I can build now

This commit is contained in:
Christopher Mühl 2026-01-06 00:41:19 +01:00
parent 7eb51e9bbc
commit d976ee0035
No known key found for this signature in database
GPG key ID: 925AC7D69955293F
86 changed files with 202 additions and 230 deletions

View file

@ -0,0 +1,7 @@
{pkgs, ...}: {
bosun.key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBUKDCjB0VpQubi8BfnYKbh4MIE1tcvKQesdoPE4NXAf";
home.packages = with pkgs; [
helix
];
}

View file

@ -3,10 +3,6 @@
pkgs,
...
}: {
home.packages = with pkgs; [
lxappearance
];
gtk = {
enable = true;
@ -16,18 +12,6 @@
# package = pkgs.rose-pine-cursor;
# size = 32;
# };
gtk2.extraConfig = lib._elements.selfReferencedString {sep = "#";} ''
gtk-enable-animations = 1
gtk-primary-button-warps-slider = 1
gtk-toolbar-style = 3
gtk-menu-images = 1
gtk-button-images = 1
gtk-sound-theme-name = "freedesktop"
'';
gtk3.extraConfig.gtk-application-prefer-dark-theme = 1;
gtk4.extraConfig.gtk-application-prefer-dark-theme = 1;
};
home.sessionVariables = {

View file

@ -30,12 +30,12 @@
tokei # Like cloc
gource
zeal # Offline documentation browser
_elements.dedoc # Terminal-based documentation viewer
harbor.dedoc # Terminal-based documentation viewer
just # Just a command runner
claude-monitor
devenv
gitui
_elements.oryx # TUI for sniffing network traffic using eBPF
harbor.oryx # TUI for sniffing network traffic using eBPF
# Build tools
cargo

View file

@ -15,7 +15,7 @@
delta # Diffing tool
onefetch # neofetch for git repos
pkgs._elements.git-delete-stale
harbor.git-delete-stale
];
programs.git-global-log.enable = true;

View file

@ -2,7 +2,7 @@
home.packages = with pkgs; [
# Simple browsers for HTML
qutebrowser
pkgs._elements.firefox-with-context # Open URLs in different browser profiles based on context
harbor.firefox-with-context # Open URLs in different browser profiles based on context
];
xdg.mimeApps = {

View file

@ -149,9 +149,9 @@
home = {
extraOutputsToInstall = ["doc" "devdoc"];
packages = with pkgs._elements; [
quick-zeal
spawn-term
packages = with pkgs; [
harbor.quick-zeal
harbor.spawn-term
];
};

View file

@ -1,11 +1,10 @@
{
pkgs,
system,
inputs,
...
}: {
home.packages = with pkgs; [
inputs.affinity-nix.packages.${system}.v3 # adobe suite replacement
inputs.affinity-nix.packages.${pkgs.stdenv.hostPlatform.system}.v3 # adobe suite replacement
gmic # greyc's magic
krita

View file

@ -4,6 +4,8 @@
...
}: {
imports = [
inputs.niri.homeModules.niri
./settings.nix
./window-rules.nix
./keybinds.nix

View file

@ -1,6 +1,8 @@
{
config,
pkgs,
lib,
inputs,
...
}: {
programs.niri.settings = {
@ -8,8 +10,8 @@
"Mod+space".action = spawn "fuzzel";
"Mod+e".action = spawn "dolphin";
"Mod+d".action = spawn "zeal"; # Documentation viewer
"Mod+c".action = spawn "${pkgs._elements.spawn-term}/bin/spawn-term";
"Mod+g".action = spawn "${pkgs._elements.hg-picker}/bin/hg-picker";
"Mod+c".action = spawn "${"spawn-term"}/bin/spawn-term";
"Mod+g".action = spawn "${pkgs.harbor.hg-picker}/bin/hg-picker";
"Mod+q".action = close-window;
"Mod+f".action = fullscreen-window;

View file

@ -6,7 +6,7 @@
programs.niri.settings = {
prefer-no-csd = true;
debug.honor-xdg-activation-with-invalid-serial = true;
# debug.honor-xdg-activation-with-invalid-serial = true;
layout = {
always-center-single-column = true;

View file

@ -1,17 +1,8 @@
{
pkgs,
config,
...
} @ all: {
elements.secrets = {
rekeyPath = "christopher_molybdenum";
key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHl33DPxxzxrNNjM8rL4ktAj4ExzCyGiU8rKog0csxNA";
};
elements.kitty.enable = true;
{pkgs, ...}: {
bosun.key = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHl33DPxxzxrNNjM8rL4ktAj4ExzCyGiU8rKog0csxNA";
home.packages = with pkgs; [
_elements.to-s3
_elements.connect-to-mercury
harbor.to-s3
harbor.connect-to-mercury
];
}

View file

@ -1,6 +1,3 @@
# ++ 27_Co: Cobalt
#
# Main tower workstation environment
{
pkgs,
lib,
@ -31,7 +28,7 @@
};
networking = {
hostName = "cobalt";
hostName = "endurance";
firewall.enable = false;
interfaces.eno1.wakeOnLan.enable = true;
};

View file

@ -86,53 +86,17 @@
./modules/flake
];
});
# (inputs.snowfall.mkFlake {
# inherit inputs;
# src = ./.;
# # Exposes all internal libs and packages as `lib._elements` or `pkgs._elements` respectively
# snowfall.namespace = "_elements";
# # Global system modules to be included for all systems
# systems.modules = with inputs; {
# nixos = [
# disko.nixosModules.default
# ./modules/common
# ];
# darwin = [
# stylix.darwinModules.stylix
# ./modules/common
# ];
# };
# # Add modules only to specific hosts
# systems.hosts = with inputs; {
# cobalt.modules = [
# niri.nixosModules.niri
# stylix.nixosModules.stylix
# musnix.nixosModules.default
# ovos.nixosModules.default
# waka-victoriametrics.nixosModules.default
# ];
# };
# homes.users = {
# # TODO: For some reason this needs to be toggled for agenix to work?
# # "christopher@cobalt".modules = with inputs; [
# # niri.homeModules.niri
# # ];
# };
# # Configure nixpkgs when instantiating the package set
# # TODO: This is already specified elsewhere. Still needed here?
# channels-config = {
# allowUnfree = true;
# permittedInsecurePackages = [];
# };
# overlays = with inputs; [
# niri.overlays.niri
# nur.overlays.default
# ovos.overlays.default
# (final: prev: {
# waka-victoriametrics = waka-victoriametrics.packages.${final.system}.default;

View file

@ -1,18 +1,31 @@
{inputs, ...}: {
{
inputs,
lib,
...
}: {
systems = [
"x86_64-linux"
"x86_64-darwin"
];
perSystem = {system, ...}: {
perSystem = {
system,
self',
...
}: {
# these settings only apply to flake-local packages being built, not to the
# nixpkgs instance within host and home configurations
_module.args.pkgs = import inputs.nixpkgs {
inherit system;
config = {
allowUnfree = true;
allowUnsupportedSystem = true;
};
overlays = [];
overlays = [
(final: prev: {
writeNushellApplication = import ./lib/writeNushellApplication.nix {
inherit lib;
pkgs = prev;
};
})
];
};
};
}

View file

@ -4,6 +4,7 @@
./homes.nix
./args.nix
./formatter.nix
./packages.nix
./lib
];
}

View file

@ -1,19 +1,11 @@
{
inputs,
inputs',
...
}: let
{inputs, ...}: let
inherit (inputs) self;
mkHost = host: config:
mkHost = hostname: config:
{
path = ../../configurations/nixos/${host};
path = ../../configurations/nixos/${hostname};
deployable = true;
specialArgs = {
inherit inputs inputs';
hostname = host;
};
specialArgs = {inherit inputs hostname;};
}
// config;
in {

View file

@ -4,8 +4,7 @@
...
}: {
flake.lib = lib.fixedPoints.makeExtensible (final: {
secrets = import ./secrets.nix {inherit inputs lib;};
inherit (final.secrets) mkSecret;
# secrets = import ./secrets.nix {inherit inputs lib;};
# inherit (final.secrets) mkSecret;
});
}

View file

@ -1,4 +1,8 @@
{lib, ...}: pkgs: {
{
lib,
pkgs,
...
}: {
/*
The name of the script to write.

View file

@ -1,24 +0,0 @@
{inputs, ...}: {
systems = [
"x86_64-linux"
"x86_64-darwin"
];
perSystem = {system, ...}: {
_module.args.pkgs = import inputs.nixpkgs {
inherit system;
config = {
allowUnfree = true;
permittedInsecurePackages = [
"nixos-config"
"electron-36.9.5"
"dotnet-sdk-6.0.428"
"olm-3.2.16"
];
};
overlays = [];
};
};
}

View file

@ -0,0 +1,13 @@
{lib, ...}: {
perSystem = {
config,
pkgs,
inputs',
...
}: {
packages = lib.filesystem.packagesFromDirectoryRecursive {
callPackage = pkgs.callPackage;
directory = ../../packages;
};
};
}

View file

@ -1,4 +1,9 @@
{pkgs, ...}: {
{
pkgs,
lib,
inputs,
...
}: {
nix = {
package = pkgs.lixPackageSets.stable.lix;
@ -23,12 +28,21 @@
};
nixpkgs = {
config.allowUnfree = true;
config.permittedInsecurePackages = [
"nixos-config"
"electron-36.9.5"
"dotnet-sdk-6.0.428"
config = {
allowUnfree = true;
allowUnfreePredicate = pkg:
builtins.elem (lib.getName pkg) [
"cider-2"
];
permittedInsecurePackages = [
# "nixos-config"
# "electron-36.9.5"
# "dotnet-sdk-6.0.428"
"olm-3.2.16"
];
};
overlays = import ../../overlays {inherit inputs lib;};
};
}

View file

@ -9,7 +9,7 @@ in {
home.shellAliases.inspect = "tmux -f ~/${tmuxConfigFile} new-session ssh inspect";
home.file.${tmuxConfigFile}.text = lib._elements.selfReferencedString {sep = "#";} ''
home.file.${tmuxConfigFile}.text = ''
set -g status-position top
set-option -g status-bg default
set -g 'status-format[0]' '#[fill=colour202 bg=colour202 fg=colour231 bold]Danger! HAUSGOLD Inspector '

View file

@ -14,7 +14,7 @@ in {
enable = true;
shellAliases = config.home.shellAliases;
shellInit = lib._elements.selfReferencedString {sep = "#";} ''
shellInit = ''
# Set global environment variables.
${env}
'';

View file

@ -16,7 +16,7 @@
nushellPlugins.skim
];
extraConfig = lib._elements.selfReferencedString {sep = "#";} ''
extraConfig = ''
let carapace_completer = { |spans|
carapace $spans.0 nushell ...$spans
| from json
@ -72,7 +72,7 @@
}
'';
envFile.text = lib._elements.selfReferencedString {sep = "#";} ''
envFile.text = ''
$env.PATH = (
$env.PATH
| split row (char esep)

View file

@ -18,7 +18,8 @@ in {
options.bosun = {
rekeyPath = mkOption {
type = types.str;
default = hostname;
# TODO: Make username configurable
default = "toph.${hostname}";
};
key = mkOption {

View file

@ -8,7 +8,7 @@
inherit (lib) mkIf;
in {
imports = [
inputs.niri.nixosModules.niri
#inputs.niri.nixosModules.niri
];
config = mkIf config.bosun.profiles.graphical.enable {

View file

@ -1,6 +1,5 @@
{
inputs,
inputs',
pkgs,
hostname,
...
@ -15,10 +14,13 @@
programs.fish.enable = true;
home-manager = {
useGlobalPkgs = true;
useUserPackages = true;
users.toph = inputs.self.homeConfigurations."toph@${hostname}";
extraSpecialArgs = {
inherit inputs inputs' hostname;
inherit inputs hostname;
};
};

View file

34
overlays/default.nix Normal file
View file

@ -0,0 +1,34 @@
{
lib,
inputs,
...
}: let
inherit (lib.attrsets) mapAttrs;
# wrapper that provides channels arg to each overlay
withChannels = overlayFn: final: prev: let
# Import channels with the same config as the main nixpkgs
importChannel = input: import input {
system = final.stdenv.hostPlatform.system;
config = final.config;
};
in
overlayFn {
inherit inputs;
channels =
{
nixpkgs = final;
}
// mapAttrs (
_: input:
importChannel input
)
inputs;
}
final
prev;
in [
(withChannels (import ./lix.nix))
(withChannels (import ./packages.nix))
(withChannels (import ./unstable.nix))
]

View file

@ -1,4 +1,4 @@
{channels, ...}: final: prev: {
{...}: final: prev: {
inherit
(prev.lixPackageSets.stable)
nixpkgs-review

3
overlays/packages.nix Normal file
View file

@ -0,0 +1,3 @@
{inputs, ...}: final: prev: {
harbor = inputs.self.packages.${final.stdenv.hostPlatform.system} or {};
}

View file

@ -0,0 +1,18 @@
{pkgs, ...}:
pkgs.writeShellApplication {
name = "connect-to-mercury";
text = ''
hostname="mercury.local"
ip=$(dscacheutil -q host -a name $hostname | tail -n2 | head -n1 | cut -d' ' -f 2)
if [ -z "$ip" ]; then
echo "Host $${hostname} seems to be down. Are you sure the VM is running?"
exit 1
fi
echo "$hostname: $ip"
sudo route -n delete 172.17.0.0/16 &>/dev/null
sudo route -n add 172.17.0.0/16 "$ip" &>/dev/null
'';
}

View file

@ -1,9 +1,5 @@
{
lib,
pkgs,
...
}:
lib._elements.writeNushellApplication pkgs {
{pkgs, ...}:
pkgs.writeNushellApplication {
name = "git-delete-stale";
runtimeInputs = with pkgs; [git];

View file

@ -1,14 +0,0 @@
#!/usr/bin/env bash
hostname="mercury.local"
ip=$(dscacheutil -q host -a name ${hostname} | tail -n2 | head -n1 | cut -d' ' -f 2)
if [ -z "${ip}" ]; then
echo "Host ${hostname} seems to be down. Are you sure the VM is running?"
exit 1
fi
echo "${hostname}: ${ip}"
sudo route -n delete 172.17.0.0/16 &>/dev/null
sudo route -n add 172.17.0.0/16 "${ip}" &>/dev/null

View file

@ -1,5 +0,0 @@
{pkgs, ...}:
pkgs.writeShellApplication {
name = "connect-to-mercury";
text = builtins.readFile ./connect-to-mercury;
}

View file

@ -1,9 +1,5 @@
{
lib,
pkgs,
...
}:
lib._elements.writeNushellApplication pkgs {
{pkgs, ...}:
pkgs.writeNushellApplication {
name = "spawn-term";
runtimeInputs = with pkgs; [kdotool];

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 pySEWw kigbWfXfeb8YlBMpSWM+jDPtjYeAltdTORqPQ7kqnFg
P8j10qrMzjWZ91FVnn4sLugS/AcS2XrMr9TRal5gRVc
-> m0^G"4-grease p]TT RuLz
9HFjCiuy7w
--- j57VRBCbLMVDI2s7DnpBwTvVzzvqwMdXL6Ec/9Tg6MA
cDÍ_FT,hº³ }/<2F>;A8õüPýþØ%/:E)pè”Õ€
¾qý{J­ UÚë†kï¸n\8L}j'Ãî‰yaãJ

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 pySEWw yyra9wL+n2gFPpbmnkvbsxBverCR/r7yPSw3aCD0slk
65Vc/tQKzfsFC5smIqHmXA7NlSJLW8oXAYPYiX3bGcw
-> MV*6+^H-grease uV!LS]1* B5lCK], yjN7.
O1RM77BbFx0SsKlEXUVAJCswHGS1oKfX1ZvBNcF47W0o//6iiBHOWTvpaW15xVMZ
00g
--- XNgzqoXEkkzK8TE/A81FFduXsiDouJFXV/9o/m/bnss
Q1‡©0#ÍšÎi~d¹Ç~ïòEðlÔgG^OÕ,ÊP:¹¡Ö£¨ëø[if>•,@i<>|DJ¹åm)P8hé·2ÈVÃãüÑkš)ø7£>u@qò¡ Í#͈×<CB86>ïfå<>¨ä<C2A8>™Û¥+¡O,œa<C593>,ð%éátRË[7<>îN

View file

@ -1,8 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 /u/eYA a2YtLIFiK8lETFr+I/Yixme90wgJX/X+kW2KpCFWGiM
xm/9eER61LCPTiRUi24Qh3gQq1OV8s9BQjgxRJfLvKs
-> vEX:@rY-grease #.ah Wz?~ Gr|K[7W -.UYxQ#
CTEhaEVZInKKSMg6Vzb54cghIPT7PbUy57qgdWwXx6lvbnnIxsqnRUwBhLK8sT3w
Sx+t1v8/cuDK
--- nzehXvl4h/fS4/3W2Rsn0Uu1E9NUsEIR6ni5qOA/U1I
®<EFBFBD>i«8<EFBFBD>üæÅKØ£„®Ù¾eÖ„™L•“ž+KV´ÉŒnC(?˜¶±C

View file

@ -1,10 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 /u/eYA uWoNFabVJzmA1L8l124lyvnvAFgsQ9rh/Okags2UrxU
vGenkj0xh5FbxTnS91XEz2qAoILYZS5skYHaadaNIBo
-> F"k"3;+O-grease (5t/PH
zBRuwDmTbpClRyVeC77vgGo4aDE2/KxWdcJK1gXvu60DxzUfyjlF3SjKLGBx4qIp
--- VxGN6ddpUyGJNbtKpOIoo7dZ3Xy1vxX1GA5f3EXef7g
‡ÿ&`j‰•¼˜×àZ<C3A0>»å=s§ Þ¯·8ôéoz´Ò<C2B4>Óçïrˆ–ÌñÎß%*}Ù÷æÇpMuœ` …ÙoK¶«œÐÁ~
l23v˰
9qxÍ—g|žòc:2.ÓN bÕÁ°i‡‡8cdJ*z#<14>°ÊYð[7ƶÇ=¿}{ó<> <0C>g <09>Y`gûçw,*\Ûr/B<>Ü[ ƒ±ðÙ&»
-> ssh-ed25519 /u/eYA BvO3LN0SaFuuw7V5V+qRkAKFtW+ASCtMEo+HBOnccRk
2tdN2DqV/NKLX00LBp012xqimkBCdbZBFPXoQOWDqKc
-> ig7-grease 0X s
I8yjO2SGIHc0WeWWDQ51XA
--- ADjzRKqqYst1LvYy8n4DsZnHLiBFv+r+H+NdiHJ8V64
?¬´~<cô¨ÄmUP”æå³Ñ(ÊnÉq<C389>?“×p°ï<C2B0>RµVÒJt?Ù%Å´Ëhg,žó<C5BE>À±éCÓ-wÓÄšnÊšNa¹‰9<E280B0>“¹|Fz_ß'jíÂ<C382>`<60>lœâî*Z1åBP¾"búá‘ò/ñôÒΓWærßa¥ïÓÞ ¾"Œy?Ö$¸‰„,jÞn#¯ŒÎ;îw…óí[ŽËɳœ

View file

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 /u/eYA nwX0pWBepC/ZFbMVxlJDrhizIHaH7ocQDM+RlzBpCGo
m1El2cCN5hLmBxjjh1hUqIrfbH/rZeubfnbs4q9tAsU
-> BB'U;P-grease
m5VAyZ9GwzzC/k3YD/A36REpYNLssYQ08N9Wy6ybjE1aW2PPn0yVNW79LVln
--- G1iRECIT8kxcUDFr5qaBKt/DW2VU0OhGjMYCadwqz8U
-s©Þˆ©”玥~.ì:× â+sÂã“ãjë<6A>ã§UóMz åû

View file

@ -0,0 +1,9 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA u6Zxh2e1bvUdQ9I4YJTmZu31x2wE1N/UeVfjU3neXGI
0RTNgBke72G7TVXmGXQIBEz0l3KGPMcKHx5F78IvzcY
-> J-grease :r=#zF# :( |;a'5va A1~[+
TaZYrXCoYw
--- u1b7+IBBNy6gr7x72Q7I6WJQ+PSXhiEYZXrRT3e+nMs
䕺f— ŸüÂÍA.Í3j׌Ñbü,Ÿ<>
aͳ¶¾ßÊÇRMy—þ ²5&ÙÿÖæ÷Kä¾…i7࿜~†6J2ß§J<C2A7>$OsËáSLNëÔï-É¡
LÝ=Ò|!œ<7 €ÞÕgŸ<><C5B8><C39F>3SW¨I;

View file

@ -0,0 +1,7 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 4cwpEkfOvie2lcVVWipZdcjX+4uWvWUqqqM1Lxzqi2g
KQ+Wu6cfAb5VcdBiynUYCIFOS80Z9hzTFkJmvMyk8l0
-> =[-grease Efc=i9
6zuCx3Ja7X6IePeOMCNlo2E6wlUVnJdNRe5uPAfZqWEGuare
--- eEOYwAsqsa8DJnHuvXIbwjdPD4HnrkXdnIzvE/SsNhw
zïLç±Î P8¦<66>ÁÕŠ0˜·&lÇ÷SV%á<¤.l<ÁÛ6"JÔÕLV½{¯~ÐçÇ<1A>Ž

View file

@ -0,0 +1,8 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 3CxztQ43ysoI6lY8+urnVpPuOZ7novdVKhYbLRvCBns
m8AsmoNiOtfyizPOO8y+Duq+eF71XFa6YzLiD1q+llc
-> bn-grease 1 S{vI3DUq "
zBxmjcl0M7P1yd5ukMsV2Pu+HB+HwO+PcwRGKLmXJGbQt3v2jDe7Bi/pIXf9mhM9
KYvNzopzJ8Ny3vYdIRMdL44
--- EkumKng8pk1fU06yb+e47Fey3LIgpvATmzPwGhEpNB4
ÅISD<01>ù¡\ï6vúõJ˜ï<1F>Ö åäó<C3A4>Ôíê•Ü0|ÜaGnMH˜ë*ÃTZ_"~Ðh>0ºùû ,À^”áªû<C2AA>™[ëçWWªÆؽ Zö,¨M°ô³fU@°Æ=$<24>çË&è¼§Nï|¥ÙU¾¿“ž&

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA Qz6PMloD3pbf8CCRjy6R2txKzesS7/d5Rgn/MDo6jhs
0VhYjOHKvVEMCTD1KSUMEWKfYo7aJucexN9lEY29K7U
-> ?*-grease [f:|T| " $QWv2+
opETvNeqcgLuOw
--- QAnqaENfXZIfh/XR2kTZRBWDLby1SULHRjMhTr8A8xQ
4 {h´%R¥]ÔNk°?à#SãÏ¢¤*I¥§}-bašH¢ëÛ•ÆTÉÖùlÒœE¡b<1E>j¸ ƒ­©IÁ´•!ÆP¼ÄÆŒ¨ <20>™4Hòî¿O&çŸ{%ý¬œÌ ë¾JÒN¥A<C2A5>ÇØ]F~e÷ Z™RMð"4l広…Ð

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA 6cECI8dFrJxfryE9CMqvln5gtlLeiaperg5rptHx0GI
AsCg77lOWyeKsY5Rjd2OwHq8P5K1LBw3pX6rWqcP3oo
-> P-grease =j@@ @
QP4YAHktdAGUTj1arv43
--- rxF03h8ttUmPO2vx1u/Xuxys4kkGpZINwlsdVHJ1ESg
=õ0j Y¬’\-7•މQŸ ÿK¨—¨(—u¥z@:pqÑ#'ù£Át޽+gµó¸6

View file

@ -1,7 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 Sih9FA sATnV8c7sc9vhDJOVGH54On7NyNpDWh4ZT4x8XwTb3w
aUhPDWpg9xmRzWM7OqyCyW/G4l5RoYxFxFHgfZIZaug
-> y-grease g u^${ }!
sRY89bfP5Zny9MCjpRKLDtdcsiz9hZHkP+s
--- R/3RXSMTVS0l5AFZmPasseP1Ub+WISO5VspK7AQreXI
ÆVÌ̺7ƒÔ~Ø‚#Jêœbòt÷¨ÄáuJœS<C593>¤ïC¾£™[ïúh_‰;PUI,„Yðèx9¬èf†JÚ€××Ìî©AdE<64>À1þE9Qo`抶Mö²ÃZ©µ+Úݯ¸äMÝ)òü]ù[‡Zc7<63>æ

BIN
secrets/ssh/id_alvin.age Normal file

Binary file not shown.