feat: switch mails
This commit is contained in:
parent
1d499c5fc3
commit
aa96c92aa8
|
@ -68,20 +68,27 @@ in
|
||||||
mode = "0700";
|
mode = "0700";
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
age.secrets.maddyPasswd = {
|
|
||||||
|
age.secrets.mailnix-passwd = {
|
||||||
generator.script = "alnum";
|
generator.script = "alnum";
|
||||||
group = "git";
|
group = "git";
|
||||||
mode = "0750";
|
|
||||||
};
|
};
|
||||||
nodes.maddy = {
|
|
||||||
age.secrets.forgejoPasswd = {
|
age.secrets.mailnix-passwd-hash = {
|
||||||
inherit (config.age.secrets.maddyPasswd) rekeyFile;
|
generator.dependencies = [ config.age.secrets.mailnix-passwd ];
|
||||||
inherit (nodes.maddy.config.services.maddy) group;
|
generator.script = "argon2id";
|
||||||
mode = "640";
|
mode = "440";
|
||||||
|
intermediary = true;
|
||||||
|
};
|
||||||
|
nodes.mailnix = {
|
||||||
|
age.secrets.idmail-forgejo-passwd-hash = {
|
||||||
|
inherit (config.age.secrets.mailnix-passwd-hash) rekeyFile;
|
||||||
|
group = "stalwart-mail";
|
||||||
|
mode = "440";
|
||||||
};
|
};
|
||||||
services.maddy.ensureCredentials = {
|
services.idmail.provision.mailboxes."forge@${config.secrets.secrets.global.domains.mail_public}" = {
|
||||||
"forge@${config.secrets.secrets.global.domains.mail_public}".passwordFile =
|
password_hash = "%{file:${nodes.mailnix.config.age.secrets.idmail-forgejo-passwd-hash.path}}%";
|
||||||
nodes.maddy.config.age.secrets.forgejoPasswd.path;
|
owner = "admin";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -92,7 +99,7 @@ in
|
||||||
user = "git";
|
user = "git";
|
||||||
group = "git";
|
group = "git";
|
||||||
lfs.enable = true;
|
lfs.enable = true;
|
||||||
secrets.mailer.PASSWD = config.age.secrets.maddyPasswd.path;
|
secrets.mailer.PASSWD = config.age.secrets.mailnix-passwd.path;
|
||||||
settings = {
|
settings = {
|
||||||
DEFAULT.APP_NAME = "Patricks tolles git";
|
DEFAULT.APP_NAME = "Patricks tolles git";
|
||||||
actions = {
|
actions = {
|
||||||
|
|
|
@ -146,23 +146,29 @@ let
|
||||||
processedConfigFile = "/run/agenix/immich.config.json";
|
processedConfigFile = "/run/agenix/immich.config.json";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
age.secrets.maddyPasswd = {
|
age.secrets.mailnix-passwd = {
|
||||||
generator.script = "alnum";
|
generator.script = "alnum";
|
||||||
mode = "440";
|
|
||||||
group = "root";
|
group = "root";
|
||||||
};
|
};
|
||||||
|
|
||||||
nodes.maddy = {
|
age.secrets.mailnix-passwd-hash = {
|
||||||
age.secrets.immichPasswd = {
|
generator.dependencies = [ config.age.secrets.mailnix-passwd ];
|
||||||
inherit (config.age.secrets.maddyPasswd) rekeyFile;
|
generator.script = "argon2id";
|
||||||
inherit (nodes.maddy.config.services.maddy) group;
|
mode = "440";
|
||||||
mode = "640";
|
intermediary = true;
|
||||||
|
};
|
||||||
|
nodes.mailnix = {
|
||||||
|
age.secrets.idmail-immich-passwd-hash = {
|
||||||
|
inherit (config.age.secrets.mailnix-passwd-hash) rekeyFile;
|
||||||
|
group = "stalwart-mail";
|
||||||
|
mode = "440";
|
||||||
};
|
};
|
||||||
services.maddy.ensureCredentials = {
|
services.idmail.provision.mailboxes."immich@${config.secrets.secrets.global.domains.mail_public}" = {
|
||||||
"immich@${config.secrets.secrets.global.domains.mail_public}".passwordFile =
|
password_hash = "%{file:${nodes.mailnix.config.age.secrets.idmail-immich-passwd-hash.path}}%";
|
||||||
nodes.maddy.config.age.secrets.immichPasswd.path;
|
owner = "admin";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
age.secrets.resticpasswd = {
|
age.secrets.resticpasswd = {
|
||||||
generator.script = "alnum";
|
generator.script = "alnum";
|
||||||
};
|
};
|
||||||
|
@ -221,7 +227,7 @@ in
|
||||||
deps = [ "agenix" ];
|
deps = [ "agenix" ];
|
||||||
text = ''
|
text = ''
|
||||||
immichClientSecret=$(< ${config.age.secrets.immich-oauth2-client-secret.path})
|
immichClientSecret=$(< ${config.age.secrets.immich-oauth2-client-secret.path})
|
||||||
immichEmailSecret=$(< ${config.age.secrets.maddyPasswd.path})
|
immichEmailSecret=$(< ${config.age.secrets.mailnix-passwd.path})
|
||||||
${pkgs.jq}/bin/jq \
|
${pkgs.jq}/bin/jq \
|
||||||
--arg immichClientSecret "$immichClientSecret" \
|
--arg immichClientSecret "$immichClientSecret" \
|
||||||
--arg immichEmailSecret "$immichEmailSecret" \
|
--arg immichEmailSecret "$immichEmailSecret" \
|
||||||
|
|
|
@ -9,21 +9,27 @@ let
|
||||||
hostName = "nc.${config.secrets.secrets.global.domains.web}";
|
hostName = "nc.${config.secrets.secrets.global.domains.web}";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
age.secrets.maddyPasswd = {
|
|
||||||
|
age.secrets.mailnix-passwd = {
|
||||||
generator.script = "alnum";
|
generator.script = "alnum";
|
||||||
mode = "440";
|
group = "nextcloud";
|
||||||
owner = "nextcloud";
|
|
||||||
};
|
};
|
||||||
|
|
||||||
nodes.maddy = {
|
age.secrets.mailnix-passwd-hash = {
|
||||||
age.secrets.nextcloudPasswd = {
|
generator.dependencies = [ config.age.secrets.mailnix-passwd ];
|
||||||
inherit (config.age.secrets.maddyPasswd) rekeyFile;
|
generator.script = "argon2id";
|
||||||
inherit (nodes.maddy.config.services.maddy) group;
|
mode = "440";
|
||||||
mode = "640";
|
intermediary = true;
|
||||||
|
};
|
||||||
|
nodes.mailnix = {
|
||||||
|
age.secrets.idmail-nextcloud-passwd-hash = {
|
||||||
|
inherit (config.age.secrets.mailnix-passwd-hash) rekeyFile;
|
||||||
|
group = "stalwart-mail";
|
||||||
|
mode = "440";
|
||||||
};
|
};
|
||||||
services.maddy.ensureCredentials = {
|
services.idmail.provision.mailboxes."nextcloud@${config.secrets.secrets.global.domains.mail_public}" = {
|
||||||
"nextcloud@${config.secrets.secrets.global.domains.mail_public}".passwordFile =
|
password_hash = "%{file:${nodes.mailnix.config.age.secrets.idmail-nextcloud-passwd-hash.path}}%";
|
||||||
nodes.maddy.config.age.secrets.nextcloudPasswd.path;
|
owner = "admin";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
environment.persistence."/persist".directories = [
|
environment.persistence."/persist".directories = [
|
||||||
|
@ -108,7 +114,7 @@ in
|
||||||
mailer-passwd-conf = pkgs.writeText "nextcloud-config.php" ''
|
mailer-passwd-conf = pkgs.writeText "nextcloud-config.php" ''
|
||||||
<?php
|
<?php
|
||||||
$CONFIG = [
|
$CONFIG = [
|
||||||
'mail_smtppassword' => trim(file_get_contents('${config.age.secrets.maddyPasswd.path}')),
|
'mail_smtppassword' => trim(file_get_contents('${config.age.secrets.mailnix-passwd.path}')),
|
||||||
];
|
];
|
||||||
'';
|
'';
|
||||||
in
|
in
|
||||||
|
|
|
@ -54,25 +54,31 @@ in
|
||||||
#];
|
#];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
age.secrets.maddyPasswd = {
|
age.secrets.mailnix-passwd = {
|
||||||
generator.script = "alnum";
|
generator.script = "alnum";
|
||||||
group = "vaultwarden";
|
group = "vaultwarden";
|
||||||
};
|
};
|
||||||
|
|
||||||
nodes.maddy = {
|
age.secrets.mailnix-passwd-hash = {
|
||||||
age.secrets.vaultwardenPasswd = {
|
generator.dependencies = [ config.age.secrets.mailnix-passwd ];
|
||||||
inherit (config.age.secrets.maddyPasswd) rekeyFile;
|
generator.script = "argon2id";
|
||||||
inherit (nodes.maddy.config.services.maddy) group;
|
mode = "440";
|
||||||
mode = "640";
|
intermediary = true;
|
||||||
|
};
|
||||||
|
nodes.mailnix = {
|
||||||
|
age.secrets.idmail-vaultwarden-passwd-hash = {
|
||||||
|
inherit (config.age.secrets.mailnix-passwd-hash) rekeyFile;
|
||||||
|
group = "stalwart-mail";
|
||||||
|
mode = "440";
|
||||||
};
|
};
|
||||||
services.maddy.ensureCredentials = {
|
services.idmail.provision.mailboxes."vaultwarden@${config.secrets.secrets.global.domains.mail_public}" = {
|
||||||
"vaultwarden@${config.secrets.secrets.global.domains.mail_public}".passwordFile =
|
password_hash = "%{file:${nodes.mailnix.config.age.secrets.idmail-vaultwarden-passwd-hash.path}}%";
|
||||||
nodes.maddy.config.age.secrets.vaultwardenPasswd.path;
|
owner = "admin";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
system.activationScripts.systemd_env_smtp_passwd = {
|
system.activationScripts.systemd_env_smtp_passwd = {
|
||||||
text = ''
|
text = ''
|
||||||
echo "SMTP_PASSWORD=$(< ${lib.escapeShellArg config.age.secrets.maddyPasswd.path})" > /run/vaultwarden_smtp_passwd
|
echo "SMTP_PASSWORD=$(< ${lib.escapeShellArg config.age.secrets.mailnix-passwd.path})" > /run/vaultwarden_smtp_passwd
|
||||||
'';
|
'';
|
||||||
deps = [ "agenix" ];
|
deps = [ "agenix" ];
|
||||||
};
|
};
|
||||||
|
|
|
@ -47,10 +47,6 @@
|
||||||
# that we can hopefully still access it remotely.
|
# that we can hopefully still access it remotely.
|
||||||
systemd.enableEmergencyMode = false;
|
systemd.enableEmergencyMode = false;
|
||||||
|
|
||||||
# Restrict the number of boot entries to prevent full /boot partition.
|
|
||||||
# Servers don't need too many generations.
|
|
||||||
boot.loader.systemd-boot.configurationLimit = 5;
|
|
||||||
|
|
||||||
documentation.nixos.enable = false;
|
documentation.nixos.enable = false;
|
||||||
|
|
||||||
# No need for fonts on a server
|
# No need for fonts on a server
|
||||||
|
|
Binary file not shown.
|
@ -0,0 +1,16 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 NSKas0yQJIKMH80e9ee65Ut4hbtlejBYBaLtcMigqF0
|
||||||
|
jiRJ3/xGyON70MpZnoynC0HWfJvESEB/co72aU3y77M
|
||||||
|
-> piv-p256 ZFgiIw A/ijcJapI7SDL81WdHQANxasOcNliuiwN6uZCzXbyCob
|
||||||
|
MMarsh+2PY8a0ktSvZUBHV00DvhWipRUp1/akEvi9BQ
|
||||||
|
-> piv-p256 XTQkUA AiK7kP0qYQr7Qd/UUsTCjoFQlD9vCS+HZdgnBlSJqQ+G
|
||||||
|
fFRQnlT+TQZIXBY5Q0xRCTbis3EShg8cvJNVT/mIe7Y
|
||||||
|
-> piv-p256 ZFgiIw AvzUQ4CbyVhzqbp1TSEVCKPbt6dVBGhb5Cij+HfGnw1m
|
||||||
|
2gpjHGtZNpARPevqo5DHNF/JWWu4on2LskMJ0YkX2S0
|
||||||
|
-> piv-p256 5vmPtQ A5sFqFEQu8NiiKJ78Yh511NZgCd3A7euA+aCQr72RrHS
|
||||||
|
XDPgfnEcE8DFG/SQVAmuszFCvhYGog4LBKGYMFLj+3k
|
||||||
|
-> 7I{,$-grease j^h s0 Dpi4e $(
|
||||||
|
/m1bIeL3IcQ7JfnjxEbtr0Gt
|
||||||
|
--- Qt3cG/DozZPfy/gCeliGZw/eqirw8swiKy8gY+tzsIg
|
||||||
|
<jQ+ZŒ<5A>bjxÜE§†
|
||||||
|
pŽ¡—¡DÅe‚»T$VŽc‘%ßè´Vª–Þûm¬E'-ÖG(ÖlZçs¡ºaÙÔÄXØ‚Ÿë7\%<25>ûõÝ~¹¢Ðâ4{žðe<C3B0>ÚÑØ߆w_-[ߧνa±D_”Lè]†'ÕQ¯]ÿ%dÀ3
|
18
hosts/elisabeth/secrets/forgejo/generated/mailnix-passwd.age
Normal file
18
hosts/elisabeth/secrets/forgejo/generated/mailnix-passwd.age
Normal file
|
@ -0,0 +1,18 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 g3LlHabzfphEEd+5PaUbPF6Fb+g2p8OIWbrB5CEi9hk
|
||||||
|
ECSVhYx9NcKV0te+0B8Zn+yB7En7NvfRl4/FrLAAPOU
|
||||||
|
-> piv-p256 ZFgiIw A6+Nxauet7Cj41sxIvsB1iLtZebofS5YHyynYTFmwpzd
|
||||||
|
nU2Eu+6ULJCiu66HfxkGMyF/k7nk2LaR+Zcocj3mfoM
|
||||||
|
-> piv-p256 XTQkUA AuvixGrxA4BZbkfwEqSm2dmMl/kIrQ3gAsHguc7KzJYs
|
||||||
|
4ExBwltlaK84sZQvu1tOdaDYfOvHefp81juEWxHQAvw
|
||||||
|
-> piv-p256 ZFgiIw AgGalIM4HXMCs4i27UTuLo2eF9Xwucvu3kaIk95KNeX2
|
||||||
|
GTiehyN3S6oINV5VsdhwSMM2Zdu2eLTx9rDqyPvKTu8
|
||||||
|
-> piv-p256 5vmPtQ A4N99PpJZ0wl6VtrHvUmP/MTZwuJreLvqplCkOHWBvM8
|
||||||
|
bSt6oCFQ/PUKQZ3YIEEyQzZ6JGKm76lzi05ZQUPuvjg
|
||||||
|
-> Vh@JV.jk-grease t'iZAz#
|
||||||
|
Y34EKQFc26w8PEcvqqQcg8XRD2iYM2TQPXtS5zz3CKWFv6ktAn6Hdlcxd1E/xVKj
|
||||||
|
5A8RiwXymi72nZf6D1c7VH8bxp4OmhL6/6xo
|
||||||
|
--- HpDzasHd9zah/iCmIHXrm2kUvVep9bFQViDsTBd6o40
|
||||||
|
vÞ»&/õå-{£)Ÿý[›%?ÿ¯ž úИ+2×Ë[cÝK]Öqªì¢u
|
||||||
|
öL¥~¦)·ÔÖÜ
|
||||||
|
-‚ü¼ù¶=W{Ç<1C>?é*N
|
|
@ -1,16 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> X25519 26LQ7M/ohpGhCF5KSGOKGPleQS14YEUbLX3TkuJhA1c
|
|
||||||
molDQC1NjtUmgR4awiPa6s3Ps9FidC6ztupTCcaW7vY
|
|
||||||
-> piv-p256 ZFgiIw AsgqJFOJqktxrbSJRXASEB/drg6GMy5Ugg7wDc4zy8MI
|
|
||||||
2LRO6PpWRJ48WK6e/zWnfSgu7W4TKiXZHm/KxGw8dro
|
|
||||||
-> piv-p256 XTQkUA A2rw+YxP75H2isyxzWfofyBkV+PQsU5GQjv/Yf/CDdRQ
|
|
||||||
BCgHzAzkV6yICyq1Qeb7rXrBDhGwda0cXRCC4SfIsJ0
|
|
||||||
-> piv-p256 ZFgiIw Alc99i8iND+M1dgqWyW829TiYZbCkYF9RQ9ZS/jbjSV7
|
|
||||||
7TePYT/aGOAekGSbL62SeDUAycMFC1/+K14UmBWRwyE
|
|
||||||
-> piv-p256 5vmPtQ AgeVBqU8vdbgsJ5im3cDvXPCUsp/iGm9JwZ190fLZnuF
|
|
||||||
8S+xFyUGrLfXc+rmAHy4Mvk9QvybOk0EozTj46aCUW0
|
|
||||||
-> 5-grease %",T b5
|
|
||||||
lhY8pdELxc7fr1hpxyTC9Cxn6QxiDmvxsKaVpwxC6g9aBTl0g1cdGoF3QdLvRkZj
|
|
||||||
F4fkyUTP0R9CrzBICabil1EzEw
|
|
||||||
--- plFbkh1yLnDN0yTuS+g0RuYlA0OLW4UUL4B2G5aDA+k
|
|
||||||
žôå“c]XuWæö(”Õ){¡a<Þ¡ÉP#e´~H˜žÆûGZ'L¯ˆ0iûo\ŒÈE%û”¹ýžGP=ìronë(*[Ÿð;þ aB5y™
|
|
|
@ -0,0 +1,18 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 q7lf99LvDplL59CyLeW8kUzyXrqnbe0NqSAK8wJpmls
|
||||||
|
6bJpwdP47BhZJE0e1bxOXfKA6evrVwAc5YqNoxE0wQI
|
||||||
|
-> piv-p256 ZFgiIw AlcM1z0Y6fwRh7O6yxrjRiVjcSzptsUNCeJj0yKHOH0w
|
||||||
|
DQDaTmOfp2rS2VCZHIwuaLSMSsH4wk6dY9zgmgE0ZR4
|
||||||
|
-> piv-p256 XTQkUA Ax/oNeJCU4gMWELvy8RvzsA6M5B9BWEAhxbWQ1oPYX4K
|
||||||
|
P5ZkqxgBe2K8wpXUE1dYVJhFwmDMcryb8TOSRfuqVNc
|
||||||
|
-> piv-p256 ZFgiIw AveRVCoPcjW87z5cdHKJVUsdlGqucq8UE9UEmbH4BSLx
|
||||||
|
K43x1yu6Ut/Zug1M+vSckCHR48KIcymkjVj9Ro6FiyE
|
||||||
|
-> piv-p256 5vmPtQ Ak6KZhc8GK6Z1rlnIRv9kPmTTXvE7OF3v2Z6JenutZQ3
|
||||||
|
x6ggE1fhps2j1shDLX9jpm6eVv9RGQ+/sHlmOg6fLbs
|
||||||
|
-> i"k9a-grease 6(o_ODH &2
|
||||||
|
6KpGlcoEM37+YbEc3KS2xXjThr57VLsa7kn/DGMWJTo245+yJYYoCvRGkBmyM9Ms
|
||||||
|
K0zPzZnXrJaLkfEtDH/YrwY853TRUPooFKcfqHw1AbcugSKgqH26o62v
|
||||||
|
--- v4XB4SH5aGZHGb8zshn5aFw079tfRPyUXKi9+IXx7Qo
|
||||||
|
ő÷ď<EFBFBD>‘Ólă´Ôów÷4Ç'ŻMĺŽV``w% +éĐRCJsu<73>°·qË K
|
||||||
|
ľmô.Ł˘ăťŕ”bJó:y¨áďL> Ôaf‹ăňKĆ «'vJĺ
|
||||||
|
ăăůeÚ)Ĺé™84ö‡ýÝĐ«îtÜ!#GÚŽÚâµ%ÉśzëĐŠľť&
|
15
hosts/elisabeth/secrets/immich/generated/mailnix-passwd.age
Normal file
15
hosts/elisabeth/secrets/immich/generated/mailnix-passwd.age
Normal file
|
@ -0,0 +1,15 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 xAW2QkHB1Xm6ZI6DYPH1BzeqMB8Ite91t2t4PLSrQS4
|
||||||
|
P5HluE0UOm5PmyW4E63mDFUdAhJhrjzwt8rsBi/sEN0
|
||||||
|
-> piv-p256 ZFgiIw A2NG1n8n1LSY++Gc+75qJP4UrKlD1mNAL95eRuJmFmDE
|
||||||
|
mlh5bTicdUtrpruqqsYzu1RbyoceXof3UL1Xcwbk34M
|
||||||
|
-> piv-p256 XTQkUA A8utmjuXowkLXjYNoZnbrks3YfxJ4ILjaFfd755qcipM
|
||||||
|
uWmtrPJrweC5Q3UI0ldI8kul4uvR5IqA1b6KNF0k9sA
|
||||||
|
-> piv-p256 ZFgiIw A3y2t6S5GBhOlkXA0C0LK00reORm0Z67oxDVFfZsC3y5
|
||||||
|
FrIMzHmNlvgdkrsr1wATFWxXcLpIfc0H5k+yAUWmhg0
|
||||||
|
-> piv-p256 5vmPtQ AzPbAB8LXiJvkUwbnSIwMZZ4VBtco4uYXN4nZ0sCc6J2
|
||||||
|
BfI5zd97fRt1rDi5kZpmvNO8HzzL9X9zd/23aQCVaL8
|
||||||
|
-> >]CB~fh-grease
|
||||||
|
IJi7Ibh4WGvLfZJ/9Rf5wxKum9JmXpzsxUI9dRamAOLwiLDpWsLnarxk4AzI
|
||||||
|
--- oqfBZx6P//rbHJFy4GAwAgmokdCB3eE2i/NWAuCE+UA
|
||||||
|
ã)sã›C#Dø¯¹ø1Þ³9E6œÙ^-¬ðÓÎäÔd»ä×¹.ä:é)ÆáZ—ØU
ÕtkgÂÖöI…WŒ™Üë=yîluq‰—¤„¤lW)
|
|
@ -1,15 +0,0 @@
|
||||||
age-encryption.org/v1
|
|
||||||
-> X25519 59/M7sZBQrBQPAcEOVz6Wx4JAa2KDr7uuvWujXw0UQ4
|
|
||||||
F0xyN4XaRsUxWeWw8D/iMeG5Ae5q9O7E+aIAy4H6o1Y
|
|
||||||
-> piv-p256 XTQkUA A9Ebcz93AXKtJGec/q8lhai+HlW6wMcfvexN71l0G3Fh
|
|
||||||
AJMEfVRsd0FhYk4gRQxls5pNP8g2yNSQDTXz0ZFg1Zo
|
|
||||||
-> piv-p256 ZFgiIw AoEfBUMaCAqv250jrjBNSm/JKGvYOazanHBss6kHmAmt
|
|
||||||
N4Bu8uLMqwqbu7D6d57hlVYmt95NXSJjFY8biU6vs58
|
|
||||||
-> piv-p256 5vmPtQ ApQ9mIcmf88Z22mBr1IMSJ1dgoDADRB+Jj48HpKFiAbD
|
|
||||||
rEcWLXh8oCPQRuKTQpTjqlDME2Rw2zkWk+1X4BTtgts
|
|
||||||
-> piv-p256 ZFgiIw Asa1oVWehCSqG0JVPtLrngOJiFMYyWcmCYnlyxGbH5DF
|
|
||||||
nIWn2OQkBAgwPlLExo5eG6GwEdB+zmSrSD88/XrTsiU
|
|
||||||
-> W5<$HY5Y-grease kIKLXr B( 8<}qd
|
|
||||||
jcKYwwiWM/CGNodKYwOT
|
|
||||||
--- 41dZQpbgiDIVRmiBMyO9u76SNI350z+LPHjYNW5LyOc
|
|
||||||
¶ºý0Ì¿²Ý 3®k`EäÉEßµe•öp‡Ž€µ~n?gV9ÈÁêU#tâ5üý;ε·Ðž¿¡ù;‹‘-a9<61>jÊrK".Œ%Ðìyè@뀦Î
|
|
|
@ -0,0 +1,18 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 bN5c/vaBlrq40FL+ux1n1owfVG1pYQJTkl5U0Va7bkA
|
||||||
|
blqeJmUBmJy9u6V1PgTCFp4khTztI9bOObPPs1meIy0
|
||||||
|
-> piv-p256 ZFgiIw A46Lqw4Z3Cy8+TctELeSxF8c5lUP0YV5M3+xfD69ptTz
|
||||||
|
Yh46Tx9EEqoehidulMf7ilPwZ96E1lJdi0w/aDIS6no
|
||||||
|
-> piv-p256 XTQkUA A+3Jc+pHAIxwN2fmDp2gBWiOFCGSXdFWEjlxbcuAmDOV
|
||||||
|
tcsOZuHAAax5TUViyMBXdK8gNnxrysHMkY5i9mbozOI
|
||||||
|
-> piv-p256 ZFgiIw AyXKhoe9lSwLFEYkf5Z5b+71LupCWNC1eU2ArSN0jNPS
|
||||||
|
88bRtwzaFLofIxUL5pvOz/YIeZvF3Ocx892UNqEELe8
|
||||||
|
-> piv-p256 5vmPtQ A9TMmparTynhyRM8JkGr7qPvOp+DbzX6frvPPynp/5Hl
|
||||||
|
MLokBQrpPQxUFhvBWuG0vDwIa1Ri6ZpsUQubkk9kYCc
|
||||||
|
-> ",%-grease T>0e|* LG8V} )6pli J}
|
||||||
|
AvaS7pySsUr0pjLWumfPYLmLSH0mom8Nq0xm31e0Aw6AjtJe/mEBF9O6e9u+P/KI
|
||||||
|
mI9Fjvq0LnN51BmJmkD9WuXjAOXfe/Q/WDIIvIlHxMYfKBmgPd0pH6pd7+9A8rLS
|
||||||
|
wUM
|
||||||
|
--- aw59UXUi8f+ZV2aPayu24QWw9H54XW4YJ85oRodoYDo
|
||||||
|
Q®Àà <09>v!ŒâZÄ<5A>аÑøFÙtý`¥Òá”!¼CC$ý»V@®‹o9Ï”í·Í|=¡‚‰ˆ=[ÓÚF¡|Žâ§¹+þŽ)ñE3jsÙà²!¡=PÓ1]ËÊÏàð8î÷¼«w
|
||||||
|
Iñ´dˆKµõ¨]b,<ú¡ÈÊv<´Qó<51>ÎrûTZ,ÿ
|
BIN
hosts/elisabeth/secrets/nextcloud/generated/mailnix-passwd.age
Normal file
BIN
hosts/elisabeth/secrets/nextcloud/generated/mailnix-passwd.age
Normal file
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,16 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 qvTSINNBzbu/7OH/g4n9ETe98nT1t2zBoei68prbkDU
|
||||||
|
WaaXddl5e/RlpxAReHy2blcJkc290SUr/z+ACHI/Jiw
|
||||||
|
-> piv-p256 ZFgiIw Azi6q88y1v4cOOmR1/4lYdiURMe/n598ia0eauZa4K6y
|
||||||
|
CpnBjH0k4I+QjUHIPE6kDEw7c7SGkCET8pNP3cvAmZU
|
||||||
|
-> piv-p256 XTQkUA AvfagUvm4BzADnddB3I0OpicQOfFurHoGIguwmkGxsPz
|
||||||
|
qkzQ03q4E9E/UFE/ORKtqjNPUh7o0tQ1vqxvhzXIyWU
|
||||||
|
-> piv-p256 ZFgiIw A74E+KymB4ehEXwRYjqlSDts9qTxZZspUxk4S+DU6ugd
|
||||||
|
07oPVX8giMmYGVjsYCnJumpQDXv59YOCZY/QZc8KfD8
|
||||||
|
-> piv-p256 5vmPtQ A06iMGTqX/nLWjAKPeegMO83mh0c+TlpAneNQjJTYB5A
|
||||||
|
nIyWD56QpDeolYppODnadLnY3fEpF/PDLLcxvydWXNw
|
||||||
|
-> I9.OC<o^-grease ae&: dWl@ HM
|
||||||
|
qpL2Hes5oiLCx5wyFgHpp08/VJaykRPk6QNKSYXCqb+2mFM3NCufaHrVcP3aQl+W
|
||||||
|
bE1K7O3jB1dWfivJE7oXzpsiN2FrYMQyi2pCARgVQXUoQvxaqic6mQ
|
||||||
|
--- NEYBbaDr1tnuugfkZOfb+9cvsWAomSemK6Z4pxvYJTo
|
||||||
|
ým‰”¥vÓ¼´ÕCI[Jè(Þá$Èö"Âê<CöhþM¢LÛL¯k“®¾ ‚P˜q–ÇxSkGâý]–¹ÉÉöû¬YæõÄiû©§µîú<C3AE>Íæ+j¼ ²À/q”~q®þM¡ŽÐ€ÔÃ*ÀPk|ÎrLó<4C>|YÁO(ºÖTõ[ìB£Š(°T?ÌÏ"œÈB¿p
|
|
@ -0,0 +1,15 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> X25519 SKT/EQ9Moyj1FbNd6wlq+XWZzNi4ZJimPLSb57Vmlzw
|
||||||
|
8qYP9TskOc1OsTsLXajuyv4fsPJzZJaU6cLtlqbiyVo
|
||||||
|
-> piv-p256 ZFgiIw AsGZmoxY9hBPpAeOK/HYSLu93UvrjtSeIxVsP7YXZz6Z
|
||||||
|
gNFpXSITLpFBybA+W2Oo+qW+2c/Rrz+G3uABXdPdh5Q
|
||||||
|
-> piv-p256 XTQkUA AscDXlRhgTNduIeMfMnP5DOaggHIjLoS2y0FkGlOdR9/
|
||||||
|
I+uuFxR/z/qCfqcCWhBJssc7F/lWyt5lOqptXycMTrQ
|
||||||
|
-> piv-p256 ZFgiIw AmWtcTCJpra65HmVC0t930lodIHCahUIQCdtxYXy4s9q
|
||||||
|
qU0KHz/pk/spJg6Bd7vI5jxuz2I1t2iKSVOprGOnrOE
|
||||||
|
-> piv-p256 5vmPtQ A4u6lgIVdEEGC9W75AgulvzoR3Tnyrx0s2qdnWXOtISQ
|
||||||
|
eiy2qNX5B2XZ18kXM5RbvoFAtFewr+b+0b2lX/22qa4
|
||||||
|
-> 6m7l[c-grease
|
||||||
|
Z9mhVSOF0Kyi9jvU8NH6CQLXkfI5a2dZ
|
||||||
|
--- I+gjdIwsub9gtoJBW0XzeiiXaeLje7UfTWQIybPoWoQ
|
||||||
|
ã‰T<CÆb)’.ßlÊ>Ðokj%j[XöŠ:ó–oÐ ACÜ<43>qÙ~=À5Ô(>)a³•Ù\ÿFRñŠ–1 EûV$‹W±þ<C2B1>›OZò
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
|
@ -49,8 +49,9 @@ let
|
||||||
]
|
]
|
||||||
[
|
[
|
||||||
"services"
|
"services"
|
||||||
"maddy"
|
"idmail"
|
||||||
"ensureCredentials"
|
"provision"
|
||||||
|
"mailboxes"
|
||||||
]
|
]
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
|
@ -1,12 +1,14 @@
|
||||||
{ pkgs, lib, ... }:
|
{ pkgs, lib, ... }:
|
||||||
{
|
{
|
||||||
hm.stylix.targets.kitty.enable = true;
|
hm.stylix.targets.kitty.enable = true;
|
||||||
|
hm.home.sessionVariables = {
|
||||||
|
TERMINFO_DIRS = "${pkgs.kitty.terminfo.outPath}/share/terminfo";
|
||||||
|
};
|
||||||
hm.programs.kitty = {
|
hm.programs.kitty = {
|
||||||
enable = true;
|
enable = true;
|
||||||
package = pkgs.kitty.overrideAttrs (_finalAttrs: _prevAttrs: { doCheck = false; });
|
|
||||||
settings = {
|
settings = {
|
||||||
# Use xterm-256color because copying terminfo-kitty is painful.
|
# Add nerd font symbol map. Not sure why it is suddenly needed since 0.32.0 (https://github.com/kovidgoyal/kitty/issues/7081)
|
||||||
term = "xterm-256color";
|
symbol_map = "U+23FB-U+23FE,U+2665,U+26A1,U+2B58,U+E000-U+E00A,U+E0A0-U+E0A2,U+E0A3,U+E0B0-U+E0B3,U+E0B4-U+E0C8,U+E0CA,U+E0CC-U+E0D4,U+E200-U+E2A9,U+E300-U+E3E3,U+E5FA-U+E6B1,U+E700-U+E7C5,U+EA60-U+EBEB,U+F000-U+F2E0,U+F300-U+F372,U+F400-U+F532,U+F500-U+FD46,U+F0001-U+F1AF0 Symbols Nerd Font Mono";
|
||||||
|
|
||||||
# make kitty go brrrr
|
# make kitty go brrrr
|
||||||
repaint_delay = 8;
|
repaint_delay = 8;
|
||||||
|
@ -49,6 +51,7 @@
|
||||||
"shift+page_down" = "scroll_page_down";
|
"shift+page_down" = "scroll_page_down";
|
||||||
"ctrl+shift+." = "change_font_size all -2.0";
|
"ctrl+shift+." = "change_font_size all -2.0";
|
||||||
"ctrl+shift+," = "change_font_size all +2.0";
|
"ctrl+shift+," = "change_font_size all +2.0";
|
||||||
|
"ctrl+shift+w" = "no_op";
|
||||||
};
|
};
|
||||||
extraConfig = lib.mkAfter ''
|
extraConfig = lib.mkAfter ''
|
||||||
# Use nvim as scrollback pager
|
# Use nvim as scrollback pager
|
||||||
|
|
Loading…
Reference in a new issue