFBtWWZyditpZ25o IW9WfGMlLWdyZWFzZQo2WmhadWt6cFZ3S2FONDFIWUFPWWpMOXFRT1d2alNPajVI
Mmw2KzZOY1dEMDRZcUEyTQrRvJW1UGMHGZbY6U8p4nqv0JPPBJjAWd6JWMll0bio aUJrdmVVT1J1OHA3Uy9LMjdadSs4RnhldGNxWGNtCitJSHhKSlhnMzI0UDdtSFBX
b413jw7QNzFVsSeVKLN+ggneRsCYi4ax4Zwq4iZCn7+3C4xB//SyLmmlmnnW+0tR T0tuY0NvRkI5Q0F6YkJmSHI3aFlReHJORVNLL1RJMkI5QUt5NllmcGcKLS0tIGFQ
odrfE0r84I12AK35SKZjLQBw5osOiYB9lSbloZTMHVguvKjwqcg1V3eX6909yeou YXpDdDhnR05PaGQ0WEdVd2hMUURnRmtnbDVvWkt0ZDNtaVhxT0ZIbFUKcYbxjmgx
urCplU5qLT2XFrtLSWGtax3D49lOezWwoLC/uZPm9MX97g== v7X82tsU3fuTUo9l2q3HmHECwKlvyqsXyyJst+/jJgANfE7/tHm0t6Dm4fPgBvdN
0AqTDx1p7PLvfQhMuhD2G9mHGLwcom3xUOI8h6JkMCv+bojWD9RCEB+wsAwfCzVV
pStMrMl6copsy1/E4yXkkm+kBgIMFeGzQvRyZ+UCri0rjzsGFQWEgUgD3fFcNJIq
HCYi0uW970YK2qI=
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----

View file

@ -11,9 +11,10 @@ let
users = [fiscalvelvetpoet]; users = [fiscalvelvetpoet];
flemming = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK16f3Fjj0BY9vjtXahezMAP3I329hHEQXCceRTkr+Yu"; flemming = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK16f3Fjj0BY9vjtXahezMAP3I329hHEQXCceRTkr+Yu";
hollows = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEGB8EUbqoarM4GmPgE2DBF4z/L6wVNc+lF27Z83XDUz";
pred = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMK5BOK1ldtZ+SV4QxfNm/PfOLOWv3/VHf/JbdMMoMzw"; pred = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMK5BOK1ldtZ+SV4QxfNm/PfOLOWv3/VHf/JbdMMoMzw";
toscano = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGWcukRkNUQUbgXQle8q9xszDZOnDf3BVpPSFgycJVVE"; toscano = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGWcukRkNUQUbgXQle8q9xszDZOnDf3BVpPSFgycJVVE";
systems = [flemming pred toscano]; systems = [flemming hollows pred toscano];
in { in {
"root.age".publicKeys = ops ++ systems; "root.age".publicKeys = ops ++ systems;
"fiscalvelvetpoet.age".publicKeys = [fiscalvelvetpoet] ++ systems; "fiscalvelvetpoet.age".publicKeys = [fiscalvelvetpoet] ++ systems;

View file

@ -4,6 +4,7 @@
alejandra, alejandra,
mkShell, mkShell,
colmena, colmena,
nix,
}: }:
with pkgs; with pkgs;
mkShell { mkShell {