I can build now

This commit is contained in:
Christopher Mühl 2026-01-06 00:41:19 +01:00
parent 7eb51e9bbc
commit d976ee0035
No known key found for this signature in database
GPG key ID: 925AC7D69955293F
86 changed files with 202 additions and 230 deletions

View file

@ -0,0 +1,7 @@
{pkgs, ...}: {
bosun.key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBUKDCjB0VpQubi8BfnYKbh4MIE1tcvKQesdoPE4NXAf";
home.packages = with pkgs; [
helix
];
}

View file

@ -3,10 +3,6 @@
pkgs, pkgs,
... ...
}: { }: {
home.packages = with pkgs; [
lxappearance
];
gtk = { gtk = {
enable = true; enable = true;
@ -16,18 +12,6 @@
# package = pkgs.rose-pine-cursor; # package = pkgs.rose-pine-cursor;
# size = 32; # size = 32;
# }; # };
gtk2.extraConfig = lib._elements.selfReferencedString {sep = "#";} ''
gtk-enable-animations = 1
gtk-primary-button-warps-slider = 1
gtk-toolbar-style = 3
gtk-menu-images = 1
gtk-button-images = 1
gtk-sound-theme-name = "freedesktop"
'';
gtk3.extraConfig.gtk-application-prefer-dark-theme = 1;
gtk4.extraConfig.gtk-application-prefer-dark-theme = 1;
}; };
home.sessionVariables = { home.sessionVariables = {

View file

@ -30,12 +30,12 @@
tokei # Like cloc tokei # Like cloc
gource gource
zeal # Offline documentation browser zeal # Offline documentation browser
_elements.dedoc # Terminal-based documentation viewer harbor.dedoc # Terminal-based documentation viewer
just # Just a command runner just # Just a command runner
claude-monitor claude-monitor
devenv devenv
gitui gitui
_elements.oryx # TUI for sniffing network traffic using eBPF harbor.oryx # TUI for sniffing network traffic using eBPF
# Build tools # Build tools
cargo cargo

View file

@ -15,7 +15,7 @@
delta # Diffing tool delta # Diffing tool
onefetch # neofetch for git repos onefetch # neofetch for git repos
pkgs._elements.git-delete-stale harbor.git-delete-stale
]; ];
programs.git-global-log.enable = true; programs.git-global-log.enable = true;

View file

@ -2,7 +2,7 @@
home.packages = with pkgs; [ home.packages = with pkgs; [
# Simple browsers for HTML # Simple browsers for HTML
qutebrowser qutebrowser
pkgs._elements.firefox-with-context # Open URLs in different browser profiles based on context harbor.firefox-with-context # Open URLs in different browser profiles based on context
]; ];
xdg.mimeApps = { xdg.mimeApps = {

View file

@ -149,9 +149,9 @@
home = { home = {
extraOutputsToInstall = ["doc" "devdoc"]; extraOutputsToInstall = ["doc" "devdoc"];
packages = with pkgs._elements; [ packages = with pkgs; [
quick-zeal harbor.quick-zeal
spawn-term harbor.spawn-term
]; ];
}; };

View file

@ -1,11 +1,10 @@
{ {
pkgs, pkgs,
system,
inputs, inputs,
... ...
}: { }: {
home.packages = with pkgs; [ home.packages = with pkgs; [
inputs.affinity-nix.packages.${system}.v3 # adobe suite replacement inputs.affinity-nix.packages.${pkgs.stdenv.hostPlatform.system}.v3 # adobe suite replacement
gmic # greyc's magic gmic # greyc's magic
krita krita

View file

@ -4,6 +4,8 @@
... ...
}: { }: {
imports = [ imports = [
inputs.niri.homeModules.niri
./settings.nix ./settings.nix
./window-rules.nix ./window-rules.nix
./keybinds.nix ./keybinds.nix

View file

@ -1,6 +1,8 @@
{ {
config, config,
pkgs, pkgs,
lib,
inputs,
... ...
}: { }: {
programs.niri.settings = { programs.niri.settings = {
@ -8,8 +10,8 @@
"Mod+space".action = spawn "fuzzel"; "Mod+space".action = spawn "fuzzel";
"Mod+e".action = spawn "dolphin"; "Mod+e".action = spawn "dolphin";
"Mod+d".action = spawn "zeal"; # Documentation viewer "Mod+d".action = spawn "zeal"; # Documentation viewer
"Mod+c".action = spawn "${pkgs._elements.spawn-term}/bin/spawn-term"; "Mod+c".action = spawn "${"spawn-term"}/bin/spawn-term";
"Mod+g".action = spawn "${pkgs._elements.hg-picker}/bin/hg-picker"; "Mod+g".action = spawn "${pkgs.harbor.hg-picker}/bin/hg-picker";
"Mod+q".action = close-window; "Mod+q".action = close-window;
"Mod+f".action = fullscreen-window; "Mod+f".action = fullscreen-window;

View file

@ -6,7 +6,7 @@
programs.niri.settings = { programs.niri.settings = {
prefer-no-csd = true; prefer-no-csd = true;
debug.honor-xdg-activation-with-invalid-serial = true; # debug.honor-xdg-activation-with-invalid-serial = true;
layout = { layout = {
always-center-single-column = true; always-center-single-column = true;

View file

@ -1,17 +1,8 @@
{ {pkgs, ...}: {
pkgs, bosun.key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHl33DPxxzxrNNjM8rL4ktAj4ExzCyGiU8rKog0csxNA";
config,
...
} @ all: {
elements.secrets = {
rekeyPath = "christopher_molybdenum";
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHl33DPxxzxrNNjM8rL4ktAj4ExzCyGiU8rKog0csxNA";
};
elements.kitty.enable = true;
home.packages = with pkgs; [ home.packages = with pkgs; [
_elements.to-s3 harbor.to-s3
_elements.connect-to-mercury harbor.connect-to-mercury
]; ];
} }

View file

@ -1,6 +1,3 @@
# ++ 27_Co: Cobalt
#
# Main tower workstation environment
{ {
pkgs, pkgs,
lib, lib,
@ -31,7 +28,7 @@
}; };
networking = { networking = {
hostName = "cobalt"; hostName = "endurance";
firewall.enable = false; firewall.enable = false;
interfaces.eno1.wakeOnLan.enable = true; interfaces.eno1.wakeOnLan.enable = true;
}; };

View file

@ -86,53 +86,17 @@
./modules/flake ./modules/flake
]; ];
}); });
# (inputs.snowfall.mkFlake {
# inherit inputs;
# src = ./.;
# # Exposes all internal libs and packages as `lib._elements` or `pkgs._elements` respectively
# snowfall.namespace = "_elements";
# # Global system modules to be included for all systems
# systems.modules = with inputs; {
# nixos = [
# disko.nixosModules.default
# ./modules/common
# ];
# darwin = [
# stylix.darwinModules.stylix
# ./modules/common
# ];
# };
# # Add modules only to specific hosts # # Add modules only to specific hosts
# systems.hosts = with inputs; { # systems.hosts = with inputs; {
# cobalt.modules = [ # cobalt.modules = [
# niri.nixosModules.niri
# stylix.nixosModules.stylix # stylix.nixosModules.stylix
# musnix.nixosModules.default
# ovos.nixosModules.default # ovos.nixosModules.default
# waka-victoriametrics.nixosModules.default # waka-victoriametrics.nixosModules.default
# ]; # ];
# }; # };
# homes.users = {
# # TODO: For some reason this needs to be toggled for agenix to work?
# # "christopher@cobalt".modules = with inputs; [
# # niri.homeModules.niri
# # ];
# };
# # Configure nixpkgs when instantiating the package set
# # TODO: This is already specified elsewhere. Still needed here?
# channels-config = {
# allowUnfree = true;
# permittedInsecurePackages = [];
# };
# overlays = with inputs; [ # overlays = with inputs; [
# niri.overlays.niri
# nur.overlays.default
# ovos.overlays.default # ovos.overlays.default
# (final: prev: { # (final: prev: {
# waka-victoriametrics = waka-victoriametrics.packages.${final.system}.default; # waka-victoriametrics = waka-victoriametrics.packages.${final.system}.default;

View file

@ -1,18 +1,31 @@
{inputs, ...}: { {
inputs,
lib,
...
}: {
systems = [ systems = [
"x86_64-linux" "x86_64-linux"
"x86_64-darwin" "x86_64-darwin"
]; ];
perSystem = {system, ...}: { perSystem = {
system,
self',
...
}: {
# these settings only apply to flake-local packages being built, not to the
# nixpkgs instance within host and home configurations
_module.args.pkgs = import inputs.nixpkgs { _module.args.pkgs = import inputs.nixpkgs {
inherit system; inherit system;
config = {
allowUnfree = true;
allowUnsupportedSystem = true;
};
overlays = []; overlays = [
(final: prev: {
writeNushellApplication = import ./lib/writeNushellApplication.nix {
inherit lib;
pkgs = prev;
};
})
];
}; };
}; };
} }

View file

@ -4,6 +4,7 @@
./homes.nix ./homes.nix
./args.nix ./args.nix
./formatter.nix ./formatter.nix
./packages.nix
./lib ./lib
]; ];
} }

View file

@ -1,19 +1,11 @@
{ {inputs, ...}: let
inputs,
inputs',
...
}: let
inherit (inputs) self; inherit (inputs) self;
mkHost = host: config: mkHost = hostname: config:
{ {
path = ../../configurations/nixos/${host}; path = ../../configurations/nixos/${hostname};
deployable = true; deployable = true;
specialArgs = {inherit inputs hostname;};
specialArgs = {
inherit inputs inputs';
hostname = host;
};
} }
// config; // config;
in { in {

View file

@ -4,8 +4,7 @@
... ...
}: { }: {
flake.lib = lib.fixedPoints.makeExtensible (final: { flake.lib = lib.fixedPoints.makeExtensible (final: {
secrets = import ./secrets.nix {inherit inputs lib;}; # secrets = import ./secrets.nix {inherit inputs lib;};
# inherit (final.secrets) mkSecret;
inherit (final.secrets) mkSecret;
}); });
} }

View file

@ -1,4 +1,8 @@
{lib, ...}: pkgs: { {
lib,
pkgs,
...
}: {
/* /*
The name of the script to write. The name of the script to write.

View file

@ -1,24 +0,0 @@
{inputs, ...}: {
systems = [
"x86_64-linux"
"x86_64-darwin"
];
perSystem = {system, ...}: {
_module.args.pkgs = import inputs.nixpkgs {
inherit system;
config = {
allowUnfree = true;
permittedInsecurePackages = [
"nixos-config"
"electron-36.9.5"
"dotnet-sdk-6.0.428"
"olm-3.2.16"
];
};
overlays = [];
};
};
}

View file

@ -0,0 +1,13 @@
{lib, ...}: {
perSystem = {
config,
pkgs,
inputs',
...
}: {
packages = lib.filesystem.packagesFromDirectoryRecursive {
callPackage = pkgs.callPackage;
directory = ../../packages;
};
};
}

View file

@ -1,4 +1,9 @@
{pkgs, ...}: { {
pkgs,
lib,
inputs,
...
}: {
nix = { nix = {
package = pkgs.lixPackageSets.stable.lix; package = pkgs.lixPackageSets.stable.lix;
@ -23,12 +28,21 @@
}; };
nixpkgs = { nixpkgs = {
config.allowUnfree = true; config = {
config.permittedInsecurePackages = [ allowUnfree = true;
"nixos-config" allowUnfreePredicate = pkg:
"electron-36.9.5" builtins.elem (lib.getName pkg) [
"dotnet-sdk-6.0.428" "cider-2"
];
permittedInsecurePackages = [
# "nixos-config"
# "electron-36.9.5"
# "dotnet-sdk-6.0.428"
"olm-3.2.16" "olm-3.2.16"
]; ];
}; };
overlays = import ../../overlays {inherit inputs lib;};
};
} }

View file

@ -9,7 +9,7 @@ in {
home.shellAliases.inspect = "tmux -f ~/${tmuxConfigFile} new-session ssh inspect"; home.shellAliases.inspect = "tmux -f ~/${tmuxConfigFile} new-session ssh inspect";
home.file.${tmuxConfigFile}.text = lib._elements.selfReferencedString {sep = "#";} '' home.file.${tmuxConfigFile}.text = ''
set -g status-position top set -g status-position top
set-option -g status-bg default set-option -g status-bg default
set -g 'status-format[0]' '#[fill=colour202 bg=colour202 fg=colour231 bold]Danger! HAUSGOLD Inspector ' set -g 'status-format[0]' '#[fill=colour202 bg=colour202 fg=colour231 bold]Danger! HAUSGOLD Inspector '

View file

@ -14,7 +14,7 @@ in {
enable = true; enable = true;
shellAliases = config.home.shellAliases; shellAliases = config.home.shellAliases;
shellInit = lib._elements.selfReferencedString {sep = "#";} '' shellInit = ''
# Set global environment variables. # Set global environment variables.
${env} ${env}
''; '';

View file

@ -16,7 +16,7 @@
nushellPlugins.skim nushellPlugins.skim
]; ];
extraConfig = lib._elements.selfReferencedString {sep = "#";} '' extraConfig = ''
let carapace_completer = { |spans| let carapace_completer = { |spans|
carapace $spans.0 nushell ...$spans carapace $spans.0 nushell ...$spans
| from json | from json
@ -72,7 +72,7 @@
} }
''; '';
envFile.text = lib._elements.selfReferencedString {sep = "#";} '' envFile.text = ''
$env.PATH = ( $env.PATH = (
$env.PATH $env.PATH
| split row (char esep) | split row (char esep)

View file

@ -18,7 +18,8 @@ in {
options.bosun = { options.bosun = {
rekeyPath = mkOption { rekeyPath = mkOption {
type = types.str; type = types.str;
default = hostname; # TODO: Make username configurable
default = "toph.${hostname}";
}; };
key = mkOption { key = mkOption {

View file

@ -8,7 +8,7 @@
inherit (lib) mkIf; inherit (lib) mkIf;
in { in {
imports = [ imports = [
inputs.niri.nixosModules.niri #inputs.niri.nixosModules.niri
]; ];
config = mkIf config.bosun.profiles.graphical.enable { config = mkIf config.bosun.profiles.graphical.enable {

View file

@ -1,6 +1,5 @@
{ {
inputs, inputs,
inputs',
pkgs, pkgs,
hostname, hostname,
... ...
@ -15,10 +14,13 @@
programs.fish.enable = true; programs.fish.enable = true;
home-manager = { home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
users.toph = inputs.self.homeConfigurations."toph@${hostname}"; users.toph = inputs.self.homeConfigurations."toph@${hostname}";
extraSpecialArgs = { extraSpecialArgs = {
inherit inputs inputs' hostname; inherit inputs hostname;
}; };
}; };

View file

34
overlays/default.nix Normal file
View file

@ -0,0 +1,34 @@
{
lib,
inputs,
...
}: let
inherit (lib.attrsets) mapAttrs;
# wrapper that provides channels arg to each overlay
withChannels = overlayFn: final: prev: let
# Import channels with the same config as the main nixpkgs
importChannel = input: import input {
system = final.stdenv.hostPlatform.system;
config = final.config;
};
in
overlayFn {
inherit inputs;
channels =
{
nixpkgs = final;
}
// mapAttrs (
_: input:
importChannel input
)
inputs;
}
final
prev;
in [
(withChannels (import ./lix.nix))
(withChannels (import ./packages.nix))
(withChannels (import ./unstable.nix))
]

View file

@ -1,4 +1,4 @@
{channels, ...}: final: prev: { {...}: final: prev: {
inherit inherit
(prev.lixPackageSets.stable) (prev.lixPackageSets.stable)
nixpkgs-review nixpkgs-review

3
overlays/packages.nix Normal file
View file

@ -0,0 +1,3 @@
{inputs, ...}: final: prev: {
harbor = inputs.self.packages.${final.stdenv.hostPlatform.system} or {};
}

View file

@ -0,0 +1,18 @@
{pkgs, ...}:
pkgs.writeShellApplication {
name = "connect-to-mercury";
text = ''
hostname="mercury.local"
ip=$(dscacheutil -q host -a name $hostname | tail -n2 | head -n1 | cut -d' ' -f 2)
if [ -z "$ip" ]; then
echo "Host $${hostname} seems to be down. Are you sure the VM is running?"
exit 1
fi
echo "$hostname: $ip"
sudo route -n delete 172.17.0.0/16 &>/dev/null
sudo route -n add 172.17.0.0/16 "$ip" &>/dev/null
'';
}

View file

@ -1,9 +1,5 @@
{ {pkgs, ...}:
lib, pkgs.writeNushellApplication {
pkgs,
...
}:
lib._elements.writeNushellApplication pkgs {
name = "git-delete-stale"; name = "git-delete-stale";
runtimeInputs = with pkgs; [git]; runtimeInputs = with pkgs; [git];

View file

@ -1,14 +0,0 @@
#!/usr/bin/env bash
hostname="mercury.local"
ip=$(dscacheutil -q host -a name ${hostname} | tail -n2 | head -n1 | cut -d' ' -f 2)
if [ -z "${ip}" ]; then
echo "Host ${hostname} seems to be down. Are you sure the VM is running?"
exit 1
fi
echo "${hostname}: ${ip}"
sudo route -n delete 172.17.0.0/16 &>/dev/null
sudo route -n add 172.17.0.0/16 "${ip}" &>/dev/null

View file

@ -1,5 +0,0 @@
{pkgs, ...}:
pkgs.writeShellApplication {
name = "connect-to-mercury";
text = builtins.readFile ./connect-to-mercury;
}

View file

@ -1,9 +1,5 @@
{ {pkgs, ...}:
lib, pkgs.writeNushellApplication {
pkgs,
...
}:
lib._elements.writeNushellApplication pkgs {
name = "spawn-term"; name = "spawn-term";
runtimeInputs = with pkgs; [kdotool]; runtimeInputs = with pkgs; [kdotool];

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 pySEWw kigbWfXfeb8YlBMpSWM+jDPtjYeAltdTORqPQ7kqnFg
P8j10qrMzjWZ91FVnn4sLugS/AcS2XrMr9TRal5gRVc
-> m0^G"4-grease p]TT RuLz
9HFjCiuy7w
--- j57VRBCbLMVDI2s7DnpBwTvVzzvqwMdXL6Ec/9Tg6MA
cDÍ_FT,hº³ }/<2F>;A8õüPýþØ%/:E)pè”Õ€
¾qý{J­ UÚë†kï¸n\8L}j'Ãî‰yaãJ

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 pySEWw yyra9wL+n2gFPpbmnkvbsxBverCR/r7yPSw3aCD0slk
65Vc/tQKzfsFC5smIqHmXA7NlSJLW8oXAYPYiX3bGcw
-> MV*6+^H-grease uV!LS]1* B5lCK], yjN7.
O1RM77BbFx0SsKlEXUVAJCswHGS1oKfX1ZvBNcF47W0o//6iiBHOWTvpaW15xVMZ
00g
--- XNgzqoXEkkzK8TE/A81FFduXsiDouJFXV/9o/m/bnss
Q1‡©0#ÍšÎi~d¹Ç~ïòEðlÔgG^OÕ,ÊP:¹¡Ö£¨ëø[if>•,@i<>|DJ¹åm)P8hé·2ÈVÃãüÑkš)ø7£>u@qò¡ Í#͈×<CB86>ïfå<>¨ä<C2A8>™Û¥+¡O,œa<C593>,ð%éátRË[7<>îN

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 /u/eYA a2YtLIFiK8lETFr+I/Yixme90wgJX/X+kW2KpCFWGiM
xm/9eER61LCPTiRUi24Qh3gQq1OV8s9BQjgxRJfLvKs
-> vEX:@rY-grease #.ah Wz?~ Gr|K[7W -.UYxQ#
CTEhaEVZInKKSMg6Vzb54cghIPT7PbUy57qgdWwXx6lvbnnIxsqnRUwBhLK8sT3w
Sx+t1v8/cuDK
--- nzehXvl4h/fS4/3W2Rsn0Uu1E9NUsEIR6ni5qOA/U1I
®<EFBFBD>i«8<EFBFBD>üæÅKØ£„®Ù¾eÖ„™L•“ž+KV´ÉŒnC(?˜¶±C

View file

@ -1,10 +1,7 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 /u/eYA uWoNFabVJzmA1L8l124lyvnvAFgsQ9rh/Okags2UrxU -> ssh-ed25519 /u/eYA BvO3LN0SaFuuw7V5V+qRkAKFtW+ASCtMEo+HBOnccRk
vGenkj0xh5FbxTnS91XEz2qAoILYZS5skYHaadaNIBo 2tdN2DqV/NKLX00LBp012xqimkBCdbZBFPXoQOWDqKc
-> F"k"3;+O-grease (5t/PH -> ig7-grease 0X s
zBRuwDmTbpClRyVeC77vgGo4aDE2/KxWdcJK1gXvu60DxzUfyjlF3SjKLGBx4qIp I8yjO2SGIHc0WeWWDQ51XA
--- ADjzRKqqYst1LvYy8n4DsZnHLiBFv+r+H+NdiHJ8V64
--- VxGN6ddpUyGJNbtKpOIoo7dZ3Xy1vxX1GA5f3EXef7g ?¬´~<cô¨ÄmUP”æå³Ñ(ÊnÉq<C389>?“×p°ï<C2B0>RµVÒJt?Ù%Å´Ëhg,žó<C5BE>À±éCÓ-wÓÄšnÊšNa¹‰9<E280B0>“¹|Fz_ß'jíÂ<C382>`<60>lœâî*Z1åBP¾"búá‘ò/ñôÒΓWærßa¥ïÓÞ ¾"Œy?Ö$¸‰„,jÞn#¯ŒÎ;îw…óí[ŽËɳœ
‡ÿ&`j‰•¼˜×àZ<C3A0>»å=s§ Þ¯·8ôéoz´Ò<C2B4>Óçïrˆ–ÌñÎß%*}Ù÷æÇpMuœ` …ÙoK¶«œÐÁ~
l23v˰
9qxÍ—g|žòc:2.ÓN bÕÁ°i‡‡8cdJ*z#<14>°ÊYð[7ƶÇ=¿}{ó<> <0C>g <09>Y`gûçw,*\Ûr/B<>Ü[ ƒ±ðÙ&»

View file

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 /u/eYA nwX0pWBepC/ZFbMVxlJDrhizIHaH7ocQDM+RlzBpCGo
m1El2cCN5hLmBxjjh1hUqIrfbH/rZeubfnbs4q9tAsU
-> BB'U;P-grease
m5VAyZ9GwzzC/k3YD/A36REpYNLssYQ08N9Wy6ybjE1aW2PPn0yVNW79LVln
--- G1iRECIT8kxcUDFr5qaBKt/DW2VU0OhGjMYCadwqz8U
-s©Þˆ©”玥~.ì:× â+sÂã“ãjë<6A>ã§UóMz åû

View file

@ -0,0 +1,9 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA u6Zxh2e1bvUdQ9I4YJTmZu31x2wE1N/UeVfjU3neXGI
0RTNgBke72G7TVXmGXQIBEz0l3KGPMcKHx5F78IvzcY
-> J-grease :r=#zF# :( |;a'5va A1~[+
TaZYrXCoYw
--- u1b7+IBBNy6gr7x72Q7I6WJQ+PSXhiEYZXrRT3e+nMs
䕺f— ŸüÂÍA.Í3j׌Ñbü,Ÿ<>
aͳ¶¾ßÊÇRMy—þ ²5&ÙÿÖæ÷Kä¾…i7࿜~†6J2ß§J<C2A7>$OsËáSLNëÔï-É¡
LÝ=Ò|!œ<7 €ÞÕgŸ<><C5B8><C39F>3SW¨I;

View file

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 4cwpEkfOvie2lcVVWipZdcjX+4uWvWUqqqM1Lxzqi2g
KQ+Wu6cfAb5VcdBiynUYCIFOS80Z9hzTFkJmvMyk8l0
-> =[-grease Efc=i9
6zuCx3Ja7X6IePeOMCNlo2E6wlUVnJdNRe5uPAfZqWEGuare
--- eEOYwAsqsa8DJnHuvXIbwjdPD4HnrkXdnIzvE/SsNhw
zïLç±Î P8¦<66>ÁÕŠ0˜·&lÇ÷SV%á<¤.l<ÁÛ6"JÔÕLV½{¯~ÐçÇ<1A>Ž

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 3CxztQ43ysoI6lY8+urnVpPuOZ7novdVKhYbLRvCBns
m8AsmoNiOtfyizPOO8y+Duq+eF71XFa6YzLiD1q+llc
-> bn-grease 1 S{vI3DUq "
zBxmjcl0M7P1yd5ukMsV2Pu+HB+HwO+PcwRGKLmXJGbQt3v2jDe7Bi/pIXf9mhM9
KYvNzopzJ8Ny3vYdIRMdL44
--- EkumKng8pk1fU06yb+e47Fey3LIgpvATmzPwGhEpNB4
ÅISD<01>ù¡\ï6vúõJ˜ï<1F>Ö åäó<C3A4>Ôíê•Ü0|ÜaGnMH˜ë*ÃTZ_"~Ðh>0ºùû ,À^”áªû<C2AA>™[ëçWWªÆؽ Zö,¨M°ô³fU@°Æ=$<24>çË&è¼§Nï|¥ÙU¾¿“ž&

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA Qz6PMloD3pbf8CCRjy6R2txKzesS7/d5Rgn/MDo6jhs
0VhYjOHKvVEMCTD1KSUMEWKfYo7aJucexN9lEY29K7U
-> ?*-grease [f:|T| " $QWv2+
opETvNeqcgLuOw
--- QAnqaENfXZIfh/XR2kTZRBWDLby1SULHRjMhTr8A8xQ
4 {h´%R¥]ÔNk°?à#SãÏ¢¤*I¥§}-bašH¢ëÛ•ÆTÉÖùlÒœE¡b<1E>j¸ ƒ­©IÁ´•!ÆP¼ÄÆŒ¨ <20>™4Hòî¿O&çŸ{%ý¬œÌ ë¾JÒN¥A<C2A5>ÇØ]F~e÷ Z™RMð"4l広…Ð

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 6cECI8dFrJxfryE9CMqvln5gtlLeiaperg5rptHx0GI
AsCg77lOWyeKsY5Rjd2OwHq8P5K1LBw3pX6rWqcP3oo
-> P-grease =j@@ @
QP4YAHktdAGUTj1arv43
--- rxF03h8ttUmPO2vx1u/Xuxys4kkGpZINwlsdVHJ1ESg
=õ0j Y¬’\-7•މQŸ ÿK¨—¨(—u¥z@:pqÑ#'ù£Át޽+gµó¸6

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA sATnV8c7sc9vhDJOVGH54On7NyNpDWh4ZT4x8XwTb3w
aUhPDWpg9xmRzWM7OqyCyW/G4l5RoYxFxFHgfZIZaug
-> y-grease g u^${ }!
sRY89bfP5Zny9MCjpRKLDtdcsiz9hZHkP+s
--- R/3RXSMTVS0l5AFZmPasseP1Ub+WISO5VspK7AQreXI
ÆVÌ̺7ƒÔ~Ø‚#Jêœbòt÷¨ÄáuJœS<C593>¤ïC¾£™[ïúh_‰;PUI,„Yðèx9¬èf†JÚ€××Ìî©AdE<64>À1þE9Qo`抶Mö²ÃZ©µ+Úݯ¸äMÝ)òü]ù[‡Zc7<63>æ

BIN
secrets/ssh/id_alvin.age Normal file

Binary file not shown.