Compare commits
2 Commits
8652fb7b07
...
cac332c6fb
| Author | SHA1 | Date | |
|---|---|---|---|
| cac332c6fb | |||
| 4850d85030 |
@@ -6,6 +6,8 @@
|
|||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [
|
imports = [
|
||||||
|
./secrets.nix
|
||||||
|
./syncthing.nix
|
||||||
../../modules/syncthing.nix
|
../../modules/syncthing.nix
|
||||||
../../profiles/core.nix
|
../../profiles/core.nix
|
||||||
../../profiles/darwin.nix
|
../../profiles/darwin.nix
|
||||||
@@ -19,30 +21,6 @@
|
|||||||
networking.hostName = "chidi";
|
networking.hostName = "chidi";
|
||||||
networking.computerName = "Chidi";
|
networking.computerName = "Chidi";
|
||||||
|
|
||||||
sops.age.keyFile = "/Users/${user}/.config/sops/age/keys.txt";
|
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
chidi-syncthing-cert = {
|
|
||||||
sopsFile = ../../secrets/chidi-syncthing-cert;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/Users/${user}/.config/syncthing/cert.pem";
|
|
||||||
};
|
|
||||||
chidi-syncthing-key = {
|
|
||||||
sopsFile = ../../secrets/chidi-syncthing-key;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/Users/${user}/.config/syncthing/key.pem";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.syncthing.settings.folders = {
|
|
||||||
"Projects/Work" = {
|
|
||||||
path = "/Users/${user}/Projects/Work";
|
|
||||||
devices = ["tahani" "chidi"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
imports = [
|
imports = [
|
||||||
inputs.nixvim.homeModules.nixvim
|
inputs.nixvim.homeModules.nixvim
|
||||||
|
|||||||
18
hosts/chidi/secrets.nix
Normal file
18
hosts/chidi/secrets.nix
Normal file
@@ -0,0 +1,18 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
sops.age.keyFile = "/Users/${user}/.config/sops/age/keys.txt";
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
chidi-syncthing-cert = {
|
||||||
|
sopsFile = ../../secrets/chidi-syncthing-cert;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/Users/${user}/.config/syncthing/cert.pem";
|
||||||
|
};
|
||||||
|
chidi-syncthing-key = {
|
||||||
|
sopsFile = ../../secrets/chidi-syncthing-key;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/Users/${user}/.config/syncthing/key.pem";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
8
hosts/chidi/syncthing.nix
Normal file
8
hosts/chidi/syncthing.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
services.syncthing.settings.folders = {
|
||||||
|
"Projects/Work" = {
|
||||||
|
path = "/Users/${user}/Projects/Work";
|
||||||
|
devices = ["tahani" "chidi"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -4,6 +4,8 @@
|
|||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [
|
imports = [
|
||||||
|
./secrets.nix
|
||||||
|
./syncthing.nix
|
||||||
../../modules/syncthing.nix
|
../../modules/syncthing.nix
|
||||||
../../profiles/core.nix
|
../../profiles/core.nix
|
||||||
../../profiles/darwin.nix
|
../../profiles/darwin.nix
|
||||||
@@ -17,32 +19,6 @@
|
|||||||
networking.hostName = "jason";
|
networking.hostName = "jason";
|
||||||
networking.computerName = "Jason";
|
networking.computerName = "Jason";
|
||||||
|
|
||||||
services.syncthing.settings.folders = {
|
|
||||||
"Projects/Personal" = {
|
|
||||||
path = "/Users/${user}/Projects/Personal";
|
|
||||||
devices = ["tahani" "jason"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.age.keyFile = "/Users/${user}/.config/sops/age/keys.txt";
|
|
||||||
sops.age.sshKeyPaths = [];
|
|
||||||
sops.gnupg.sshKeyPaths = [];
|
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
jason-syncthing-cert = {
|
|
||||||
sopsFile = ../../secrets/jason-syncthing-cert;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/Users/${user}/.config/syncthing/cert.pem";
|
|
||||||
};
|
|
||||||
jason-syncthing-key = {
|
|
||||||
sopsFile = ../../secrets/jason-syncthing-key;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/Users/${user}/.config/syncthing/key.pem";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
imports = [
|
imports = [
|
||||||
inputs.nixvim.homeModules.nixvim
|
inputs.nixvim.homeModules.nixvim
|
||||||
|
|||||||
20
hosts/jason/secrets.nix
Normal file
20
hosts/jason/secrets.nix
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
sops.age.keyFile = "/Users/${user}/.config/sops/age/keys.txt";
|
||||||
|
sops.age.sshKeyPaths = [];
|
||||||
|
sops.gnupg.sshKeyPaths = [];
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
jason-syncthing-cert = {
|
||||||
|
sopsFile = ../../secrets/jason-syncthing-cert;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/Users/${user}/.config/syncthing/cert.pem";
|
||||||
|
};
|
||||||
|
jason-syncthing-key = {
|
||||||
|
sopsFile = ../../secrets/jason-syncthing-key;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/Users/${user}/.config/syncthing/key.pem";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
8
hosts/jason/syncthing.nix
Normal file
8
hosts/jason/syncthing.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
services.syncthing.settings.folders = {
|
||||||
|
"Projects/Personal" = {
|
||||||
|
path = "/Users/${user}/Projects/Personal";
|
||||||
|
devices = ["tahani" "jason"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -11,6 +11,8 @@
|
|||||||
(modulesPath + "/profiles/qemu-guest.nix")
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
./openssh.nix
|
||||||
|
./secrets.nix
|
||||||
../../profiles/core.nix
|
../../profiles/core.nix
|
||||||
../../profiles/fail2ban.nix
|
../../profiles/fail2ban.nix
|
||||||
../../profiles/gitea.nix
|
../../profiles/gitea.nix
|
||||||
@@ -20,11 +22,6 @@
|
|||||||
inputs.sops-nix.nixosModules.sops
|
inputs.sops-nix.nixosModules.sops
|
||||||
];
|
];
|
||||||
|
|
||||||
sops.secrets.litestream = {
|
|
||||||
sopsFile = ../../secrets/michael-litestream;
|
|
||||||
format = "binary";
|
|
||||||
};
|
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
@@ -52,13 +49,5 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.openssh = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
PermitRootLogin = "yes";
|
|
||||||
PasswordAuthentication = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.hostName = hostname;
|
networking.hostName = hostname;
|
||||||
}
|
}
|
||||||
|
|||||||
9
hosts/michael/openssh.nix
Normal file
9
hosts/michael/openssh.nix
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{...}: {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PermitRootLogin = "yes";
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
6
hosts/michael/secrets.nix
Normal file
6
hosts/michael/secrets.nix
Normal file
@@ -0,0 +1,6 @@
|
|||||||
|
{...}: {
|
||||||
|
sops.secrets.litestream = {
|
||||||
|
sopsFile = ../../secrets/michael-litestream;
|
||||||
|
format = "binary";
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -11,6 +11,9 @@
|
|||||||
(modulesPath + "/profiles/qemu-guest.nix")
|
(modulesPath + "/profiles/qemu-guest.nix")
|
||||||
./disk-config.nix
|
./disk-config.nix
|
||||||
./hardware-configuration.nix
|
./hardware-configuration.nix
|
||||||
|
./openssh.nix
|
||||||
|
./pgbackrest.nix
|
||||||
|
./secrets.nix
|
||||||
../../modules/pgbackrest.nix
|
../../modules/pgbackrest.nix
|
||||||
../../profiles/core.nix
|
../../profiles/core.nix
|
||||||
../../profiles/fail2ban.nix
|
../../profiles/fail2ban.nix
|
||||||
@@ -21,19 +24,6 @@
|
|||||||
inputs.sops-nix.nixosModules.sops
|
inputs.sops-nix.nixosModules.sops
|
||||||
];
|
];
|
||||||
|
|
||||||
sops.secrets.mindy-pgbackrest = {
|
|
||||||
sopsFile = ../../secrets/mindy-pgbackrest;
|
|
||||||
format = "binary";
|
|
||||||
owner = "postgres";
|
|
||||||
group = "postgres";
|
|
||||||
};
|
|
||||||
|
|
||||||
my.pgbackrest = {
|
|
||||||
enable = true;
|
|
||||||
secretFile = "/run/secrets/mindy-pgbackrest";
|
|
||||||
s3.bucket = "mindy-pgbackrest";
|
|
||||||
};
|
|
||||||
|
|
||||||
home-manager.users.${user} = {
|
home-manager.users.${user} = {
|
||||||
pkgs,
|
pkgs,
|
||||||
lib,
|
lib,
|
||||||
@@ -61,14 +51,6 @@
|
|||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
services.openssh = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
PermitRootLogin = "yes";
|
|
||||||
PasswordAuthentication = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
|
|
||||||
networking.hostName = hostname;
|
networking.hostName = hostname;
|
||||||
|
|||||||
9
hosts/mindy/openssh.nix
Normal file
9
hosts/mindy/openssh.nix
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{...}: {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PermitRootLogin = "yes";
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
7
hosts/mindy/pgbackrest.nix
Normal file
7
hosts/mindy/pgbackrest.nix
Normal file
@@ -0,0 +1,7 @@
|
|||||||
|
{...}: {
|
||||||
|
my.pgbackrest = {
|
||||||
|
enable = true;
|
||||||
|
secretFile = "/run/secrets/mindy-pgbackrest";
|
||||||
|
s3.bucket = "mindy-pgbackrest";
|
||||||
|
};
|
||||||
|
}
|
||||||
8
hosts/mindy/secrets.nix
Normal file
8
hosts/mindy/secrets.nix
Normal file
@@ -0,0 +1,8 @@
|
|||||||
|
{...}: {
|
||||||
|
sops.secrets.mindy-pgbackrest = {
|
||||||
|
sopsFile = ../../secrets/mindy-pgbackrest;
|
||||||
|
format = "binary";
|
||||||
|
owner = "postgres";
|
||||||
|
group = "postgres";
|
||||||
|
};
|
||||||
|
}
|
||||||
21
hosts/tahani/adguardhome.nix
Normal file
21
hosts/tahani/adguardhome.nix
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
{...}: {
|
||||||
|
services.adguardhome = {
|
||||||
|
enable = true;
|
||||||
|
port = 10000;
|
||||||
|
settings = {
|
||||||
|
dns = {
|
||||||
|
upstream_dns = [
|
||||||
|
"1.1.1.1"
|
||||||
|
"1.0.0.1"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
filtering = {
|
||||||
|
protection_enabled = true;
|
||||||
|
filtering_enabled = true;
|
||||||
|
safe_search = {
|
||||||
|
enabled = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -1,12 +1,17 @@
|
|||||||
{
|
{
|
||||||
config,
|
|
||||||
hostname,
|
|
||||||
user,
|
|
||||||
inputs,
|
inputs,
|
||||||
|
pkgs,
|
||||||
|
user,
|
||||||
constants,
|
constants,
|
||||||
...
|
...
|
||||||
}: {
|
}: {
|
||||||
imports = [
|
imports = [
|
||||||
|
./adguardhome.nix
|
||||||
|
./networking.nix
|
||||||
|
./openssh.nix
|
||||||
|
./paperless.nix
|
||||||
|
./secrets.nix
|
||||||
|
./syncthing.nix
|
||||||
../../profiles/core.nix
|
../../profiles/core.nix
|
||||||
../../profiles/nixos.nix
|
../../profiles/nixos.nix
|
||||||
../../profiles/syncthing.nix
|
../../profiles/syncthing.nix
|
||||||
@@ -54,91 +59,5 @@
|
|||||||
programs.git.settings.user.email = "christoph@schmatzler.com";
|
programs.git.settings.user.email = "christoph@schmatzler.com";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.adguardhome = {
|
virtualisation.docker.enable = true;
|
||||||
enable = true;
|
|
||||||
port = 10000;
|
|
||||||
settings = {
|
|
||||||
dns = {
|
|
||||||
upstream_dns = [
|
|
||||||
"1.1.1.1"
|
|
||||||
"1.0.0.1"
|
|
||||||
];
|
|
||||||
};
|
|
||||||
filtering = {
|
|
||||||
protection_enabled = true;
|
|
||||||
filtering_enabled = true;
|
|
||||||
safe_search = {
|
|
||||||
enabled = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
virtualisation.docker = {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
services.openssh = {
|
|
||||||
enable = true;
|
|
||||||
settings = {
|
|
||||||
PermitRootLogin = "prohibit-password";
|
|
||||||
PasswordAuthentication = false;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/" = {
|
|
||||||
device = "/dev/disk/by-label/NIXROOT";
|
|
||||||
fsType = "ext4";
|
|
||||||
};
|
|
||||||
|
|
||||||
fileSystems."/boot" = {
|
|
||||||
device = "/dev/disk/by-label/NIXBOOT";
|
|
||||||
fsType = "vfat";
|
|
||||||
};
|
|
||||||
|
|
||||||
networking = {
|
|
||||||
hostName = hostname;
|
|
||||||
useDHCP = false;
|
|
||||||
interfaces.eno1.ipv4.addresses = [
|
|
||||||
{
|
|
||||||
address = "192.168.1.10";
|
|
||||||
prefixLength = 24;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
defaultGateway = "192.168.1.1";
|
|
||||||
nameservers = ["1.1.1.1"];
|
|
||||||
firewall = {
|
|
||||||
enable = true;
|
|
||||||
trustedInterfaces = ["eno1" "tailscale0"];
|
|
||||||
allowedUDPPorts = [config.services.tailscale.port];
|
|
||||||
allowedTCPPorts = [22 5555];
|
|
||||||
checkReversePath = "loose";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
sops.secrets = {
|
|
||||||
tahani-syncthing-cert = {
|
|
||||||
sopsFile = ../../secrets/tahani-syncthing-cert;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/home/${user}/.config/syncthing/cert.pem";
|
|
||||||
};
|
|
||||||
tahani-syncthing-key = {
|
|
||||||
sopsFile = ../../secrets/tahani-syncthing-key;
|
|
||||||
format = "binary";
|
|
||||||
owner = user;
|
|
||||||
path = "/home/${user}/.config/syncthing/key.pem";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.syncthing.settings.folders = {
|
|
||||||
"Projects/Personal" = {
|
|
||||||
path = "/home/${user}/Projects/Personal";
|
|
||||||
devices = ["tahani" "jason"];
|
|
||||||
};
|
|
||||||
"Projects/Work" = {
|
|
||||||
path = "/home/${user}/Projects/Work";
|
|
||||||
devices = ["tahani" "chidi"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
}
|
||||||
|
|||||||
31
hosts/tahani/networking.nix
Normal file
31
hosts/tahani/networking.nix
Normal file
@@ -0,0 +1,31 @@
|
|||||||
|
{config, hostname, ...}: {
|
||||||
|
networking = {
|
||||||
|
hostName = hostname;
|
||||||
|
useDHCP = false;
|
||||||
|
interfaces.eno1.ipv4.addresses = [
|
||||||
|
{
|
||||||
|
address = "192.168.1.10";
|
||||||
|
prefixLength = 24;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
defaultGateway = "192.168.1.1";
|
||||||
|
nameservers = ["1.1.1.1"];
|
||||||
|
firewall = {
|
||||||
|
enable = true;
|
||||||
|
trustedInterfaces = ["eno1" "tailscale0"];
|
||||||
|
allowedUDPPorts = [config.services.tailscale.port];
|
||||||
|
allowedTCPPorts = [22 5555];
|
||||||
|
checkReversePath = "loose";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/" = {
|
||||||
|
device = "/dev/disk/by-label/NIXROOT";
|
||||||
|
fsType = "ext4";
|
||||||
|
};
|
||||||
|
|
||||||
|
fileSystems."/boot" = {
|
||||||
|
device = "/dev/disk/by-label/NIXBOOT";
|
||||||
|
fsType = "vfat";
|
||||||
|
};
|
||||||
|
}
|
||||||
9
hosts/tahani/openssh.nix
Normal file
9
hosts/tahani/openssh.nix
Normal file
@@ -0,0 +1,9 @@
|
|||||||
|
{...}: {
|
||||||
|
services.openssh = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
PermitRootLogin = "prohibit-password";
|
||||||
|
PasswordAuthentication = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
26
hosts/tahani/paperless.nix
Normal file
26
hosts/tahani/paperless.nix
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
{config, ...}: {
|
||||||
|
services.redis.servers.paperless = {
|
||||||
|
enable = true;
|
||||||
|
port = 6379;
|
||||||
|
bind = "127.0.0.1";
|
||||||
|
settings = {
|
||||||
|
maxmemory = "256mb";
|
||||||
|
maxmemory-policy = "allkeys-lru";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.paperless = {
|
||||||
|
enable = true;
|
||||||
|
address = "0.0.0.0";
|
||||||
|
passwordFile = config.sops.secrets.tahani-paperless-password.path;
|
||||||
|
settings = {
|
||||||
|
PAPERLESS_DBENGINE = "sqlite";
|
||||||
|
PAPERLESS_REDIS = "redis://127.0.0.1:6379";
|
||||||
|
PAPERLESS_CONSUMER_IGNORE_PATTERN = [
|
||||||
|
".DS_STORE/*"
|
||||||
|
"desktop.ini"
|
||||||
|
];
|
||||||
|
PAPERLESS_OCR_LANGUAGE = "deu+eng";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
20
hosts/tahani/secrets.nix
Normal file
20
hosts/tahani/secrets.nix
Normal file
@@ -0,0 +1,20 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
sops.secrets = {
|
||||||
|
tahani-syncthing-cert = {
|
||||||
|
sopsFile = ../../secrets/tahani-syncthing-cert;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/home/${user}/.config/syncthing/cert.pem";
|
||||||
|
};
|
||||||
|
tahani-syncthing-key = {
|
||||||
|
sopsFile = ../../secrets/tahani-syncthing-key;
|
||||||
|
format = "binary";
|
||||||
|
owner = user;
|
||||||
|
path = "/home/${user}/.config/syncthing/key.pem";
|
||||||
|
};
|
||||||
|
tahani-paperless-password = {
|
||||||
|
sopsFile = ../../secrets/tahani-paperless-password;
|
||||||
|
format = "binary";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
12
hosts/tahani/syncthing.nix
Normal file
12
hosts/tahani/syncthing.nix
Normal file
@@ -0,0 +1,12 @@
|
|||||||
|
{user, ...}: {
|
||||||
|
services.syncthing.settings.folders = {
|
||||||
|
"Projects/Personal" = {
|
||||||
|
path = "/home/${user}/Projects/Personal";
|
||||||
|
devices = ["tahani" "jason"];
|
||||||
|
};
|
||||||
|
"Projects/Work" = {
|
||||||
|
path = "/home/${user}/Projects/Work";
|
||||||
|
devices = ["tahani" "chidi"];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
30
secrets/tahani-paperless-password
Normal file
30
secrets/tahani-paperless-password
Normal file
@@ -0,0 +1,30 @@
|
|||||||
|
{
|
||||||
|
"data": "ENC[AES256_GCM,data:w1+tiWkOFY8BYUcu5UjS4YmQbkxZC2LA2uBP,iv:kX8gWrABHeYKHkkqihidB/dx42TPGB+vxB+6N8Vse/c=,tag:z5vxVu0PuYfDUwTX4mwvEg==,type:str]",
|
||||||
|
"sops": {
|
||||||
|
"age": [
|
||||||
|
{
|
||||||
|
"recipient": "age1njjegjjdqzfnrr54f536yl4lduqgna3wuv7ef6vtl9jw5cju0grsgy62tm",
|
||||||
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBhbWZmSjFCRWFaWVVVeGx6\nMlhuT2hZOUdFN0E3MDBSUVNlUVFVRWNmNDJBCkVFSGlHdnVPVUY0VEdrLzZYbDBW\na3ZuQlJiOSs2N1RpRTMwR3ZuaG1aRjQKLS0tIGo2RmxFd0JleEZ3NjhWaTJES1hP\nZEtGUk1KUEhnWW44ajA2eW4wUlUzWUkKTJemTSLHVRi54LQetmzvAGm4V02laedc\n8WnphqOGIkIDIt/pwI7kUsbA/4fW8J0DxWi7OMDHIEx8Mxyt6Uzr+A==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"recipient": "age187jl7e4k9n4guygkmpuqzeh0wenefwrfkpvuyhvwjrjwxqpzassqq3x67j",
|
||||||
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBsTy9zUEY4Y1dlcFowZDNS\nVlprUXNQS3RwWmRvRGFScjlCK1FYSVM1VUJJCnlWZzRMZUV1RnJJQk9CNmNUbURh\nODdkUjZUanJJcU1OMDIyaEUycXdZR2cKLS0tIEh0ZzUxRmJMejFLWkdab0NKQlNz\nbC9OMmIvZEtNcG1ZRFJHa1V5a0x4SHcKgNv/ANu7HCgMBECFpGxRRPB3F+BPVo7p\n6Nb6wGxXHKIuxBU/3N4FXFYBvuI8rdfyOY9IThk031CDJ+BNnnaRxw==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"recipient": "age1dqt3znmzcgghsjjzzax0pf0eyu95h0p7kaf5v988ysjv7fl7lumsatl048",
|
||||||
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB3VjdHSDBPWlNpUklEUEFq\nMUo5Qk5YaHFJNDNUeUUzQjhkMGwwc2ZNZW5FClFHUG5MLzYrTlVZdzE3VlNRaWhv\nMmIwSmxFZzJEUkVNck9UUStrVkE1UHcKLS0tIDF3RkVPOXlTZkRDQXFKZmQyQnl3\nQkdIbm5meW82VTNSZmdIWEFDTUF3SnMKfG7t8fdn5+LqojTAs8LAS1e4exQXKxwf\nbobGHEwgUZOwCE16yNNDZNysFsejZuZBpnCYekozq6HnaiM6K17Fqw==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"recipient": "age1ez6j3r5wdp0tjy7n5qzv5vfakdc2nh2zeu388zu7a80l0thv052syxq5e2",
|
||||||
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBwT0lQQ29KeDVub2tCVXZ0\nK0sxWU1QcDY3SEtBWkU3aExETFJ5cjA2a0Z3CnVnUEg2YkdQa1VSV0ZscmxOaDFP\nYTNjQmtlcExhL2VZR21Sb3FNbU05TEUKLS0tIFp3N3lsZitZMkduMFlISllwWnpC\naVFBNmhpVVhyL1RpYmxCK0tWVlF5Q0kKWKOJ1w98Gy54slamOg7DpuItgNLj2cxW\nX8QUb51DhFwDl5tSOp7QqaggcXgdyhytwWdd6lHYhp0LKyhELbJnnw==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"recipient": "age1tlymdmaukhwupzrhszspp26lgd8s64rw4vu9lwc7gsgrjm78095s9fe9l3",
|
||||||
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBXL1VLZ1ZXRGM3amo3UFNt\nd3IxR1FXWDgzRWFBUlNYR242NVBBTzgzWUI0CjNzMjJDNk1CaEE2dmdMVzNvNVVK\nTzJsc25DNXh1NnlGRUtKVzdNVEhqemcKLS0tIG5GTE5rZnV1ZWFXZElIVzBLb1RB\nejVPZmRnR1ZHRDFaL2tpZzE1SzRQSmMKiqIZ9ZNqDt+Gn/oEm/qY+lE5Ej/S52SE\ntZ+ew0obHabv4pmtjkJmVvlGYKzmMpZlI9T+rCsKViXSvUP4E0IUWg==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
|
}
|
||||||
|
],
|
||||||
|
"lastmodified": "2025-12-20T21:46:17Z",
|
||||||
|
"mac": "ENC[AES256_GCM,data:j7G9ZsXE3Wrqhq4jIBKa6M+uO+OuKssdMzaQNCIKbhn5sE56Cwg2E396FFx+rrZD5ahYKxATr/pXcgH1DlsMGWKtMK+zPQRGrahknSIDbYD/BWBoeGFfaTddW2OohxWoRjl96ODZ29xd72nQewxMhIjG8S848C5fxjeaqraPxiM=,iv:evDbKdSIMdwbZp2Ld8wfVtAedw3y3Leru4CxDC57NhI=,tag:DRsRWYbcehJjpAWJVrAy0A==,type:str]",
|
||||||
|
"version": "3.11.0"
|
||||||
|
}
|
||||||
|
}
|
||||||
Reference in New Issue
Block a user