Compare commits

..

1 Commits

Author SHA1 Message Date
2f1331185a Reduced config for demo purposes 2025-10-14 15:15:09 -04:00
36 changed files with 66 additions and 1623 deletions

880
flake.lock generated

File diff suppressed because it is too large Load Diff

View File

@@ -4,8 +4,6 @@
inputs = {
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
nixos-hardware.url = "github:NixOS/nixos-hardware";
home-manager = {
url = "github:nix-community/home-manager";
inputs.nixpkgs.follows = "nixpkgs";
@@ -16,11 +14,6 @@
inputs.nixpkgs.follows = "nixpkgs";
};
agenix = {
url = "github:ryantm/agenix";
inputs.nixpkgs.follows = "nixpkgs";
};
nvf = {
url = "github:notashelf/nvf";
inputs.nixpkgs.follows = "nixpkgs";
@@ -31,37 +24,21 @@
inputs.nixpkgs.follows = "nixpkgs";
inputs.home-manager.follows = "home-manager";
};
stylix = {
url = "github:nix-community/stylix";
inputs.nixpkgs.follows = "nixpkgs";
};
mango = {
url = "github:DreamMaoMao/mango";
inputs.nixpkgs.follows = "nixpkgs";
};
hyprland.url = "github:hyprwm/Hyprland";
silentSDDM = {
url = "github:uiriansan/SilentSDDM";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs =
{ nixpkgs, ... }@inputs:
{
nixosConfigurations.vanta = nixpkgs.lib.nixosSystem {
let
system = "x86_64-linux";
specialArgs = {
inherit inputs;
host = "vanta";
};
host = "demo";
in
{
nixosConfigurations.${host} = nixpkgs.lib.nixosSystem {
inherit system;
specialArgs = { inherit inputs host; };
modules = [
./modules/system
./hosts/vanta
./hosts/${host}
];
};
};

View File

@@ -0,0 +1 @@
Put host config here!

View File

@@ -1,10 +0,0 @@
{
inputs,
...
}:
{
imports = [
inputs.nixos-hardware.nixosModules.framework-12th-gen-intel
./hardware-configuration.nix
];
}

View File

@@ -1,40 +0,0 @@
# Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{
imports =
[ (modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = [ "xhci_pci" "thunderbolt" "nvme" "usbhid" "usb_storage" "sd_mod" ];
boot.initrd.kernelModules = [ ];
boot.kernelModules = [ "kvm-intel" ];
boot.extraModulePackages = [ ];
fileSystems."/" =
{ device = "/dev/disk/by-uuid/1df00fd1-f531-49b9-9dc6-6d17ca39b67a";
fsType = "ext4";
};
fileSystems."/boot" =
{ device = "/dev/disk/by-uuid/EE0E-CAE4";
fsType = "vfat";
options = [ "fmask=0077" "dmask=0077" ];
};
swapDevices =
[ { device = "/dev/disk/by-uuid/fbacd982-b161-447c-a34a-7b44bc063a08"; }
];
# Enables DHCP on each ethernet and wireless interface. In case of scripted networking
# (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true;
# networking.interfaces.wlp166s0.useDHCP = lib.mkDefault true;
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.intel.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
}

View File

@@ -1,17 +0,0 @@
{
...
}:
{
programs.alacritty = {
enable = true;
theme = "catppuccin_mocha";
settings = {
font = {
normal = {
family = "FiraCode Nerd Font";
style = "Regular";
};
};
};
};
}

View File

@@ -3,19 +3,12 @@
}:
{
imports = [
./alacritty.nix
./firefox.nix
./git.nix
./hypr
./mango.nix
./nvf.nix
./packages.nix
# ./plasma.nix
./ssh.nix
./stylix.nix
./plasma.nix
./vscode.nix
./wallpaper.nix
./xdg.nix
./zsh.nix
];
}

View File

@@ -85,7 +85,6 @@
};
search = {
default = "google";
force = true;
engines = {
nix-packages = {
name = "Nix Packages";

View File

@@ -1,40 +1,18 @@
{
pkgs,
config,
...
}:
let
name = "Eclypsed";
email = "Ec1ypsed@proton.me";
signingKey = "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIB2h6y1Al2OVotYIpwPZMjiBLAncAI2pAPgES2+gVbJqAAAABHNzaDo= ssh:";
in
{
home.packages = with pkgs; [ git-ignore ];
xdg.configFile."git/allowed_signers".text = ''
${email} namespaces="git" ${signingKey}
'';
programs = {
git = {
programs.git = {
enable = true;
settings = {
user = { inherit name email; };
userName = "Eclypsed";
userEmail = "Ec1ypsed@proton.me";
extraConfig = {
init = {
defaultBranch = "main";
};
gpg.ssh.allowedSignersFile = "${config.xdg.configHome}/git/allowed_signers";
};
signing = {
format = "ssh";
key = "${config.home.homeDirectory}/.ssh/id_ed25519_sk_rk.pub";
signByDefault = true;
};
};
lazygit = {
enable = true;
enableZshIntegration = true;
shellWrapperName = "lg";
};
};
home.packages = with pkgs; [ git-ignore ];
}

View File

@@ -1,9 +0,0 @@
{
...
}:
{
imports = [
./hyprland.nix
./keybinds.nix
];
}

View File

@@ -1,47 +0,0 @@
{
pkgs,
...
}:
{
home.packages = with pkgs; [
waybar
hyprpolkitagent
];
wayland.windowManager.hyprland = {
enable = true;
package = null;
portalPackage = null;
settings = {
monitor = [
"eDP-1, 2256x1504@60, 0x0, 1"
];
decoration = {
rounding = 10;
active_opacity = 0.95;
inactive_opacity = 0.85;
fullscreen_opacity = 1.0;
blur = {
enabled = true;
size = 8;
passes = 3;
new_optimizations = true;
};
};
exec-once = [
"systemctl --user enable --now waybar.service"
"systemctl --user enable --now hyprpolkitagent.service"
"wpaperd -d"
];
env = [
"NIXOS_OZONE_WL, 1"
];
};
};
}

View File

@@ -1,69 +0,0 @@
{
...
}:
{
wayland.windowManager.hyprland.settings = {
exec = "hyprctl dispatch submap global";
submap = "global";
# MY STUFF
"$mod" = "SUPER";
bind = [
"$mod, Q, killactive"
"$mod, W, exec, alacritty"
"$mod, S, exec, rofi -show drun -show-icons"
# Window Movement
"$mod, left, movefocus, l"
"$mod, right, movefocus, r"
"$mod, up, movefocus, u"
"$mod, down, movefocus, d"
"$mod SHIFT, left, movewindow, l"
"$mod SHIFT, right, movewindow, r"
"$mod SHIFT, up, movewindow, u"
"$mod SHIFT, down, movewindow, d"
"$mod CTRL, left, workspace, r-1"
"$mod CTRL, right, workspace, r+1"
"$mod CTRL SHIFT, left, movetoworkspace, r-1"
"$mod CTRL SHIFT, right, movetoworkspace, r+1"
# Brightness keys
", XF86MonBrightnessUp, exec, brightnessctl set 10%+"
", XF86MonBrightnessDown, exec, brightnessctl set 10%-"
# Media Control Keys
", XF86AudioPrev, exec, playerctl previous"
", XF86AudioPlay, exec, playerctl play-pause"
", XF86AudioNext, exec, playerctl next"
", XF86AudioMute, exec, pamixer -t"
", XF86AudioRaiseVolume, exec, pamixer -i 5"
", XF86AudioLowerVolume, exec, pamixer -d 5"
"ALT, XF86AudioMute, exec, pamixer --default-source -t"
"ALT, XF86AudioRaiseVolume, exec, pamixer --default-source -i 5"
"ALT, XF86AudioLowerVolume, exec, pamixer --default-source -d 5"
]
++ (
# workspaces
# binds $mod + [shift +] {1..9} to [move to] workspace {1..9}
builtins.concatLists (
builtins.genList (
i:
let
ws = i + 1;
in
[
"$mod, code:1${toString i}, workspace, ${toString ws}"
"$mod SHIFT, code:1${toString i}, movetoworkspace, ${toString ws}"
]
) 9
)
);
bindm = [
"$mod, mouse:272, movewindow"
"$mod, mouse:273, resizewindow"
"$mod ALT, mouse:272, resizewindow"
];
};
}

View File

@@ -1,37 +0,0 @@
{
inputs,
...
}:
{
imports = [
inputs.mango.hmModules.mango
];
wayland.windowManager.mango = {
enable = true;
settings = ''
bind=SUPER,Return,spawn,alacritty
bind=SUPER,s,spawn,rofi -show drun
bind=SUPER,q,killclient
bind=SUPER+SHIFT,r,reload_config
bind=SUPER,t,setlayout,tile
bind=SUPER,v,setlayout,vertical_grid
bind=SUPER,c,setlayout,spiral
bind=SUPER,x,setlayout,scroller
bind=SUPER,n,switch_layout
bind=SUPER,a,togglegaps
bind=SUPER,Up,focusdir,up
bind=SUPER,Down,focusdir,down
bind=SUPER,Left,focusdir,left
bind=SUPER,Right,focusdir,right
bind=SUPER+SHIFT,Up,exchange_client,up
bind=SUPER+SHIFT,Down,exchange_client,down
bind=SUPER+SHIFT,Left,exchange_client,left
bind=SUPER+SHIFT,Right,exchange_client,right
'';
};
}

View File

@@ -61,6 +61,9 @@
# Formatting files
formatter.conform-nvim = {
enable = true;
setupOpts = {
};
};
binds = {
@@ -218,17 +221,6 @@
treesitter.enable = true;
};
rust = {
enable = true;
# crates = {
# enable = true;
# };
dap.enable = true;
format.enable = true;
lsp.enable = true;
treesitter.enable = true;
};
tailwind = {
enable = true;
lsp.enable = true;

View File

@@ -9,20 +9,19 @@
discord
sqlitebrowser
drawio
bitwarden-desktop
# Libre Office
libreoffice-qt
hunspell
hunspellDicts.en_US
# KDE
kdePackages.kate
# CD Stuff
picard
heybrochecklog
rsgain
rofi
playerctl
pamixer
brightnessctl
];
}

View File

@@ -1,30 +0,0 @@
{
...
}:
{
programs.ssh = {
enable = true;
enableDefaultConfig = false;
matchBlocks = {
"*" = {
addKeysToAgent = "yes";
identityFile = [ "~/.ssh/id_ed25519_sk_rk" ];
};
"stu" = {
hostname = "stu.cs.jmu.edu";
user = "tamassno";
localForwards = [
{
bind.port = 5432;
host = {
address = "data.cs.jmu.edu";
port = 5432;
};
}
];
serverAliveCountMax = 5;
serverAliveInterval = 60;
};
};
};
}

View File

@@ -1,57 +0,0 @@
{
inputs,
pkgs,
...
}:
{
imports = [
inputs.stylix.homeModules.stylix
];
stylix = {
enable = true;
autoEnable = false;
polarity = "dark";
base16Scheme = "${pkgs.base16-schemes}/share/themes/catppuccin-mocha.yaml";
targets = {
# firefox = {
# enable = true;
# colorTheme.enable = true;
# firefoxGnomeTheme.enable = true;
# profileNames = [ "eclypse" ];
# };
# gtk = {
# enable = true;
# };
qt = {
enable = true;
};
};
};
home.pointerCursor = {
gtk.enable = true;
package = pkgs.bibata-cursors;
name = "Bibata-Modern-Ice";
size = 17;
};
gtk = {
enable = true;
colorScheme = "dark";
theme = {
name = "Tokyonight-Dark";
package = pkgs.tokyonight-gtk-theme.override {
tweakVariants = [ "macos" ];
};
};
};
# home.pointerCursor = {
# enable = true;
# gtk.enable = true;
# name = "Catppuccin-Mocha-Dark-Cursors";
# package = pkgs.catppuccin-cursors.mochaDark;
# size = 16;
# };
}

View File

@@ -17,7 +17,6 @@
aaron-bond.better-comments
yzane.markdown-pdf
mechatroner.rainbow-csv
catppuccin.catppuccin-vsc
# Remote development
ms-vscode-remote.remote-ssh
@@ -47,14 +46,6 @@
# General
"editor.formatOnSave" = true;
"workbench.iconTheme" = "material-icon-theme";
"workbench.colorTheme" = "Catppuccin Mocha";
"catppuccin.accentColor" = "flamingo";
# Remote SSH
# VSCode attempts to write to ~/.ssh/config for remote ssh connections.
# Because ~/.ssh/config is managed with home-manager, it is not writeable.
# So we specify a custom ssh config path
"remote.SSH.configFile" = "/home/eclypse/.ssh/vscode-config";
# Prettier
"editor.defaultFormatter" = "esbenp.prettier-vscode";
@@ -94,13 +85,6 @@
# C / C++
"C_Cpp.clang_format_style" = "GNU"; # This is really just for cs361, I actually hate the GNU style
"C_Cpp.default.cStandard" = "gnu17";
"[c]" = {
"editor.defaultFormatter" = "ms-vscode.cpptools";
};
"[cpp]" = {
"editor.defaultFormatter" = "ms-vscode.cpptools";
};
};
};
};

View File

@@ -1,25 +0,0 @@
{
config,
...
}:
let
wallpapers = config.xdg.userDirs.extraConfig.XDG_WALLPAPERS_DIR;
in
{
home.file."${wallpapers}" = {
source = ../../wallpapers;
recursive = true;
};
services.wpaperd = {
enable = true;
settings = {
default = {
mode = "center";
};
any = {
path = "${wallpapers}/lanterns_of_twilight.png";
};
};
};
}

View File

@@ -1,18 +0,0 @@
{
config,
...
}:
{
xdg = {
enable = true;
userDirs = {
enable = true;
createDirectories = true;
extraConfig = {
XDG_DEV_DIR = "${config.home.homeDirectory}/Dev";
XDG_WALLPAPERS_DIR = "${config.xdg.userDirs.pictures}/Wallpapers";
XDG_SCREENSHOTS_DIR = "${config.xdg.userDirs.pictures}/Screenshots";
};
};
};
}

View File

@@ -1,5 +1,4 @@
{
pkgs,
...
}:
{
@@ -8,79 +7,13 @@
enable = true;
enableZshIntegration = true;
};
starship = {
enable = true;
enableZshIntegration = true;
settings = {
add_newline = true;
format = pkgs.lib.concatStrings [
"[](#f38ba8)"
"[ 󱄅 ](fg:#1e1e2e bg:#f38ba8)"
"[](fg:#f38ba8 bg:#fab387)"
"$directory"
"[](fg:#fab387 bg:#f9e2af)"
"$git_branch"
"$git_status"
"[](fg:#f9e2af bg:#a6e3a1)"
"$nodejs"
"$rust"
"$golang"
"$php"
"[](fg:#a6e3a1)"
"$line_break"
"$character"
];
directory = {
style = "fg:#1e1e2e bg:#fab387";
format = "[ $path ]($style)";
truncation_length = 3;
truncation_symbol = "/";
substitutions = {
"Documents" = "󰈙 ";
"Downloads" = " ";
"Music" = " ";
"Pictures" = " ";
};
};
git_branch = {
symbol = "";
style = "bg:#f9e2af";
format = "[[ $symbol $branch ](fg:#1e1e2e bg:#f9e2af)]($style)";
};
git_status = {
style = "bg:#f9e2af";
format = "[[($all_status$ahead_behind )](fg:#1e1e2e bg:#f9e2af)]($style)";
};
nodejs = {
symbol = "";
style = "bg:#a6e3a1";
format = "[[ $symbol ($version) ](fg:#1e1e2e bg:#a6e3a1)]($style)";
};
rust = {
symbol = "";
style = "bg:#a6e3a1";
format = ''[[ $symbol ($version) ](fg:#1e1e2e bg:#a6e3a1)]($style)'';
};
golang = {
symbol = "";
style = "bg:#a6e3a1";
format = "[[ $symbol ($version) ](fg:#1e1e2e bg#a6e3a1)]($style)";
};
php = {
symbol = "";
style = "bg:#a6e3a1";
format = "[[ $symbol ($version) ](fg:#1e1e2e bg:#a6e3a1)]($style)";
};
scan_timeout = 100;
};
};
zsh = {
enable = true;
enableCompletion = true;
autosuggestion.enable = true;
syntaxHighlighting.enable = true;
shellAliases = {
stu = "ssh stu";
sessionVariables = {
SSH_AUTH_SOCK = "/home/eclypse/.bitwarden-ssh-agent.sock";
};
};
};

View File

@@ -1,20 +0,0 @@
{
inputs,
pkgs,
...
}:
{
imports = [
inputs.agenix.nixosModules.default
];
environment.systemPackages = [
inputs.agenix.packages.${pkgs.system}.default # CLI Tool
];
age.secrets = {
tailscale-auth.file = ../../secrets/tailscale-auth.age;
eclypsecloud-eclypse.file = ../../secrets/eclypsecloud-eclypse.age;
eclypse-password.file = ../../secrets/eclypse-password.age;
};
}

View File

@@ -1,10 +1,8 @@
{
config,
...
}:
{
boot = {
extraModulePackages = with config.boot.kernelPackages; [ virtualbox ];
loader = {
systemd-boot = {
enable = true;
@@ -12,6 +10,5 @@
};
efi.canTouchEfiVariables = true;
};
kernelParams = [ "kvm.enable_virt_at_load=0" ];
};
}

View File

@@ -3,9 +3,7 @@
}:
{
imports = [
./agenix.nix
./boot.nix
./desktop.nix
./fileSystems.nix
./fonts.nix
./network.nix
@@ -13,8 +11,6 @@
./security.nix
./services.nix
./system.nix
./tailscale.nix
./user.nix
# ./virtualisation.nix
];
}

View File

@@ -1,54 +0,0 @@
{
inputs,
pkgs,
...
}:
let
sddm-theme = inputs.silentSDDM.packages.${pkgs.system}.default;
in
{
imports = [
inputs.mango.nixosModules.mango
];
programs = {
hyprland = {
enable = true;
package = inputs.hyprland.packages.${pkgs.system}.hyprland;
portalPackage = inputs.hyprland.packages.${pkgs.system}.xdg-desktop-portal-hyprland;
};
mango.enable = true;
};
environment.systemPackages = [
sddm-theme
sddm-theme.test
];
services.displayManager = {
defaultSession = "mango";
sddm = {
enable = true;
package = pkgs.kdePackages.sddm;
theme = sddm-theme.pname;
extraPackages = sddm-theme.propagatedBuildInputs;
settings = {
General = {
GreeterEnvironment = "QML2_IMPORT_PATH=${sddm-theme}/share/sddm/themes/${sddm-theme.pname}/components/,QT_IM_MODULE=qtvirtualkeyboard";
InputMethod = "qtvirtualkeyboard";
};
};
};
};
# Enable the KDE Plasma Desktop Environment.
# displayManager.sddm.enable = true;
# desktopManager.plasma5.enable = true;
# Enable the System75 Cosmic Desktop Environment
# displayManager.cosmic-greeter.enable = true;
# desktopManager.cosmic = {
# enable = true;
# xwayland.enable = true;
# };
}

View File

@@ -1,45 +0,0 @@
{
pkgs,
config,
...
}:
let
automount_opts = [
"x-systemd.automount"
"x-systemd.idle-timeout=60"
"x-systemd.device-timeout=5s"
"x-systemd.mount-timeout=5s"
"noauto"
"user"
"users"
];
in
{
fileSystems = {
"/mnt/EclypseCloud" = {
device = "//100.78.212.35/EclypseCloud";
fsType = "cifs";
options = [
"credentials=${config.age.secrets.eclypsecloud-eclypse.path}"
"uid=${toString config.users.users.eclypse.uid}"
"rw"
]
++ automount_opts;
};
"/mnt/Music" = {
device = "//100.78.212.35/music";
fsType = "cifs";
options = [
"credentials=${config.age.secrets.eclypsecloud-eclypse.path}"
"uid=${toString config.users.users.eclypse.uid}"
"rw"
]
++ automount_opts;
};
};
environment.systemPackages = with pkgs; [
cifs-utils
# rclone
];
}

View File

@@ -2,15 +2,6 @@
...
}:
{
programs = {
yubikey-manager.enable = true;
yubikey-touch-detector.enable = true;
};
services = {
yubikey-agent.enable = true;
};
security = {
rtkit.enable = true;
};

View File

@@ -1,5 +1,4 @@
{
pkgs,
...
}:
{
@@ -19,20 +18,12 @@
# libinput.enable = true;
};
# Enable CUPS to print documents.
printing = {
enable = true;
drivers = with pkgs; [
gutenprint
cnijfilter2
];
};
# Enable the KDE Plasma Desktop Environment.
displayManager.sddm.enable = true;
desktopManager.plasma6.enable = true;
avahi = {
enable = true;
nssmdns4 = true;
openFirewall = true;
};
# Enable CUPS to print documents.
printing.enable = true;
# Enable sound with pipewire.
pulseaudio.enable = false;
@@ -59,14 +50,4 @@
};
};
};
hardware = {
bluetooth = {
enable = true;
powerOnBoot = true;
};
sane = {
enable = true;
};
};
}

View File

@@ -14,13 +14,11 @@
"https://cache.nixos.org"
"https://nix-community.cachix.org"
"https://devenv.cachix.org"
"https://hyprland.cachix.org"
];
trusted-public-keys = [
"cache.nixos.org-1:6NCHdD59X431o0gWypbMrAURkbJ16ZPMQFGspcDShjY="
"nix-community.cachix.org-1:mB9FSh9qf2dCimDSUo8Zy7bkq5CX+/rkCWyvRCYg3Fs="
"devenv.cachix.org-1:w1cLUi8dv3hnoSPGAuibQv+f9TZLr6cv/Hm9XgU50cw="
"hyprland.cachix.org-1:a7pgxzMz7+chwVL3/pzj6jIBMioiJM7ypFP8PwtkuGc="
];
};
};

View File

@@ -1,31 +0,0 @@
{
config,
pkgs,
...
}:
{
services.tailscale = {
enable = true;
useRoutingFeatures = "client";
authKeyFile = config.age.secrets.tailscale-auth.path;
# * Only applied if `authKeyFile` is specified
extraUpFlags = [
"--ssh"
"--accept-routes=true"
];
extraSetFlags = [
"--operator=eclypse"
];
};
# Taildrop
systemd.user.services.taildrop = {
description = "Taildrop File Receiver Service";
wantedBy = [ "default.target" ];
serviceConfig = {
Type = "simple";
ExecStart = "${pkgs.tailscale}/bin/tailscale file get --verbose --loop %h/Downloads/";
};
};
}

View File

@@ -2,7 +2,6 @@
inputs,
pkgs,
host,
config,
...
}:
{
@@ -22,8 +21,6 @@
};
programs.home-manager.enable = true;
};
backupFileExtension = "backup";
};
users.mutableUsers = false;
@@ -34,10 +31,8 @@
extraGroups = [
"networkmanager"
"wheel"
"scanner"
"lp"
];
hashedPasswordFile = config.age.secrets.eclypse-password.path;
hashedPassword = "$6$33qMKGMsdYC//e/s$Z2mQCqDOwbP185OVOLsE63hg.orMrBbxR8WHIiZ9dAnNk3jgEsEU218qtgsQsyATvjsyHUPBQjsa/3JmNLoMM0";
shell = pkgs.zsh;
};
}

View File

@@ -1,8 +0,0 @@
{
...
}:
{
virtualisation.virtualbox.host.enable = true;
virtualisation.virtualbox.host.enableExtensionPack = true;
users.extraGroups.vboxusers.members = [ "eclypse" ];
}

View File

@@ -1,6 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 7p4RPw wZdiee1a8rqdaNA8EVLUJIEue1ldgrk3HgVGhmHpnTQ
8VLt5rSvqN+HAHS9JL6hYSj7xVrTtZAcrn5C12it+Fw
--- 9oiyRlMDS7PrUyP4SmkgcMZz+/BENDBn9XN+3216OXY
<EFBFBD>%<25>v*|<7C>M<EFBFBD>3<EFBFBD>g<EFBFBD>g<EFBFBD>%;F"s<15><> <0B> <20>7<EFBFBD>Uj<55>_H<5F><48><1F><>D<EFBFBD>^*B<>nK'
v<EFBFBD><EFBFBD>~<7E>`<60>

View File

@@ -1,5 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 7p4RPw dVTohhNu/jjHSNyhw7irzffqzJJFvW0TbkhSmKKrhS8
zTc4HaFO3hSYVLM35KwEGUcu2R+JGHIN758FpKKxL5U
--- EhTyT6CYdKjAC9yN0kCxx5yW4o27DJteu8YCbVF2Ln4
<EFBFBD>ܬ<EFBFBD><EFBFBD><EFBFBD><EFBFBD>}<7D>P<EFBFBD><50>l<EFBFBD><6C>'<27><>,QLג5P<13>SMs<4D> <0C><₼<><E282BC>z<EFBFBD><7A><EFBFBD><EFBFBD><EFBFBD>yQ <0C>o<EFBFBD> t[a0<0F><>U<EFBFBD><12>z?R<>"&ߨC<DFA8><43><EFBFBD>l<EFBFBD>

View File

@@ -1,19 +0,0 @@
# This file is NOT imported into the nix configuration, it is just for the agenix CLI
let
# System public ssh keys (/etc/ssh/)
vanta = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAaDVBJdMDFL8r9NQCbaLe+DPHGhGzRv2N7+7m1/U8DP";
in
{
# Tailscale auth key need to be up to date with a valid auth key in the tailscale
# dashboard. Single-use keys expire after a single machine connects, and even
# reusable keys expire after 90 days.
# Update tailscale-auth.age with `agenix -e tailscale-auth.age -i /path/to/private-ssh-key`
# Note: Only devices with the below public keys are allowed to edit tailscale-auth.age
"tailscale-auth.age".publicKeys = [ vanta ]; # Devices allowed to join the tailnet;
# Devices that can connect to EclypseCloud with the eclypse user.
"eclypsecloud-eclypse.age".publicKeys = [ vanta ];
# Devices that have the eclypse user
"eclypse-password.age".publicKeys = [ vanta ];
}

View File

@@ -1,6 +0,0 @@
age-encryption.org/v1
-> ssh-ed25519 7p4RPw 7GuZj43+NoyPXf//ZLM99vossbJXOpDQSkBi3w51Wl8
FTMjlyml+T87LQffffY2AJL5IhTAJF2QlfFvhvZpvOs
--- iONf8B3bUxXtCiv0EAv5QO0ZyhE5A6YfRbcxUr/awFg
<EFBFBD><0E><><EFBFBD>Tw<54><77>J`<60>~B
<EFBFBD><11>;<3B>lOh<4F><68>{2<>?<3F><>P<EFBFBD><50>F>@m<>o<><6F>c<EFBFBD><1C>~X<>3<EFBFBD>@.g<0E>ھ<EFBFBD>eK<65><18>V7zphS<68><53>د6<D8AF><36>.W<><57>O@F