From 71baa09bd2a17919aa62c4678187ebba28b925a4 Mon Sep 17 00:00:00 2001 From: Zuckerberg Date: Thu, 20 Apr 2023 22:01:21 -0600 Subject: [PATCH] Refactor imports and secrets. Add per system properties and role based secret access. Highlights - No need to update flake for every machine anymore, just add a properties.nix file. - Roles are automatically generated from all machine configurations. - Roles and their secrets automatically are grouped and show up in agenix secrets.nix - Machines and their service configs may now query the properties of all machines. - Machine configuration and secrets are now competely isolated into each machine's directory. - Safety checks to ensure no mixing of luks unlocking secrets and hosts with primary ones. - SSH pubkeys no longer centrally stored but instead per machine where the private key lies for better cleanup. --- README.md | 1 - common/default.nix | 11 +- common/machine-info/default.nix | 198 ++++++++++++++++++ common/machine-info/moduleless.nix | 15 ++ common/machine-info/roles.nix | 19 ++ common/machine-info/ssh.nix | 44 ++++ common/network/default.nix | 1 - common/network/hosts.nix | 66 ------ common/network/pia-openvpn.nix | 2 +- common/network/pia-wireguard.nix | 2 +- common/server/mailserver.nix | 4 +- common/ssh.nix | 72 +++---- flake.nix | 175 ++++++++-------- machines/ephemeral/minimal.nix | 14 +- .../phil/{configuration.nix => default.nix} | 0 machines/phil/properties.nix | 19 ++ .../ponyo/{configuration.nix => default.nix} | 0 machines/ponyo/properties.nix | 28 +++ .../ray/{configuration.nix => default.nix} | 0 machines/ray/properties.nix | 22 ++ .../router/{configuration.nix => default.nix} | 0 machines/router/properties.nix | 21 ++ .../s0/{configuration.nix => default.nix} | 0 machines/storage/s0/properties.nix | 20 ++ secrets/backblaze-s3-backups.age | Bin 1246 -> 1088 bytes secrets/email-pw.age | 23 -- secrets/hashed-email-pw.age | 10 + secrets/hashed-robots-email-pw.age | Bin 1327 -> 517 bytes secrets/hostapd-pw-CXNK00BF9176.age | 23 +- secrets/hostapd-pw-experimental-tower.age | Bin 710 -> 490 bytes secrets/iodine.age | 31 +-- secrets/nextcloud-pw.age | 32 +-- secrets/pia-login.age | 11 + secrets/pia-login.conf | Bin 1227 -> 0 bytes secrets/restic-password.age | 41 ++-- secrets/robots-email-pw.age | Bin 1253 -> 544 bytes secrets/sasl_relay_passwd.age | Bin 1978 -> 1233 bytes secrets/searx.age | Bin 1276 -> 383 bytes secrets/secrets.nix | 46 ++-- secrets/smb-secrets.age | Bin 1277 -> 509 bytes secrets/spotifyd.age | 32 +-- secrets/wolframalpha.age | 32 +-- 42 files changed, 632 insertions(+), 383 deletions(-) create mode 100644 common/machine-info/default.nix create mode 100644 common/machine-info/moduleless.nix create mode 100644 common/machine-info/roles.nix create mode 100644 common/machine-info/ssh.nix delete mode 100644 common/network/hosts.nix rename machines/phil/{configuration.nix => default.nix} (100%) create mode 100644 machines/phil/properties.nix rename machines/ponyo/{configuration.nix => default.nix} (100%) create mode 100644 machines/ponyo/properties.nix rename machines/ray/{configuration.nix => default.nix} (100%) create mode 100644 machines/ray/properties.nix rename machines/router/{configuration.nix => default.nix} (100%) create mode 100644 machines/router/properties.nix rename machines/storage/s0/{configuration.nix => default.nix} (100%) create mode 100644 machines/storage/s0/properties.nix delete mode 100644 secrets/email-pw.age create mode 100644 secrets/hashed-email-pw.age create mode 100644 secrets/pia-login.age delete mode 100644 secrets/pia-login.conf diff --git a/README.md b/README.md index b9f747c..6b92915 100644 --- a/README.md +++ b/README.md @@ -6,7 +6,6 @@ - `/network` - config for tailscale, and NixOS container with automatic vpn tunneling via PIA - `/pc` - config that a graphical desktop computer should have. Use `de.enable = true;` to enable everthing. - `/server` - config that creates new nixos services or extends existing ones to meet my needs - - `/ssh.nix` - all ssh public host and user keys for all `/machines` - `/machines` - all my NixOS machines along with their machine unique configuration for hardware and services - `/kexec` - a special machine for generating minimal kexec images. Does not import `/common` - `/secrets` - encrypted shared secrets unlocked through `/machines` ssh host keys diff --git a/common/default.nix b/common/default.nix index b88c9f8..f6ca89b 100644 --- a/common/default.nix +++ b/common/default.nix @@ -1,10 +1,5 @@ { config, pkgs, ... }: -let - ssh = import ./ssh.nix; - sshUserKeys = ssh.users; - sshHigherTrustKeys = ssh.higherTrustUserKeys; -in { imports = [ ./backups.nix @@ -15,6 +10,8 @@ in ./boot ./server ./pc + ./machine-info + ./ssh.nix ]; nix.flakes.enable = true; @@ -68,12 +65,12 @@ in "dialout" # serial ]; shell = pkgs.fish; - openssh.authorizedKeys.keys = sshUserKeys; + openssh.authorizedKeys.keys = config.machines.ssh.userKeys; hashedPassword = "$6$TuDO46rILr$gkPUuLKZe3psexhs8WFZMpzgEBGksE.c3Tjh1f8sD0KMC4oV89K2pqAABfl.Lpxu2jVdr5bgvR5cWnZRnji/r/"; uid = 1000; }; users.users.root = { - openssh.authorizedKeys.keys = sshHigherTrustKeys; + openssh.authorizedKeys.keys = config.machines.ssh.deployKeys; }; nix.settings = { trusted-users = [ "root" "googlebot" ]; diff --git a/common/machine-info/default.nix b/common/machine-info/default.nix new file mode 100644 index 0000000..d51c1cb --- /dev/null +++ b/common/machine-info/default.nix @@ -0,0 +1,198 @@ +# Gathers info about each machine to constuct overall configuration +# Ex: Each machine already trusts each others SSH fingerprint already + +{ config, lib, pkgs, ... }: + +let + machines = config.machines.hosts; +in +{ + imports = [ + ./ssh.nix + ./roles.nix + ]; + + options.machines.hosts = lib.mkOption { + type = lib.types.attrsOf + (lib.types.submodule { + options = { + + hostNames = lib.mkOption { + type = lib.types.listOf lib.types.str; + description = '' + List of hostnames for this machine. The first one is the default so it is the target of deployments. + Used for automatically trusting hosts for ssh connections. + ''; + }; + + arch = lib.mkOption { + type = lib.types.enum [ "x86_64-linux" "aarch64-linux" ]; + description = '' + The architecture of this machine. + ''; + }; + + systemRoles = lib.mkOption { + type = lib.types.listOf lib.types.str; # TODO: maybe use an enum? + description = '' + The set of roles this machine holds. Affects secrets available. (TODO add service config as well using this info) + ''; + }; + + hostKey = lib.mkOption { + type = lib.types.str; + description = '' + The system ssh host key of this machine. Used for automatically trusting hosts for ssh connections + and for decrypting secrets with agenix. + ''; + }; + + remoteUnlock = lib.mkOption { + default = null; + type = lib.types.nullOr (lib.types.submodule { + options = { + + hostKey = lib.mkOption { + type = lib.types.str; + description = '' + The system ssh host key of this machine used for luks boot unlocking only. + ''; + }; + + clearnetHost = lib.mkOption { + default = null; + type = lib.types.nullOr lib.types.str; + description = '' + The hostname resolvable over clearnet used to luks boot unlock this machine + ''; + }; + + onionHost = lib.mkOption { + default = null; + type = lib.types.nullOr lib.types.str; + description = '' + The hostname resolvable over tor used to luks boot unlock this machine + ''; + }; + + }; + }); + }; + + userKeys = lib.mkOption { + default = [ ]; + type = lib.types.listOf lib.types.str; + description = '' + The list of user keys. Each key here can be used to log into all other systems as `googlebot`. + + TODO: consider auto populating other programs that use ssh keys such as gitea + ''; + }; + + deployKeys = lib.mkOption { + default = [ ]; + type = lib.types.listOf lib.types.str; + description = '' + The list of deployment keys. Each key here can be used to log into all other systems as `root`. + ''; + }; + + configurationPath = lib.mkOption { + type = lib.types.path; + description = '' + The path to this machine's configuration directory. + ''; + }; + + }; + }); + }; + + config = { + assertions = (lib.concatLists (lib.mapAttrsToList + ( + name: cfg: [ + { + assertion = builtins.length cfg.hostNames > 0; + message = '' + Error with config for ${name} + There must be at least one hostname. + ''; + } + { + assertion = builtins.length cfg.systemRoles > 0; + message = '' + Error with config for ${name} + There must be at least one system role. + ''; + } + { + assertion = cfg.remoteUnlock == null || cfg.remoteUnlock.hostKey != cfg.hostKey; + message = '' + Error with config for ${name} + Unlock hostkey and hostkey cannot be the same because unlock hostkey is in /boot, unencrypted. + ''; + } + { + assertion = cfg.remoteUnlock == null || (cfg.remoteUnlock.clearnetHost != null || cfg.remoteUnlock.onionHost != null); + message = '' + Error with config for ${name} + At least one of clearnet host or onion host must be defined. + ''; + } + { + assertion = cfg.remoteUnlock == null || cfg.remoteUnlock.clearnetHost == null || builtins.elem cfg.remoteUnlock.clearnetHost cfg.hostNames == false; + message = '' + Error with config for ${name} + Clearnet unlock hostname cannot be in the list of hostnames for security reasons. + ''; + } + { + assertion = cfg.remoteUnlock == null || cfg.remoteUnlock.onionHost == null || lib.strings.hasSuffix ".onion" cfg.remoteUnlock.onionHost; + message = '' + Error with config for ${name} + Tor unlock hostname must be an onion address. + ''; + } + { + assertion = builtins.elem "personal" cfg.systemRoles || builtins.length cfg.userKeys == 0; + message = '' + Error with config for ${name} + There must be at least one userkey defined for personal machines. + ''; + } + { + assertion = builtins.elem "deploy" cfg.systemRoles || builtins.length cfg.deployKeys == 0; + message = '' + Error with config for ${name} + Only deploy machines are allowed to have deploy keys for security reasons. + ''; + } + ] + ) + machines)); + + # Set per machine properties automatically using each of their `properties.nix` files respectively + machines.hosts = + let + properties = dir: lib.concatMapAttrs + (name: path: { + ${name} = + import path + // + { configurationPath = builtins.dirOf path; }; + }) + (propertiesFiles dir); + propertiesFiles = dir: + lib.foldl (lib.mergeAttrs) { } (propertiesFiles' dir ""); + propertiesFiles' = dir: dirName: + let + dirContents = builtins.readDir dir; + dirPaths = lib.filter (path: dirContents.${path} == "directory") (lib.attrNames dirContents); + propFiles = builtins.map (p: "${dir}/${p}") (lib.filter (path: path == "properties.nix") (lib.attrNames dirContents)); + in + lib.concatMap (d: propertiesFiles' "${dir}/${d}" d) dirPaths ++ builtins.map (p: { "${dirName}" = p; }) propFiles; + in + properties ../../machines; + }; +} diff --git a/common/machine-info/moduleless.nix b/common/machine-info/moduleless.nix new file mode 100644 index 0000000..2045124 --- /dev/null +++ b/common/machine-info/moduleless.nix @@ -0,0 +1,15 @@ +# Allows getting machine-info outside the scope of nixos configuration + +{ nixpkgs ? import { } +, assertionsModule ? +}: + +{ + machines = + (nixpkgs.lib.evalModules { + modules = [ + ./default.nix + assertionsModule + ]; + }).config.machines; +} diff --git a/common/machine-info/roles.nix b/common/machine-info/roles.nix new file mode 100644 index 0000000..a491c73 --- /dev/null +++ b/common/machine-info/roles.nix @@ -0,0 +1,19 @@ +{ config, lib, ... }: + +# Maps roles to their hosts + +{ + options.machines.roles = lib.mkOption { + type = lib.types.attrsOf (lib.types.listOf lib.types.str); + }; + + config = { + machines.roles = lib.zipAttrs + (lib.mapAttrsToList + (host: cfg: + lib.foldl (lib.mergeAttrs) { } + (builtins.map (role: { ${role} = host; }) + cfg.systemRoles)) + config.machines.hosts); + }; +} diff --git a/common/machine-info/ssh.nix b/common/machine-info/ssh.nix new file mode 100644 index 0000000..b7775d4 --- /dev/null +++ b/common/machine-info/ssh.nix @@ -0,0 +1,44 @@ +{ config, lib, ... }: + +let + machines = config.machines; + + sshkeys = keyType: lib.foldl (l: cfg: l ++ cfg.${keyType}) [ ] (builtins.attrValues machines.hosts); +in +{ + options.machines.ssh = { + userKeys = lib.mkOption { + type = lib.types.listOf lib.types.str; + description = '' + List of user keys aggregated from all machines. + ''; + }; + + deployKeys = lib.mkOption { + default = [ ]; + type = lib.types.listOf lib.types.str; + description = '' + List of deploy keys aggregated from all machines. + ''; + }; + + hostKeysByRole = lib.mkOption { + type = lib.types.attrsOf (lib.types.listOf lib.types.str); + description = '' + Machine host keys divided into their roles. + ''; + }; + }; + + config = { + machines.ssh.userKeys = sshkeys "userKeys"; + machines.ssh.deployKeys = sshkeys "deployKeys"; + + machines.ssh.hostKeysByRole = lib.mapAttrs + (role: hosts: + builtins.map + (host: machines.hosts.${host}.hostKey) + hosts) + machines.roles; + }; +} diff --git a/common/network/default.nix b/common/network/default.nix index 80882e5..a7c879c 100644 --- a/common/network/default.nix +++ b/common/network/default.nix @@ -7,7 +7,6 @@ let in { imports = [ - ./hosts.nix ./pia-openvpn.nix ./pia-wireguard.nix ./ping.nix diff --git a/common/network/hosts.nix b/common/network/hosts.nix deleted file mode 100644 index cef02fb..0000000 --- a/common/network/hosts.nix +++ /dev/null @@ -1,66 +0,0 @@ -{ config, lib, ... }: - -let - system = (import ../ssh.nix).system; - - # hostnames that resolve on clearnet for LUKS unlocking - unlock-clearnet-hosts = { - ponyo = "unlock.ponyo.neet.dev"; - phil = "unlock.phil.neet.dev"; - s0 = "s0"; - }; - - # hostnames that resolve on tor for LUKS unlocking - unlock-onion-hosts = { - liza = "5synsrjgvfzywruomjsfvfwhhlgxqhyofkzeqt2eisyijvjvebnu2xyd.onion"; - router = "jxx2exuihlls2t6ncs7rvrjh2dssubjmjtclwr2ysvxtr4t7jv55xmqd.onion"; - ponyo = "cfamr6artx75qvt7ho3rrbsc7mkucmv5aawebwflsfuorusayacffryd.onion"; - s0 = "r3zvf7f2ppaeithzswigma46pajt3hqytmkg3rshgknbl3jbni455fqd.onion"; - }; -in -{ - programs.ssh.knownHosts = { - ponyo = { - hostNames = [ "ponyo" "ponyo.neet.dev" "git.neet.dev" ]; - publicKey = system.ponyo; - }; - ponyo-unlock = { - hostNames = [ unlock-clearnet-hosts.ponyo unlock-onion-hosts.ponyo ]; - publicKey = system.ponyo-unlock; - }; - phil = { - hostNames = [ "phil" "phil.neet.dev" ]; - publicKey = system.phil; - }; - phil-unlock = { - hostNames = [ unlock-clearnet-hosts.phil ]; - publicKey = system.phil-unlock; - }; - router = { - hostNames = [ "router" "192.168.1.228" ]; - publicKey = system.router; - }; - router-unlock = { - hostNames = [ unlock-onion-hosts.router ]; - publicKey = system.router-unlock; - }; - ray = { - hostNames = [ "ray" ]; - publicKey = system.ray; - }; - s0 = { - hostNames = [ "s0" ]; - publicKey = system.s0; - }; - s0-unlock = { - hostNames = [ unlock-onion-hosts.s0 ]; - publicKey = system.s0-unlock; - }; - }; - - # prebuilt cmds for easy ssh LUKS unlock - environment.shellAliases = - lib.concatMapAttrs (host: addr: { "unlock-over-tor_${host}" = "torsocks ssh root@${addr}"; }) unlock-onion-hosts - // - lib.concatMapAttrs (host: addr: { "unlock_${host}" = "ssh root@${addr}"; }) unlock-clearnet-hosts; -} diff --git a/common/network/pia-openvpn.nix b/common/network/pia-openvpn.nix index 363cddf..35cde8e 100644 --- a/common/network/pia-openvpn.nix +++ b/common/network/pia-openvpn.nix @@ -108,6 +108,6 @@ in }; }; }; - age.secrets."pia-login.conf".file = ../../secrets/pia-login.conf; + age.secrets."pia-login.conf".file = ../../secrets/pia-login.age; }; } diff --git a/common/network/pia-wireguard.nix b/common/network/pia-wireguard.nix index 101f4c6..0232dfb 100644 --- a/common/network/pia-wireguard.nix +++ b/common/network/pia-wireguard.nix @@ -352,6 +352,6 @@ in }; }; - age.secrets."pia-login.conf".file = ../../secrets/pia-login.conf; + age.secrets."pia-login.conf".file = ../../secrets/pia-login.age; }; } diff --git a/common/server/mailserver.nix b/common/server/mailserver.nix index 319c0bf..3b3c47f 100644 --- a/common/server/mailserver.nix +++ b/common/server/mailserver.nix @@ -33,7 +33,7 @@ in inherit domains; loginAccounts = { "jeremy@runyan.org" = { - hashedPasswordFile = "/run/agenix/email-pw"; + hashedPasswordFile = "/run/agenix/hashed-email-pw"; # catchall for all domains aliases = map (domain: "@${domain}") domains; }; @@ -54,7 +54,7 @@ in ]; certificateScheme = 3; # use let's encrypt for certs }; - age.secrets.email-pw.file = ../../secrets/email-pw.age; + age.secrets.hashed-email-pw.file = ../../secrets/hashed-email-pw.age; age.secrets.hashed-robots-email-pw.file = ../../secrets/hashed-robots-email-pw.age; # sendmail to use xxx@domain instead of xxx@mail.domain diff --git a/common/ssh.nix b/common/ssh.nix index cbf0833..9c5ab9e 100644 --- a/common/ssh.nix +++ b/common/ssh.nix @@ -1,44 +1,38 @@ -rec { - users = [ +{ config, lib, pkgs, ... }: + +{ + programs.ssh.knownHosts = lib.filterAttrs (n: v: v != null) (lib.concatMapAttrs + (host: cfg: { + ${host} = { + hostNames = cfg.hostNames; + publicKey = cfg.hostKey; + }; + "${host}-remote-unlock" = + if cfg.remoteUnlock != null then { + hostNames = builtins.filter (h: h != null) [ cfg.remoteUnlock.clearnetHost cfg.remoteUnlock.onionHost ]; + publicKey = cfg.remoteUnlock.hostKey; + } else null; + }) + config.machines.hosts); + + # prebuilt cmds for easy ssh LUKS unlock + environment.shellAliases = + let + unlockHosts = unlockType: lib.concatMapAttrs + (host: cfg: + if cfg.remoteUnlock != null && cfg.remoteUnlock.${unlockType} != null then { + ${host} = cfg.remoteUnlock.${unlockType}; + } else { }) + config.machines.hosts; + in + lib.concatMapAttrs (host: addr: { "unlock-over-tor_${host}" = "torsocks ssh root@${addr}"; }) (unlockHosts "onionHost") + // + lib.concatMapAttrs (host: addr: { "unlock_${host}" = "ssh root@${addr}"; }) (unlockHosts "clearnetHost"); + + # TODO: Old ssh keys I will remove some day... + machines.ssh.userKeys = [ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMVR/R3ZOsv7TZbICGBCHdjh1NDT8SnswUyINeJOC7QG" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE0dcqL/FhHmv+a1iz3f9LJ48xubO7MZHy35rW9SZOYM" "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHSkKiRUUmnErOKGx81nyge/9KqjkPh8BfDk0D3oP586" # nat - "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFeTK1iARlNIKP/DS8/ObBm9yUM/3L1Ub4XI5A2r9OzP" # ray - ]; - system = { - ponyo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMBBlTAIp38RhErU1wNNV5MBeb+WGH0mhF/dxh5RsAXN"; - ponyo-unlock = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC9LQuuImgWlkjDhEEIbM1wOd+HqRv1RxvYZuLXPSdRi"; - ray = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQM8hwKRgl8cZj7UVYATSLYu4LhG7I0WFJ9m2iWowiB"; - phil = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlOs6mTZCSJL/XM6NysHN0ZNQAyj2GEwBV2Ze6NxRmr"; - phil-unlock = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAqy9X/m67oXJBX+OMdIqpiLONYc5aQ2nHeEPAaj/vgN"; - router = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFr2IHmWFlaLaLp5dGoSmFEYKA/eg2SwGXAogaOmLsHL"; - router-unlock = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJOw5dTPmtKqiPBH6VKyz5MYBubn8leAh5Eaw7s/O85c"; - s0 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q"; - s0-unlock = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFNiceeFMos5ZXcYem4yFxh8PiZNNnuvhlyLbQLrgIZH"; - }; - - higherTrustUserKeys = [ - "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIEaGIwLiUa6wQLlEF+keQOIYy/tCmJvV6eENzUQjSqW2AAAABHNzaDo=" # ray fido - ]; - - # groups - systems = with system; [ - ponyo - phil - ray - router - s0 - ]; - personal = with system; [ - ray - ]; - servers = with system; [ - ponyo - phil - router - s0 - ]; - storage = with system; [ - s0 ]; } diff --git a/flake.nix b/flake.nix index fe8d979..a05c4af 100644 --- a/flake.nix +++ b/flake.nix @@ -44,97 +44,98 @@ nixpkgs-hostapd-pr.flake = false; }; - outputs = { self, nixpkgs, ... }@inputs: { - - nixosConfigurations = - let - modules = system: with inputs; [ - ./common - simple-nixos-mailserver.nixosModule - agenix.nixosModules.default - dailybuild_modules.nixosModule - archivebox.nixosModule - nix-index-database.nixosModules.nix-index - ({ lib, ... }: { - config.environment.systemPackages = [ - agenix.packages.${system}.agenix - ]; - - # because nixos specialArgs doesn't work for containers... need to pass in inputs a different way - options.inputs = lib.mkOption { default = inputs; }; - options.currentSystem = lib.mkOption { default = system; }; - }) - ]; - - mkSystem = system: nixpkgs: path: - let - allModules = modules system; - - # allow patching nixpkgs, remove this hack once this is solved: https://github.com/NixOS/nix/issues/3920 - patchedNixpkgsSrc = nixpkgs.legacyPackages.${system}.applyPatches { - name = "nixpkgs-patched"; - src = nixpkgs; - patches = [ - inputs.nixpkgs-hostapd-pr + outputs = { self, nixpkgs, ... }@inputs: + let + machines = (import ./common/machine-info/moduleless.nix + { + inherit nixpkgs; + assertionsModule = "${nixpkgs}/nixos/modules/misc/assertions.nix"; + }).machines.hosts; + in + { + nixosConfigurations = + let + modules = system: with inputs; [ + ./common + simple-nixos-mailserver.nixosModule + agenix.nixosModules.default + dailybuild_modules.nixosModule + archivebox.nixosModule + nix-index-database.nixosModules.nix-index + ({ lib, ... }: { + config.environment.systemPackages = [ + agenix.packages.${system}.agenix ]; + + # because nixos specialArgs doesn't work for containers... need to pass in inputs a different way + options.inputs = lib.mkOption { default = inputs; }; + options.currentSystem = lib.mkOption { default = system; }; + }) + ]; + + mkSystem = system: nixpkgs: path: + let + allModules = modules system; + + # allow patching nixpkgs, remove this hack once this is solved: https://github.com/NixOS/nix/issues/3920 + patchedNixpkgsSrc = nixpkgs.legacyPackages.${system}.applyPatches { + name = "nixpkgs-patched"; + src = nixpkgs; + patches = [ + inputs.nixpkgs-hostapd-pr + ]; + }; + patchedNixpkgs = nixpkgs.lib.fix (self: (import "${patchedNixpkgsSrc}/flake.nix").outputs { self = nixpkgs; }); + + in + patchedNixpkgs.lib.nixosSystem { + inherit system; + modules = allModules ++ [ path ]; + + specialArgs = { + inherit allModules; + }; }; - patchedNixpkgs = nixpkgs.lib.fix (self: (import "${patchedNixpkgsSrc}/flake.nix").outputs { self = nixpkgs; }); + in + nixpkgs.lib.mapAttrs + (hostname: cfg: + mkSystem cfg.arch nixpkgs cfg.configurationPath) + machines; - in - patchedNixpkgs.lib.nixosSystem { - inherit system; - modules = allModules ++ [ path ]; - - specialArgs = { - inherit allModules; - }; - }; - in - { - "ray" = mkSystem "x86_64-linux" nixpkgs ./machines/ray/configuration.nix; - # "nat" = mkSystem "aarch64-linux" nixpkgs ./machines/nat/configuration.nix; - "ponyo" = mkSystem "x86_64-linux" nixpkgs ./machines/ponyo/configuration.nix; - "phil" = mkSystem "aarch64-linux" nixpkgs ./machines/phil/configuration.nix; - "router" = mkSystem "x86_64-linux" nixpkgs ./machines/router/configuration.nix; - "s0" = mkSystem "x86_64-linux" nixpkgs ./machines/storage/s0/configuration.nix; - }; - - packages = - let - mkKexec = system: - (nixpkgs.lib.nixosSystem { - inherit system; - modules = [ ./machines/ephemeral/kexec.nix ]; - }).config.system.build.kexec_tarball; - mkIso = system: - (nixpkgs.lib.nixosSystem { - inherit system; - modules = [ ./machines/ephemeral/iso.nix ]; - }).config.system.build.isoImage; - in - { - "x86_64-linux"."kexec" = mkKexec "x86_64-linux"; - "x86_64-linux"."iso" = mkIso "x86_64-linux"; - "aarch64-linux"."kexec" = mkKexec "aarch64-linux"; - "aarch64-linux"."iso" = mkIso "aarch64-linux"; - }; - - deploy.nodes = - let - mkDeploy = configName: hostname: { - inherit hostname; - magicRollback = false; - sshUser = "root"; - profiles.system.path = inputs.deploy-rs.lib.x86_64-linux.activate.nixos self.nixosConfigurations.${configName}; + packages = + let + mkKexec = system: + (nixpkgs.lib.nixosSystem { + inherit system; + modules = [ ./machines/ephemeral/kexec.nix ]; + }).config.system.build.kexec_tarball; + mkIso = system: + (nixpkgs.lib.nixosSystem { + inherit system; + modules = [ ./machines/ephemeral/iso.nix ]; + }).config.system.build.isoImage; + in + { + "x86_64-linux"."kexec" = mkKexec "x86_64-linux"; + "x86_64-linux"."iso" = mkIso "x86_64-linux"; + "aarch64-linux"."kexec" = mkKexec "aarch64-linux"; + "aarch64-linux"."iso" = mkIso "aarch64-linux"; }; - in - { - s0 = mkDeploy "s0" "s0"; - router = mkDeploy "router" "router"; - ponyo = mkDeploy "ponyo" "ponyo.neet.dev"; - }; + deploy.nodes = + let + mkDeploy = configName: arch: hostname: { + inherit hostname; + magicRollback = false; + sshUser = "root"; + profiles.system.path = inputs.deploy-rs.lib.${arch}.activate.nixos self.nixosConfigurations.${configName}; + }; + in + nixpkgs.lib.mapAttrs + (hostname: cfg: + mkDeploy hostname cfg.arch (builtins.head cfg.hostNames)) + machines; - checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) inputs.deploy-rs.lib; - }; + checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) inputs.deploy-rs.lib; + }; } diff --git a/machines/ephemeral/minimal.nix b/machines/ephemeral/minimal.nix index 9c45a83..1aad4b2 100644 --- a/machines/ephemeral/minimal.nix +++ b/machines/ephemeral/minimal.nix @@ -1,8 +1,10 @@ -{ pkgs, modulesPath, ... }: +{ config, pkgs, modulesPath, ... }: { imports = [ (modulesPath + "/installer/cd-dvd/channel.nix") + ../../common/machine-info + ../../common/ssh.nix ]; boot.initrd.availableKernelModules = [ "ata_piix" "uhci_hcd" "e1000" "e1000e" "virtio_pci" "r8169" ]; @@ -16,6 +18,8 @@ boot.kernelPackages = pkgs.linuxPackages_latest; + system.stateVersion = "21.11"; + # hardware.enableAllFirmware = true; # nixpkgs.config.allowUnfree = true; @@ -38,10 +42,12 @@ services.openssh = { enable = true; - challengeResponseAuthentication = false; - passwordAuthentication = false; + settings = { + KbdInteractiveAuthentication = false; + PasswordAuthentication = false; + }; }; services.getty.autologinUser = "root"; - users.users.root.openssh.authorizedKeys.keys = (import ../../common/ssh.nix).users; + users.users.root.openssh.authorizedKeys.keys = config.machines.ssh.userKeys; } diff --git a/machines/phil/configuration.nix b/machines/phil/default.nix similarity index 100% rename from machines/phil/configuration.nix rename to machines/phil/default.nix diff --git a/machines/phil/properties.nix b/machines/phil/properties.nix new file mode 100644 index 0000000..7fbaf25 --- /dev/null +++ b/machines/phil/properties.nix @@ -0,0 +1,19 @@ +{ + hostNames = [ + "phil" + "phil.neet.dev" + ]; + + arch = "aarch64-linux"; + + systemRoles = [ + "server" + ]; + + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBlOs6mTZCSJL/XM6NysHN0ZNQAyj2GEwBV2Ze6NxRmr"; + + remoteUnlock = { + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAqy9X/m67oXJBX+OMdIqpiLONYc5aQ2nHeEPAaj/vgN"; + clearnetHost = "unlock.phil.neet.dev"; + }; +} diff --git a/machines/ponyo/configuration.nix b/machines/ponyo/default.nix similarity index 100% rename from machines/ponyo/configuration.nix rename to machines/ponyo/default.nix diff --git a/machines/ponyo/properties.nix b/machines/ponyo/properties.nix new file mode 100644 index 0000000..23d47cb --- /dev/null +++ b/machines/ponyo/properties.nix @@ -0,0 +1,28 @@ +{ + hostNames = [ + "ponyo" + "ponyo.neet.dev" + "git.neet.dev" + ]; + + arch = "x86_64-linux"; + + systemRoles = [ + "server" + "email-server" + "iodine" + "pia" + "nextcloud" + "dailybot" + "gitea" + ]; + + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMBBlTAIp38RhErU1wNNV5MBeb+WGH0mhF/dxh5RsAXN"; + + remoteUnlock = { + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC9LQuuImgWlkjDhEEIbM1wOd+HqRv1RxvYZuLXPSdRi"; + + clearnetHost = "unlock.ponyo.neet.dev"; + onionHost = "cfamr6artx75qvt7ho3rrbsc7mkucmv5aawebwflsfuorusayacffryd.onion"; + }; +} diff --git a/machines/ray/configuration.nix b/machines/ray/default.nix similarity index 100% rename from machines/ray/configuration.nix rename to machines/ray/default.nix diff --git a/machines/ray/properties.nix b/machines/ray/properties.nix new file mode 100644 index 0000000..31b43cb --- /dev/null +++ b/machines/ray/properties.nix @@ -0,0 +1,22 @@ +{ + hostNames = [ + "ray" + ]; + + arch = "x86_64-linux"; + + systemRoles = [ + "personal" + "deploy" + ]; + + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDQM8hwKRgl8cZj7UVYATSLYu4LhG7I0WFJ9m2iWowiB"; + + userKeys = [ + "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFeTK1iARlNIKP/DS8/ObBm9yUM/3L1Ub4XI5A2r9OzP" + ]; + + deployKeys = [ + "sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAIEaGIwLiUa6wQLlEF+keQOIYy/tCmJvV6eENzUQjSqW2AAAABHNzaDo=" + ]; +} diff --git a/machines/router/configuration.nix b/machines/router/default.nix similarity index 100% rename from machines/router/configuration.nix rename to machines/router/default.nix diff --git a/machines/router/properties.nix b/machines/router/properties.nix new file mode 100644 index 0000000..d635bc0 --- /dev/null +++ b/machines/router/properties.nix @@ -0,0 +1,21 @@ +{ + hostNames = [ + "router" + "192.168.1.228" + ]; + + arch = "x86_64-linux"; + + systemRoles = [ + "server" + "wireless" + "router" + ]; + + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFr2IHmWFlaLaLp5dGoSmFEYKA/eg2SwGXAogaOmLsHL"; + + remoteUnlock = { + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJOw5dTPmtKqiPBH6VKyz5MYBubn8leAh5Eaw7s/O85c"; + onionHost = "jxx2exuihlls2t6ncs7rvrjh2dssubjmjtclwr2ysvxtr4t7jv55xmqd.onion"; + }; +} diff --git a/machines/storage/s0/configuration.nix b/machines/storage/s0/default.nix similarity index 100% rename from machines/storage/s0/configuration.nix rename to machines/storage/s0/default.nix diff --git a/machines/storage/s0/properties.nix b/machines/storage/s0/properties.nix new file mode 100644 index 0000000..a55b7e1 --- /dev/null +++ b/machines/storage/s0/properties.nix @@ -0,0 +1,20 @@ +{ + hostNames = [ + "s0" + ]; + + arch = "x86_64-linux"; + + systemRoles = [ + "storage" + "server" + "pia" + ]; + + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAwiXcUFtAvZCayhu4+AIcF+Ktrdgv9ee/mXSIhJbp4q"; + + remoteUnlock = { + hostKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFNiceeFMos5ZXcYem4yFxh8PiZNNnuvhlyLbQLrgIZH"; + onionHost = "r3zvf7f2ppaeithzswigma46pajt3hqytmkg3rshgknbl3jbni455fqd.onion"; + }; +} diff --git a/secrets/backblaze-s3-backups.age b/secrets/backblaze-s3-backups.age index e499b8f1d8085468a3caa27c58a2a9c8d5a92410..b5f168e82f05b1f73c6512e8ccb15f637e74ab40 100644 GIT binary patch literal 1088 zcmZY7&FkBA0LO9NVQ3U~@FXY%@h}&WHc1CM zJP138C^+z^c$tEz$b?~$|&6fkvU{zU(9Vt;gB5|>Wq^nYD7>6&xfsW z4v{znbI0bkYl&^f`UEF4Ug(Knyvj7Wh)p@i+(g7lY=D=?HHy&z4$-!0S#2*Q#=JY+ z6souHT6xOiBLh=un_tBol{o^bZnu1bh-^$~{4~tdu#W2@Ra-BJE0m$kg*OJic!qk~@%?OOf zmgD9^hd!i50L(H>ojqM?1VV(1mE4_0rC!h1g#rg_F6;~seZ^J!ZA(-)U4rKfzl8tn zaO{)+y`&r^o&(4crm8w)QUbph#=D$yxvt!eU9J}UR#2_DEvGLKJ{Z!WQ$^}z-cl^8 za_vHEORhPP))w6Z@=U7+0ga3Lj{H|^z}&YBAAL%771Y3|!jn3BcFOqZ`Cy0?0H4{1 zp1rUV%_8V5ca*)5EjSYfm_?G*NGg0t%!xow*vViZsx!$WqI?Fsn<}7s7P5*}3A3Dz znC_Z90|2lYq|s=goYoZjc0M!46S#q+jUje6g_JKw+Xb!S!fd}C^dw#2?P`QPuYLdY zr=PqoJubbr{N~~7_mkf}$iDURSLU~yGbgT{yO`bi^Ts{w(Mx~ad+b;D>a*8AU!HpD z&X*s4{Ps_;A}?T<&%EOpKREG{Euvu&Q7j71Mla z=Rpp(Yugsk&@Rz-+#r>!ce&gpLQ(ZpG*&_ebLR8$bmw>nP1|dX=qG+2vt*>Lg&k4B z4pbky2Q1sg+2fHsIyV$!a-p3w-a^42o4Jw}q-XD-*!P@?{IRwbrgV+1VmS7g_v4_ZB4#4=+6=6E5RzQU5>sUcpfk&afW3z!&8i<;p+p6|63a{BpooKMO4pV>q~#jwI@2lJ-304Vqs%Jjq&;>wB;BeD z%Nkk3aK%7`rxt<_hM9Vh_R2=g;FDV1Fe5Ml3}n7q%>8t^4O6QN#~_R2IhvAKoiDuq zo}cg`>#}G*6=uCPTFG&$CLzsntv;tx2`{HkY7PQ@;}URAjz)f&ts78kPHLUN(Pjg5 z%4FaWj$60EEbUgFoY|u?SsT?firSdt^m@4`a!Sffvxh<`0d5i4$tJB5GX%beGZnF| zEGS^B!?!3b7;B%iVop4%O}m)@nE>bOoNS~4c@P(Slq;PQ z02_m(*TTo`4C)}V+%_N_vzTrglYLd=tU&6aXA%P6Wx6w#*$0|Tjm@BF0BvE81(0*R zEsd(p!Xs;LMk##bB@-<_wwL39#S!8Nq6@4ic>|x1R!E3<>K@~;FDh9bJ0FJeT}(Yj$(`#P!WHpD5p-eupF8yf*yoo_PPK$Iid?-47RE zISYS&_1!=ICLewJefj0r{<%lD-(30nqdTW=-v0It^CkPq7q0@Zf3>)t-FWVC?zh#4 g4?X ssh-ed25519 xoAm7w uMSr0mNTntr9oRqEtrJ+LJKBxI+s+cTbXYAag6kb/hM -JIylg1Xg08Ar/AuaE5e9O3qgsNAGG48Mw/Zvs8fdGdQ --> ssh-ed25519 mbw8xA ngrNg4m5aiqUyudZ4Y4Y37ApFDXxq2UBOrbEajIdBAg -1Z9hKOwNYe+o64b98WTXR30s8tv5geRCRIKe6Y6F35Y --> ssh-ed25519 2a2Yhw U89mACfmGm2hOOHZfvVfxkWX2G54D5aw1shiyqC6T04 -2TVJ4/do2jbEJZHegTDO8Q/CiLNNT0f3GpSpEWoIHnM --> ssh-ed25519 dMQYog BjQXtlw+fWSg2mzdbvpZdgU/UpQnByvj8QY2vf3f/Qg -S/OFhJGyj3YhmPNiOcmAAAnxkzMwt7PnVvUxSxNWYp0 --> ssh-ed25519 6AT2/g sgzaa1V1+i3ADN/Lgn8LSCL1Mp7tCmNbG6HTo25qzVs -q7Xfxu40RzjQORhZbGfq7U9FolNtWo3eDswxVUJ9uRw --> ssh-ed25519 fwBF+g s3FQ1pwQYfGyQcQAtlpXFNA61BsJrEV+cDnBGot20ic -M74z4r8nz6JvaougCsnyRVyNvLWBtwqhwGC6Oqe1YzI --> ssh-ed25519 yHDAQw XXxh2eQf9tCEQyZKAppYu9M/EAYbsriGR/xK/ca1hE4 -GoNmSmuzuaD6DrhFD4vv+N/K6ySorZQXHqkEy59fFa4 --> ssh-ed25519 VyYH/Q X83OJlxNPRG+kRylIceDDE3hzs5BjbLRYTa4A9t76UE -fdZcV7RRzKxeWQrniKT53UlunCWAuWIP4CAxeIHHbX4 --> ssh-ed25519 hPp1nw eIE4zQqBKr8SIW9Uqxn/HqA/wc4GIrck44k2iYbwSic -wjemabf9WrL7dU0H5T32xKCW9FYogTuA7cTCZlVW9yU --> r|n4m-grease AXlh $ozYI bvs$" -AKr3E49skiQ2WLy320wi3qlafLyGnLTjCvLHz2eK3A ---- qtFNqGCcR6VAQnbPg7n52u1aJYJUDo9lV6Qnz/Y1bq4 -+\ mUYBa2$7Qx+UyiMo,V 1WR(坴e5qq8 A^}C7D$3 \ No newline at end of file diff --git a/secrets/hashed-email-pw.age b/secrets/hashed-email-pw.age new file mode 100644 index 0000000..5ff6644 --- /dev/null +++ b/secrets/hashed-email-pw.age @@ -0,0 +1,10 @@ +age-encryption.org/v1 +-> ssh-ed25519 6AT2/g 93Az2iuqeWL6H/S3XDPXFoEPcrY/n/z9mlSNb5wABkU +LpMPjpDtBrY2aHpqHwT5AY7vtsYHNcOjpz+LFY4TGCg +-> ssh-ed25519 dMQYog 4qT0aF1IHsTtN1avMPWYG5Az2xmEZhVUhqcwyNFdfU4 ++wD0hE035JqYdDgJmkvNXwJyMzXrquA+RsD8QdK3xP8 +-> !vfM7-grease +7nQGFFUWY9UIjfrb+/VfaG0zJ21zmDnDh5khs/0tioJevrrrlhub9Bz8iM/Jsfxy +KUhwV8O8tL/5+30RFSlFRaAB6xPCGg24Yq6E +--- jVsDtz2xpvK/XCHcdN5JVZx5zSxyEAM6D/xJIgN4YfY +v.rK,$ w#VoRUQ} %ri]wnbћ; X3-M}a|.߰EP \ No newline at end of file diff --git a/secrets/hashed-robots-email-pw.age b/secrets/hashed-robots-email-pw.age index c986cf134fa64724fbd15f27bf8210d9649d2c90..2c35b06b0a86f928ec233382bfeb5204aa57cd7a 100644 GIT binary patch delta 468 zcmV~$OKZ~r003Zy!Zcn583QRY=OKo)c`aqAq)GGYvLRjU_u8BJXV-yh>9Tf;F+ z4FgOd0-g6kxd=}u6Pzk>N0tzQsZHoPHiu>$#ydvNem)V=)|RP07FN(ieNH5 zb!tIOh9i|ki$ke}@;wD*sZt|#Tj8k0YBB{t5LB>5bFY{=HIP$4mKdNO-Lp7f-WLPG zA8`5LKmH`p+LFzuUjw01q~PUVHWD{`=2si_UQV?#p8B<5TDC z>LH>oUtD^7Ou&W5-s}3&-ydV?$!z%zwl19Li};ZHuo;~Dx<1^#wSM#a%YVz&(=+7m G9q&J1#i)V+ literal 1327 zcmZA0I}76k0Kjp%F(|%p5FCOhD1@3vlQ!j0Nt(1tnxuI&uflQUoiu5a=AGW)AgHs$ z4X%CxPgHbpI}ltH70&VQ90WnZNpKP!`w4#hhrb(#lkntMW7(v|>CK{w;SL2RZ-aH6 zOu_&o2y_7s1$CVFU|y;eJnhi+rgjJ34VyJ2@P1p<0e$Z5c5S3&iB3^ixk$i;Q=1&S@A?CY=|J-rNqi z9Lj5LaNO}iIU-a*ooT|t0YCE`zl{ky?O+@sg^eVMfrg>OPEGmsb|#AzN8+|zV*Ry- zxtNpmAmN)z&07XcP5WqXi2kNLNfNuQ_UJUNG+iPSQ-a|->T5t=^D;Ce*nWivc9aME zx##WRVWq3yDrgyUe)f{FIBe^!bFBrE>J%|JB#bo|hStb^x${~mq!CWyGd9}GjV~e_ zbE{VFP|^tP0ENG=Eu*Oncs;sGgER74W4k(!65Z#TvEJisuqqp!koaqDM(r>-2IpDl z&ewIWQpbx(T};KT4x0>fXE{9J z>&;1EElE@NSU1-gk-FBRo?byQxV0134PuPrr~_n>1}eI;jZd3Rr_bC=O`k$Uiu58l zVk9sZ=a^XxS~m!#;vHyB%@9WM8d==yg0gD_(om@^m+2n4)<%w@)E=z$##W=uh;V#J zM%R~BKfuK_#4Z;h_s!M9oJj_>Qk8)REX{S{Xi3H%AL$F&Y0Y_ja;khdR&GIu_WQ`?C*IJ^K=&1+Uk*TIO+b|i9Ib3PX_8B`B z$Bkpdg^+BkJfvojK--3e0RB$q*EX%PHKkz61~T0P8mV}UxSp@)^^}v$0^|H@$^YMW zdlFZnTZiB+)_pAv?}F-`o7ip+z7-kyQVu}p^*buy^3zjp^m&Bm#L~vFCAL}_OGp&X zQF~OS#z$$I-ca4R3^*ehD{tFi?LsbTIM32*(E=+CD-CxWk2DUY4HgpV!g4RvGO$oV zBu>$hmL<&eq%CPz<$Oa1Kg R2k+ke<0tL;A8!49|6c+KwhjOQ diff --git a/secrets/hostapd-pw-CXNK00BF9176.age b/secrets/hostapd-pw-CXNK00BF9176.age index ec16ba1..a23a23d 100644 --- a/secrets/hostapd-pw-CXNK00BF9176.age +++ b/secrets/hostapd-pw-CXNK00BF9176.age @@ -1,16 +1,9 @@ age-encryption.org/v1 --> ssh-ed25519 VyYH/Q 3383IYDpr6jhePY89sI7RO5KY6i5Wr/Miy4Tx1IeZEI -Z4nN390wcZiDQCEJvTBD+v5LetZpjdcVhF8uYIUSkNA --> ssh-ed25519 xoAm7w vO5L5G+aDSXJvD5MLKHtdfo3Ypd//vl7uO644j0S+ig -LRIiQOSb4M9FItfqci10ELYgzkCXhOBaWv8iz2He6zA --> ssh-ed25519 mbw8xA RxxUEOVUfKZyUM7KkUjMm9Z+Ts/et15dMxJm4XVKbzg -hKS82nZ2v88jqxGW1xprsPk67Czn+PLTxIuOrlgXkpw --> ssh-ed25519 2a2Yhw FRSIexkNO39x9h4wLVKscOmBIE5I/rOlNGfX+MdUfGo -1OcV1pJ+/M3wtPnRMDxgcpnsyeFYBqBe5Gbj55dJiCY --> ssh-ed25519 dMQYog lqtpfP3zAArnAF2M9MtUBhFymnG2S15X88YcW949PTI -2po8qHUuVbMIzrZ+q746cb9BQ06emGowJJcIGHdHeH8 --> aH,?XIq9-grease ]Y I]hNq dZyR2f@@ Xl"1A` -U/BZHrNalVSmBUEekZbQ1w95VrFtkskMOuI5lm9thRe2bvTe7Rue382uf0fcfvSE -Jq7+f/b257KiFaUg8Is1WNNMY55Rw0wrnv9yIBMESxCWmgo ---- rUwKbA9SH9XIRdEXLhDIRj+mEu7BV4w7EwkAd4wZPGI -@S*i(jW(W-yF ΃9 \ No newline at end of file +-> ssh-ed25519 VyYH/Q X+fXLJz227KkBLu45rb9mUkkIpENSMtZeEJjl6qj5Xw +AFAFnvsiogoMMwsAJO0DDoaizL9lmCLsF4QHDjmubr0 +-> ssh-ed25519 dMQYog P84+7TBcMFSALTn6FR/aXyqFE9DfOzp38ImkdWj7nE0 +PqOn1OL9Zt0x1pBIYOSKkkS//mbk1OX5pnDGp+OLYeI +-> @?-grease +3JvpmcTxdTgvv6vPL8dXEwjR+g +--- aMYF1SbC+p01YWmg24+Ih78VPQcwzGU/P1cEfgRvXV8 + @$sQ¼zxkNfu; vI0^4.?, 8 \ No newline at end of file diff --git a/secrets/hostapd-pw-experimental-tower.age b/secrets/hostapd-pw-experimental-tower.age index 6dc24570136fe930c16f58e2f75d060dc8c00841..ff0780505420441c99f47a10b1c37f9adf868671 100644 GIT binary patch delta 437 zcmWN?J&%)M007{qxrIfS%WZ~P#1ODCMIC+P-`&S17c!(7s$Lfs&Y;TpWzC zH<;)TaCLBZGA72s&E?|Yc9*yr2a`sh<@t1UbMNJ2%U?**Xq9cthA97!-!iE)UK&Z^ zrgLA6U67=ekyGl7ED(iCBtHs-QJ85gtse<2WkH182n&BVZ>bz_?yiXXw(}$%#^#R35WRr9-DF zragHH5q@&??co)Q@2?Mc;VY*nygk2vx_fP(9RIxj{N>H!aQi|0ZoPl@{9SL=JbuyI VKluIV&(n`TZsK282kvim`w!C9n!x}7 literal 710 zcmZ9}yAG330Dxf~j7g1~y9^E*f)pqP77etNQlKqufx@6UP~gx)xs-CLlW{hVCT{Ld z4n{{47ZV@A#K}z;7mb67M&sBg`10omp^y1{uV}L}O82+ZBE&1AgWW+62Z;F_lBNj` zFqtV1B#-K_0)<@Vzwz~(GG4rSP#`z(8H%h-V!Yx`k^77Yl&O44UY_F zAfCI2?X+^Y#9WAJPo~tNWDFCh22)#>;dDnpyQ_{4olrRW08J|ml}x(NuQP`!<5`>> z_de{(s$Z`e%j#=O$ZO{s2}m2(2;7s*7^sWcN~L*9afU`Yl$9heNhh04C_R^o0j>Ib z%hEbl&?sy~l$MXu z%hacOyGIQiDuzo%qSdp5a=k5BFj=>?*O5o6YUt~kcVvn=xfD6-Krr3PWUDxjHsn5= z)wEC>z@PvB#_*}VzKMl}4-S53YMs%Jb9p&)$vW!=IOL3HM&T cdFo#NboCv&;=Vtt-~YMv7Wfy87azX;1$$BIS^xk5 diff --git a/secrets/iodine.age b/secrets/iodine.age index 1d5e29b..3e83fb6 100644 --- a/secrets/iodine.age +++ b/secrets/iodine.age @@ -1,23 +1,10 @@ age-encryption.org/v1 --> ssh-ed25519 xoAm7w CP4pzePo50HW4IbP92NiCEhe4fz6q69c04nZzY97uls -q0ZLpztMhRToqsr0yWpXJG2+7ExjDW2xQuW840gFG74 --> ssh-ed25519 mbw8xA L39AxT7TEaPo94c3SPwqsLk6fgvasrU+RPKQgXZXXnY -6AvJRJ4dtkgCWd+f2y1hJ0nfNz2u8mydmZ9Ymq7ZLZw --> ssh-ed25519 2a2Yhw tJFWqpzbukVDKXmaQvUA6dbdUzguxphaDiZq0+2jFDs -DHT27/cLh2cBcQHOXuV9CyYV6+OEUIuJ5nBB0RYslXg --> ssh-ed25519 dMQYog Fba2ll/kUWO+4KnFP/H7UUikcxU+KpBYvJ1YYbsrom8 -sew8S9ajmoB4uJkxRkLVJPvayYh0bz3IxK2gE8znfl0 --> ssh-ed25519 6AT2/g xsTbT+roSioaX4C7i2/PtmC3sXeIv41y62X+vBhmJ2A -Ju57nxnIXuZTflJ8Aknc61vhiKPOiT34pDaeoGJsYgo --> ssh-ed25519 fwBF+g V0DzCK8NAs2hSeILNos3Wafh2OfkzphGc/+UHxtqFBk -dbExOeSn87sZD5dapKB0qoZjVK36SE0A3ww1S08qeio --> ssh-ed25519 yHDAQw O3FaVzF4vvoRoUoF05Mr0yTIcDbJ2gdAVsIHKz4tFCk -l1rYVVZyNlRfYXPri2jOwS9IUwIEI02lRSw8L4jjjeE --> ssh-ed25519 VyYH/Q CHERKccp9OVM0zMn4EomXJkW2D65wvPOz9V5dshBGD8 -dyxEW+Yzrq+gn2dQEbdNejX6RKTCz0ENe1bWLBb/wEk --> ssh-ed25519 hPp1nw wND54MJv1efUe5HkN4qRlnuX0+BQPYn69YYxPQExBF0 -zZB7mIDsgKmpTz2HtU8+p2UeG98a1cYD72gjoPraFIE --> X6XuI-grease DM 71 -/87RWErV1DecX+zr2HLnmri/cQVoXYcdcg7oPeCmIcY/3g ---- KyKWk2cIfo7bc9RVzjYYfQ66omtJUJI4ite2z9eXa0k -;1^Dx ssh-ed25519 6AT2/g yTW46JmDIftcOqogIDjheXJf2sw/dG2WEJxfCXU/LDk +0Co5/Rn22kmdcPr61ZOrmZJbPFHx2wJ8/YkbDjcjqKo +-> ssh-ed25519 dMQYog RtZT0PwVL4kxUHilOhH2GBp8Z9WfyBkaxB62pjKpHA4 +muMlIt8VYQftMYacfdnQFeejfWpKTEG5gxbFNy97GTc +-> 4|)`7yq-grease P#\5k8 +f +jMegn6ATsj2Ai9B5Xmy+tay1nppwxvF1IGJH+hLNanYMsTIDZypM6UsNdzYQ/3mw +VZ9ooy8TKUgAJ7jsd6IrKw +--- tLaPQWJA0Hh5MrxfhaySURgY02K16IlzvsxKpOWGva0 +5?l'!VNx+cA9l/|S&}Q;_K \ No newline at end of file diff --git a/secrets/nextcloud-pw.age b/secrets/nextcloud-pw.age index 7ecbafa..8459ea4 100644 --- a/secrets/nextcloud-pw.age +++ b/secrets/nextcloud-pw.age @@ -1,24 +1,10 @@ age-encryption.org/v1 --> ssh-ed25519 xoAm7w nxbI6qoO7i4zsLRqt/7P1+sxrWy+iqI/+wpG2gAe6TA -Wt6xkwHMhfwsJ7rtH9PGjVhR45K0SF27S9uR/SJeIzw --> ssh-ed25519 mbw8xA cRw8P7vAvbBzAT35551y4NodC4dgzRhSzXRmckfKCjg -aVVupspcV0jG8ycsXuoW+9lTN16MN7a5jTcLh12qBg4 --> ssh-ed25519 2a2Yhw E+kUd+Y6saJx52Eyy6MkIuH54h4zUMWRe2OwvIYsqC8 -xogfXlNu17ttnxElUI2Ya3Rc8kH3Ajk4AVnBnQ/slfg --> ssh-ed25519 dMQYog GsLYEBZmG9W+1bUPZjGyo1I55x7Xjp18z6D6EZEYZl4 -7VE5glX6in2Wna5sBwP2B2gPewyQ56/yAdMkSsXthaU --> ssh-ed25519 6AT2/g 2pHPOxQSwa7XNhPLpCo3b5VkD7ytu0qsfDE4PN3KQ0E -vEj6igHfl5sQtVUsHXmdNtK2VQin2dDb9XOrUFhyahY --> ssh-ed25519 fwBF+g 6xUfafFpXs1v6PzSBR2q0KATyx1QB20oyZUghh2lOlY -Pzc+lgRzzG2nK59ofhsudsIZyfI2JCHxLjyZYGYcCFo --> ssh-ed25519 yHDAQw bzxN6gY98TJjX0tUzT9fkp8FohD1PR17JQ4HsGSEEkU -Ws5f1wVhJgd7LhWW1TrUXrHiggX1J77It57EqTTBqWw --> ssh-ed25519 VyYH/Q qLxrHDC+Hen/oSivOuRONDZbF/wwIdEYD2Ci3cn5XV0 -qgqRuHSTb0gETpsZj5oJ3RmNEIlgRolmfVIO7hZ34IQ --> ssh-ed25519 hPp1nw rXaGNPqhVQfwR7ZxX2yPI+LXmiJvhoIouFRwPAfUnR8 -RRZCtJSlBGaK54l4tvJm2LT7UL/4yiEBE10adx0j3kU --> qvCWm(-grease /[nA+Vkr d_!rw< 6 sgv)( -UZ9Y+nrSjym+veC9SbnQjkRZmDt3UTkSbtx90slbmrdGIAJ2zLZzRckhriF5z2Jr -9FPuX356sGdy0XGWoUzWCqvmzByL9KIftPY ---- huMR4jZ8uXzj3YnT9sG5EeUTsZyeTnfBWHs8U2CAWMU -JA 1 +SŃHaqT9"~ںV`IĘKA}h[Iu/Q(*^H3:H@JJ \ No newline at end of file +-> ssh-ed25519 6AT2/g hXS7zxzYhlu5GrUAEAnaO+CizpbifjDxIwoAK55cjV0 +xU7Z52cjARU8tmd1AJ9v8+QTQzfL/mNxP/f/bJAzYvo +-> ssh-ed25519 dMQYog 8PEp5TmEOumhWUZvko42sOKpkqOCW9/zCrMqn+fJ2ws +wJo8x6+hyU8iJkTqGVecZ88hG661F3ZvEvVqpJzox5w +-> x-grease tdW'\ +(>9 da%@^H6 +q04xwjRaNOBfNhAvik762vJHio/qTfR6qQW4QsD+wzEidRYRggNdQwTl+G4jkWAu +fx0xZeiI5qVm6WG8lg +--- pHx5BdqI3HubR9wAtPyfMaYbr8uqRwOS1qFJhtC4wuM +vg9sɡ6:`Nl`.PebSNn8C ssh-ed25519 6AT2/g J3H9xUUwUMB7VkHHGtsZaCm/GiyqTFUrEmsuwcrgrhE +tn+zbj5cISZzkUzJcu7JlaqhE4Dr4fhczSJU2kV91AU +-> ssh-ed25519 hPp1nw 370YNPQn4mqeHjOvnIXkm+BzbrRNHkFICJaJhHCSHDQ +WLhDRA8jp50aKkY8t9GvyAHoLxYQD2Bhw3y01hwhoOA +-> ssh-ed25519 dMQYog 1dwQN8hmbLY54OnRTXtcwAXHoYLLNV0IK/rQQ9ZgV2A +gP2HQinVYW72oJRFW69qAeF/iNEEtJqya1iRMOugNKk +-> ~-grease 2%p4s G:$f41y " vZ87PA*| ++hI029392lrjxlsXUI8opFVcUK+JOjgBYGMH +--- juX+tgNpNr8it5QnbcBkR9u88vZkC47L5fIlZQNxPYg +,J}}YB%o~3M׽Hʗ]n0cVs(;axc#ov'k#]oN`Ɯ̿ pҚKk0( \ No newline at end of file diff --git a/secrets/pia-login.conf b/secrets/pia-login.conf deleted file mode 100644 index 3624602e8fec6fda5bff9e19a812aef9d5748a10..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1227 zcmZY6z3bz20LO6`Jq!rqqHqpzIUhHf1ZRdHm*~P13Z@6TjI> z9o^g<)I~Vl)WPv|a&vPQL^%;h5gdQ_7rgkqKR$@3aTzv4eaWiwe$@b^#h~c}_IN;I!+&uAIXW3Hl*Rs@odw z<6hdq#>SwMGo5ZbN~(j2Ys~qexzu{t?f`xA8Zav_y{sZfk%5vHWk;tva+D|O)>ua@ z)&hl=X9TK|*gV+Ti^Qi0gqeWbTC_2|3cxd$s;XKnQPNh?QCwq|C^RpqQgG2@!MB9wZrGk9tvb5Y*Z4G4 z*Zick0hSDBtXe%+GU<3}0${#TIkebmTR-Af7dKX{OfrIac`O(VjP(FeeklaU9pG(< zq8Y0&tx2P^*g-YCy@5mnU0af;afrCfIKLe=HeXMu=SmK;$Qd2nSYbR7>nu%YhbGvY z7&wd-u`oGbs5gwN?zC_Z62hAs9mHLji%@t7FNnzAC@-xNO!$Q)MKix~G+MDbl*rZu zTdn4|e{%*;MhsYSw*`kFYhh{fc!kg@VX(-=&o0CmWy84jcR?&xd1+Y;#Fq-aYElZU z6r=W4FY`Mg*{Quhrd@Jk6MM7OGLV5Jvu|suUSnkk$6#w_Xu_7>}&5%F{HAKKoI`-1&{TX=ov zI-PaLh>8j(KL*o!+wzB1ST!G%J^@&sCzj$Z=J ssh-ed25519 xoAm7w YfFXfkiV/OEhL9zmHK3bioQUUzlu9DHyhbzxenTVWWY -PY6ykXYKNxfT4IMIvsdyEg+CMzMllPcacboJ3mj2CXU --> ssh-ed25519 mbw8xA dMVsqzPuMGCSxsjwo0HTq4O4ayY8S0C5UGJ5STaiO3g -YwY4col/fbt5gQF4GBfGTJuaCYEDQG/yPLuS6TDTYAw --> ssh-ed25519 2a2Yhw LOwqoLJtGV4e/vd9h7ks+h2Cu2AcfPs5fObQBjY1qlU -p4vpGEBh1ucCvwwfY+jio1eqZLaz+3UNc+k8qHwvkIc --> ssh-ed25519 dMQYog spGr30/0nW6I8gnlDXB2fNiNm6mW3jVdV0HxbAYOtCI -GEA6ggfl7yv6XYj1/e4wF/xHOTgfC29vXwz3N4wQnNA --> ssh-ed25519 6AT2/g ZA1c7ZNBdi/H02k+LhBol39RoX6uXqvtlAbePJ6/rQk -cgJTVWDBYdfT/4tpjeQLkQlmCh0h42BKtxC80a8RGqE --> ssh-ed25519 fwBF+g 7yzxxo42BMU7z9LWd2Dzo9rq6utpmLgNIy3mUuvIAXI -dazG882otsFAb4Qo9xeG5zM1Xp7LLS6d7eAiQ/ucMsk --> ssh-ed25519 yHDAQw eKxZ3ubH/St4ADh9/V6K04TqJWxvp9Oc+1C4MSFlkgk -p3yCmtEsEieyBHuggp9DbBsSm7xKbevnJLiIbmJafEY --> ssh-ed25519 VyYH/Q sqoBr8012iw3O72fw6fTcBrq6o5vfyAltfO+tqBU21Q -ELlo9KI0y+ixRylkWnDR50eISvGsX3xzwP77+OBhrhw --> ssh-ed25519 hPp1nw 8LfZncfhKV7QKrglch3Sx+/4zErTmdiVSL+a3ZLyzUQ -DlU7/EZaTYLrlUu+Q4A6qDL+v/YKD3JEbCfZkUJ/bwA --> V{dl'-grease `i* Eww uPgzl* f5zjP; -PMMK0yN9kZ9R0+ZyibiQqtJ4kXMCQEqY9Se/80nCkY7zvg2lVHq6UJUD ---- IIg4b0+vVeyISKd7zkVovNeCsUkkX/DhZMDc214vwa8 -ȀISޖjSp^`5S-sFmLe q]9Jf?T7A0KzZ\Y1@htn- \ No newline at end of file +-> ssh-ed25519 yHDAQw LyoiocIPWoX81W5lD5OBD5P48QC3CtVHmpATJTfz70Y +fnRfSV68RLkMc+W6WX5aqxMQxDz7UviTNQqB5KAtKYs +-> ssh-ed25519 dMQYog nQ49ARJDvvVmZEQu1YlYKGba5Dh5U4bGKsLAZfPDqUg +9Rs0zISa1FDT3ngBBwp5vXi8aR+a/Z+BrGIEKVUJWkQ +-> ssh-ed25519 fwBF+g Zap6yPIuauggXP00/It4kYJV2G539vUblQsfwgVzVHg +83K5JgUeHjf6lYv8H3YvsbBzrFOgsQyqLVm4h5Be5gE +-> ssh-ed25519 6AT2/g 7QlvTxNNubo2dRwVwfjxr+9MOge9XIsrJVLeAtpkewg +lxzXO7PIKNzrKwj0KhyHetavLM3zqjbXu4h/S7tDJns +-> ssh-ed25519 VyYH/Q tfgTbXGhdOru7FyVWPVf9tBLcuLZJQWnWZkL8yOjQyg +HIKUKzWhEM0PD+EKpI5asIwQF3Lx8CYeURVce2QAMZU +-> ssh-ed25519 hPp1nw xHd4/TCZAi/zwSL0fj7FVGHkykKAmvh29tJReIAUDFg +/TrZ77mu8vGmudrrPkDgQPiLr2o84lDrsVgY31xMHUQ +-> ssh-ed25519 dMQYog 20tuoqjWl4dQBpEKiiSrbEmwW9ZLml3F8MS7riyu1GI +I/jrnGVCw37hxoKnf/yGPlvGlXPXy+c1sz1ouY44KF8 +-> 0UxZ/o4-grease V+d +VgDtDiYRn+VzFbhXGHjOTbdN/V/vSW7STbKquW96A68DRzKH6yDn/4Ia4tX469eA +y6swdFIvbsPFnldalFKxKhHqjKRSJPLAKeWECe/I +--- ZEnygego6ke0cW4acYxInaRQXXOaKoSNklgTn7KPOfg +ZP|>ˁ+:Nd*Pi+3G JbkcF<0zͽ`W/24{O"FjS^f_ \ No newline at end of file diff --git a/secrets/robots-email-pw.age b/secrets/robots-email-pw.age index 2432e880d684dfa97484de73019ac570684d2c77..e25a5d85278d03818af65dcfe6e9f5675729ed65 100644 GIT binary patch delta 496 zcmV~$OK8&o002;i%2+O*WO|F>L@cFA(=^GYnx;vU=F_xY`iZcvN!ondm^A$)2t5db z=s*~r3Mwe#Wga%Xc@vyB(Th5^i>NS9;>D}){akx?_R+@f$;xW0#s)gp;1D(I!o5h0 zI(4GQ6f67y@@Y@w2*ZGOy&fOt?SofuUsu$7&-Z@4Klk8*`EvDc@^Am>;?B;&nLX*STzL5L-G|G6?icn? hzb`LsZ-0CI;`sD)MY?kSi2c3x^i#aP^t;P1{{ix)v*-W- literal 1253 zcmZY5J?rCi0Kjoa$)q?5f)NFW(rc5ZNee2bN!lb$^VmEdf=Qa@`SF*>Znt>g;wH*1 z2X1<^;Gu&~a)R%`SrBn>lmivVzpvoK_v?niJShBTs@k|L?v+ir=n-iC9t=P<4=(6> zjcnnuBy(bbFPuhig>Ks^X>6C_K%DheYRr&~lMLn5(O?92bmOnG!9g;@)LTkN{C(ao z9a@P2EtHqZD~%(=rKS_2W*-yB1DS_+wcHyvBMFycEi9Y-uq&EnGX%J@+TDsFv_>P@ zx=n8{vcrbnQc<8Sp;!%PWXV0Ih_+M#a2EFqzS?DzeQshMJ7iZyYv1mx6N z+(`q2jO|mAFS2#-wPRonceTq&`S%>m@W)-UNr28T5ZytxnvR&-x;KSmIVnt^-liGG zi-~j^ZHTtHPB|X6LM03X7$=KJ$<1v-z(}on{p5IOTfWG`4Or=24JXg&B82rYSOb-m zf}-#u%;&Q#iOb}&OvULeF+yh0xEZ0^qCl1qir9h%uGd?P)1yNB%xYW)fIX1wj+g?n zP<4V?U?9wW{jPQ$cKcZfFH#0q1vHE>{p|N!F5~5T3>OiOjuyVlbj%-YtGSws41;uq zUXn7-A*ksKSkv+R&8y8eSFf=uUai?o4>eD4tWf)3+r-kOGQjPQy{al`5i-RFL^9&W z)~QO|3r?JZeSk`C+cM+Xw!#65Jx8DHVTBmNxz5}ZdXdnfVRfm+1!^+bydt77cc^B? z-EA`_n_VdI;;@r<2g}{7^)W69Pq?|c$)d8&DITL~N{FUXE$Nq5#~_MN+gk{RAmMS| zjcAWMcvVuM(Tdz!)^N49si|(gNj9;&S|nFUF~E{Mj%=m#u0vGpnQyboR49iZ?d*8; z>Jgt;VjhZHhCf8;*@ZdPR4|(zh=gW_Nd6RkY&OJc<{o-SE|JHZmZ%=>y2Npi0 AdjJ3c diff --git a/secrets/sasl_relay_passwd.age b/secrets/sasl_relay_passwd.age index 1a619976bfc5ca31ddf9b5da0c57e88a2dbf24a7..430f39528a5ed5cd69b3c972a9a2b1419ade6ded 100644 GIT binary patch delta 1189 zcmV;W1X}yL577ybC6nC&2Ub{TXES6|H)v2sbu>6_Xl!stNeWCWeWk+{KQekp8b2Lv-OHXhsb5lh^Id^n$ZCZC?XGdgg zlU@NBe`rN@ayW29b6Qg}OJq4%XLeU?PjFCqNl;K}PDyleb~$=gRYW;$T1`F?eooQfEtOML}bBY;P+_Ia6df zVr@otXI5!zWp8pzb7ezNc|~V0d1PyIWl3jARzgrjZwgpuYf5HzH%n_qL}N8*PH!!Wn-`Ha}0Kl;CpGZoX(c@{wr*Mx`(_W{FaG&8-cd)W_l} z8&m}u_gGgY=s@owxGm42r+}hhw6z5`f0DP!4RTV;N%C6(K-9&94mnx{B<yZzmvf+TulP{j~X!mGD>VTSHgb8}4YA{Ojh0BA-j{Sgu zHYZDDU?}GMvB+%bg@In2>GKOObZ#lJ=ku3F0Lz$dTv8P@gM}Cj>@YJ*l6FXTf8S#z zMRTl@)qsH~V6DAKT@-{`hM=1$YNV1*j?vd%JJ&c_X&lXXUz5tr3@*2?p;Zt>z}2R< zfM{lXQe0Ah^(toms7{m$5DUr5g;bEd zvs>tHlv%;rU3k%IkdXUM0PaZme`olpP8z0Az-Ok24kwVITrz#kM*ca<@s%hgbctfQ?V{s+a_D{C zwuO`dXHn(_uY*X;ddW+te}nsqq;2KSUMtYnXb+NFmtVg->k{zQ%vwRInn)%6Loaj( zwLv+$vzS*YoE&T&?{iY+fSgav+Ui)$-z&=A*ztfp6te*7jJM%xYVj5+(g2D0=WE-6 z>sZQ>*=aatUI?f?x~-?%O~y`l_i`PJ?@p{5pF}_Wp5V&%!HwCvKVB#Lzi*cq+>rca z$0UXewA1Lz0nw^caC>g#rM)P>3Sam*gP@9F{%0N(R`lt)W8SbstY$)ZsOnvTMbG=f D?gkc! literal 1978 zcmZY7Ym^g(6$fy7wktR*l!rn=z*GU1?3&4ICJBlrnVFp=o5{@PH3?9iJZ2`DJSLfB zCX)gJ1qua41aW!zfWj86JXTv^kt47a_8#dqf-kyaOP0`($3C9$RL1@zP zeXST)rlJOnC|R+LqGX}8ivyb@6+sMuKpyvsg<-9)6|v=dYzTI*nZ2Ap;} zL`$WJ(;y;7`fJ%fqGH!DW&x@QIkU=}7*Dbp5}Hj+6%L9CBW0Ikyp%-4xKGSu42l9o zG$-pzMleM9j84@`Br4`4!N?Emx|;$O*L!*%cg8GPLVp^l}-|LR`po((PrFirPUZ?q7u!x%OIu= z3IIB)4m1ion~bVKD5+(CBo;#CV%9>sjlqQ8lVE*ilts*J%HCgt>;Z$0(wuT9A*xadf#0$|46fpCF0p&5nGMRlmDjBtq{hax(E zsfmqA!L%OH6cQ{>_#=*J8thiGh!vTzVBFkFZx zVXajs6q|@lh>3VgphET6LTUupQ5q0;n<)y^7X->zjmL13Ow%l%%oai>4-3a-f0bc! zxCe~uBS0z2C9rT_8&?^`DfE5GNJ33WUnxYhmtiQloYVUnB~mE=B$GTT>T`-l6a)fF zAt6^hQHW)nG~CFsMi|ez$|&b5m{JO)mi1U8Yd6LL#HZ?Im&YmdVcs8xVg?$f?GaO+ zPrKr()s%E%F~lP^1*PEsFF7;KHgLrxBPBJ7>U2#+f;Az{G&vI1P6as3n=)1t1Z5}$ zf=m?FM^#IlOr{9cQ!#zzE<*ON17qA0Y zn9-AcsCz)G=idvyHDLMVw&y>Y`^k*GCRsifMxIs<_u474y|rtZ7udM}$@v=(_tt*4 z*7)h1`Y+lrk7s6ht*#|ey1s=`oz3-KBX*77ZkZ|k{<}5eh8w@z)wV49)lFy3v**@r z9=7t+Rn2UWWj3BZ``9~e&M)^Z>TP^)$UtxUBm2&GmS5XCTnY7F1Ma$_nN!EjvkvSl zPPtIOqGRj5mv&D6?dsnQhCZk5izloar(f88>ly34KW!Sf`Odrx*wlYq#M&Ou?Aq*H zKm76Wn+{!sR^B|Z@Xn({H-87{=G5ATEPB0@yPR6-{6K&&U3uW2+96lIWhYkNY~R(g zL0v-}%*KztaIS09g6}unf9YV$8!y+J2E2diTxzkJxaCnHygJ3Cz` z-+Jm+$F@3^a!(#nf8;>RY2?`L)ZV2FXC0Yc9K8JXo(&TgJuvI!b#TqFu~&0-y!~He z1K+>zMz#&jzV_U)nl0{kZ;)K#C_QvV*_J(3e0oL4#3Pc})%vP)S^FRTEe|eTzvJun z@oe|{h9BP}hIc3@O`4PEi+-@qo(7olyk$XnhuKSP2a3Eacd44%} zp8uxCb6;xBc8+{=>)3~HefZq{|I*y6!)yb3{spCQ*cfG>h>S%*FMy}c+=JQ9_~JS zVOAG&cf#lUmLk2M)t?)#|5~?m?Hu#IylV+5p1UW~tH(DEC#KpI>h1{{glv4aZgnM4ZNH2Rssrh6-Zt$Yx_ngR)3W_=a literal 1276 zcmZY8yX)fw0Kjn%xxs*o!zqYZ^l&ir(&k+bA9*$TB~8<`X_^EPlQv27ezkd&Lj^}U zm4jQ(K}5kDbP{hlms3GGz2S!nF5=(~H|QpU;^4W~zu?1n_}aePchhy*<+~tDFJz?; z)kC2Fe6OmueRl(6*l^TqGb$mPp1vj%atB+9-3h6^WXlFaSC~Z4YsHdVF__vK6&EGW z873ep6;#gn){*(S2pX$(kn9w5UAr=4M1i77?PNx!nE>bNv6eUu*-|}AU$iOKQ97DO zwTZ0}B~@L_7$Tdw#GWMaAb`s*+ZD=T4d~05WB0lWy2--kj6zIt4rzxcVl4S_FcEEs zrA`DB92nWL2HUW?z28QrJQ_lXr*FMUmW&Rf$F^1$xiJGrjzW@|CgKeW608hNd{6gD zpWbuydZw5oq_9*Rq|q@nU8q3;);ln#40njR(XqCXRWtK@dKmHO+7S@~tD@>Kr5PF$ z9hHxRkvU>QSzG4aCOEX)Z3WC^8pID$;~)nGSH@N+ja73Ws|`18J;$Bb>? ztl^XfLw=83F_1>oWsTM2#2Bv*(!A9v1)bn5#}^Z%C0bTs7(HEaK$^;p7Z4c@7O0Oc z4ND-?Nes#G#CFCyGK(=HVycKHlK*L5LytkfXLHID+0&8*%b768Ks9F2nNl_a;W^?2 z3K?}KtXxc*rzn8WA*r1=BDUKn};VZY0kRqp_wTm?Rx?u9c8j zM^@3;lmlOtx)^S;VJ9DJdS?od+7ng5g%3`OaLJe+lw=TxY`qn$)R@CckfgiZL`HKV z1$7nJEK|fAO*f{`0JU^9=`t4Z`YWs z-3`ZlKalSJ`0~XUKX~f1 z<%{;Ur?(LGRr>eaZ+&Q|?yZlnJ<)yg_@B*Vub<=P2j2bXN$=U&>CKDh!+YMHe*p;o Btj_=d diff --git a/secrets/secrets.nix b/secrets/secrets.nix index 344c0cf..7fe5b8d 100644 --- a/secrets/secrets.nix +++ b/secrets/secrets.nix @@ -1,41 +1,41 @@ let - keys = import ../common/ssh.nix; - system = keys.system; - systemsList = keys.systems; - usersList = keys.users; - all = usersList ++ systemsList; + lib = (import { }).lib; + sshKeys = (import ../common/machine-info/moduleless.nix { }).machines.ssh; - wireless = [ - system.router - ] ++ usersList; + # add userkeys to all roles so that I can r/w the secrets from my personal computers + roles = lib.mapAttrs (role: hosts: hosts ++ sshKeys.userKeys) sshKeys.hostKeysByRole; + + # nobody is using this secret but I still need to be able to r/w it + nobody = sshKeys.userKeys; in -{ - # TODO: Minimum necessary access to keys +with roles; + +{ # email - "email-pw.age".publicKeys = all; - "sasl_relay_passwd.age".publicKeys = all; - "hashed-robots-email-pw.age".publicKeys = all; - "robots-email-pw.age".publicKeys = all; + "hashed-email-pw.age".publicKeys = email-server; + "sasl_relay_passwd.age".publicKeys = email-server; + "hashed-robots-email-pw.age".publicKeys = email-server; + "robots-email-pw.age".publicKeys = gitea; # vpn - "iodine.age".publicKeys = all; - "pia-login.conf".publicKeys = all; + "iodine.age".publicKeys = iodine; + "pia-login.age".publicKeys = pia; # cloud - "nextcloud-pw.age".publicKeys = all; - "smb-secrets.age".publicKeys = all; + "nextcloud-pw.age".publicKeys = nextcloud; + "smb-secrets.age".publicKeys = personal; # services - "searx.age".publicKeys = all; - "spotifyd.age".publicKeys = all; - "wolframalpha.age".publicKeys = all; + "searx.age".publicKeys = nobody; + "spotifyd.age".publicKeys = personal; + "wolframalpha.age".publicKeys = dailybot; # hostapd "hostapd-pw-experimental-tower.age".publicKeys = wireless; "hostapd-pw-CXNK00BF9176.age".publicKeys = wireless; # backups - "backblaze-s3-backups.age".publicKeys = all; - "restic-password.age".publicKeys = all; + "backblaze-s3-backups.age".publicKeys = personal ++ server; + "restic-password.age".publicKeys = personal ++ server; } diff --git a/secrets/smb-secrets.age b/secrets/smb-secrets.age index a162c96bdc0958bb458db8bcc4f3a969d829b9cf..9d75bf5687dd91c5fb4b52849dafd76ca20d40ef 100644 GIT binary patch delta 463 zcmV;=0Wkjk3H<|*C0=<*L_tw^AW&#hG*~cHQ)o;^Q&%u`YhhM0QfNafVNOJ2Gj~;I zHA{L#GnR$O!nZ#YORYcXwVc`-y;Fj-7^VNYRMe^zH&Wh-JqIWtsgL@`2oHb^&1 zQ+Rh+D@b!?Z8d3XYExlCX+l`4saHm4@ zm*pRk)~|uq9*@um6>tnqakJbOL)RCut%1%WnQ2_ Fj((E|vS9!K literal 1277 zcmZY7&F`B890qWs9vqrDZ~8OYm^XtR6e!S(23lI61q!8<5);Eal(&|5nix;sw&)+Q z#d+At#FJU#5~DZcK~E-n@Z?LpZ1HL|P8W~eU+{Up&-1kcZ{TH4(I2WP&#vc105?Nm z@FrN6;lOjz(P%gZyPQtR7F>ChM55fu-0O18)>-67j_jC`79Ip;ZxbxLByxlZR+}7{ zSrieuNXbJwKNp%-Z`l}MLWdK!EtSg56r0-4@I^11!MT>&E!ENBPzq}XGYe}rNfI;g zcB;z55o)cQC4;y|JJBWHT770J)COY<`|~%bcSg=01iXnGltEv zGaa7uS7oV(frt_27WN}65a*(8oa)1LGb+zDS5$U+0OnLU+GVIj+nvcX9hq338bcyC zLeyGF#8}+8k{EFGfh_^Fu7njjF-=PdQSYb@N28PKqA^OQd(y5{+{++&4WlFCiQ5QT zL*W1v%Nabup{eOw{j{zb_0Y(KUdvUG%*azyZ8VLsDo5ytEf8sx%4W?Df%k}UEKhbE z794a$8i(<4%A*Nc+;>Mw*W4#|^IK*H1>nJ0u}d>`#l5KXNzW-RtVfXLQ*<>cdd_oC zNKM#n-NY?WM%J?5L_D{Fh}{C;Y8KP6+>XbnL)Qv)h(pD$=}%ttIN8}x_S}?KT5wsF zoKB`>WFD2CZ+&Q?o6%NUnsF20NmXZSA8OZQ3{G316=fu3SK=(!BSBPT6t7D(?~}(H z7tvU9Nx0C{ENpu;KG*bq$H5Bd_$fQCHZjNQl6CO8Ju+=$!Jes!2O&qC_ZMR0$qTpa zTc9Q+(RUqm&r=JvbvtJ(bejbW1zoD|q$6V^bS&lFUhAlHEnFRjSqo06VNx*~RU?VQ z&BuzT?P3L=%I4b7SpqB9-4u_u7+3BcfOlccC>j!pWIm*2WgZtA%cZ>TOnIMPA{$CL z&Wu>h8a<$~8BU@QeuuNBKvM_{X6D_1Gxk5(PMGNp4}v4|{eqR78W;^#zWih9?7u?zpZ5%&r}IY>{(p!8#c*7z{vdhR+*RFv85-`w^#y zjt(o!QXS4Eyjh^FML{WFrhBQPfq%f)KC$~7uRnLI`{`PFnfmpuXJ2@_6R#(afV;O} zym{~TBl80K`0{Tz-u?WqhkyKeY5LhqSE`#&J-qV6D|fzNKfQSV{X6&n{pJ4MXTJXK r%dak7ys@~-0UuQ#JiuQ4=G$WR!Q0t?(~hft diff --git a/secrets/spotifyd.age b/secrets/spotifyd.age index 34cb47f..d834570 100644 --- a/secrets/spotifyd.age +++ b/secrets/spotifyd.age @@ -1,24 +1,10 @@ age-encryption.org/v1 --> ssh-ed25519 xoAm7w nK+/qKKiipFhaF8SlrPA+1MXBmL0g3X+VX0o2eDurXk -vyeRKIBbBpNQ6fg2GnUe/rSzwZEg9pajaTygFCTEd84 --> ssh-ed25519 mbw8xA u1l5e1uS2/U5ha5EGAp4x790uKJyRN4L7vPKLkGcqRA -bGAA/pFSsNT+ZGOEVxqz5tfORvbdZ2HU/+1QpS6r1hI --> ssh-ed25519 2a2Yhw 9liF3i4BNYAS3N/wCIwD/ks0UEYzEQNBtISNostxoXU -L8zcyadtJyMl+H5ndJDc2eZS8nHDfUb/dER+hSTS9sw --> ssh-ed25519 dMQYog YgBTvIkJEm7IrC75tuLsRyRJDe4bJvMFXlxbfW8E+Bw -2synWFO1aCMPup44qx9m9+Q3VIHyReJEmgaSXXdeNdY --> ssh-ed25519 6AT2/g XWEVpDjWhUgz8kQn26jOlK9pmzyaLY/zZHHCL3zmOTY -LISRuoS5+PXLqN8UfMp6W2lhntejObGWeVGMQmZ8GaQ --> ssh-ed25519 fwBF+g v/YxEBKCPcrsw17S7qxVfZZMfmOiA4+PPTPEsLuNFl0 -Gqu0LoYGraAQoRuCaMxLKZYFxxPTqJXno+gtIfPwS+w --> ssh-ed25519 yHDAQw ETqeum+DKSj8P8+GYt6aqplIElw71E8qS7XFEfdk9Hs -5fDPFlLpm5uoM9ASrxyEnJDURLpjvLcap/TTbrnes48 --> ssh-ed25519 VyYH/Q JgQLP5848LEJNjEYDtWO+pildvixJwr548a3WDuUk3c -K9RH2E+vmsemxFuoENVDOyU2APB0JGKWLCRv1YFwblE --> ssh-ed25519 hPp1nw 2H3olp3s1Ong037spS7tekMKwB8FemQYdWXAvdLBjEY -4BhO0GhFC/zqGUs1R4yigIuLtLaWswrmv/9lFuQ+jXI --> 5y'BWp-grease 4\h10!^" 47#Gqf VQbey`1 -pRs8xYTuqqZ+6B5W2+zAWCXMpgO2k2/x77RKjCmbf48p0LM ---- ymSK6Hd6lQSBtkIPdfWdMoI+ty8BMo+QM5FC/fQsIpY -/eB.`+B6 -&%}+"<2Ѱ~@QtmLdIJŒu L\{Dc1Ō@{7 d \ No newline at end of file +-> ssh-ed25519 yHDAQw R1weIMur0s9HsBBwNn+XyBNfAB8CrQf6QEzIJFklcG8 +DTK0seypjzSX1B2ce2IWyYwygBeeKlbFpYgzH7i1DHA +-> ssh-ed25519 dMQYog DU9sxA0/cG/O9EG3JYFjL1d2OiqOSZvFjZ1S2zTTWDw +nGlUCvjpUp50ykTIUzSQ19uj2tiVMPo1Ois8xFSWB58 +-> z%z.3-grease lF#S +H+5548VgikG9upeHi2GIQ3U71TC0ds+dn8yWOoixHnRhiYZRIhODffjI3D8T18gk +1mjtW+c34E+ALRkSIf5iWwChJxsomS6LiMS3sqtJg4c +--- o2hgAcfMDZyGIehN07CO7OjSCrmwUDRTrwxAKmGcfAY + ssh-ed25519 xoAm7w uiG2dFOijKdrdBXfdbO36C58tRkmz4MjBX8rEGfsl1Y -eIOekwe5iDZZUcVYEXie+j5qok84fIx1cF8Sna0GdZY --> ssh-ed25519 mbw8xA IGrOTs8sVX3qZQ6l0160q/xYsAvFEj69kN1Dj7yKYi8 -EnhYbIDhGyirnlsbUCk3GOVzE7QTMkncRFmpiRAOvs0 --> ssh-ed25519 2a2Yhw wl2vaJQ1gXLb46y/IXJMgCYUvhW3cgjJ10+fLhoS/Bw -EOwsKVzPjbYWXQ+c8KWVd4FadamJrn3+qDb5G4R6Moc --> ssh-ed25519 dMQYog QAVPULFTcffOptY4nML8/DyYb95IqBOomztdNaRN1g0 -qfSGtU3pl/7fMCjZM8syfLvgHhyd38AA/SICm3maHbI --> ssh-ed25519 6AT2/g oaH9KRPHLkl1WXKIvtP7liWf8Apy1yEf41UHkFvdJjk -Rpfn7Gt6bORSI2qITHC7HAb1zlzOK4gDh3Ya7JwUUzk --> ssh-ed25519 fwBF+g ilPZbir/rHhDv+drBmEsVEgjmIJHeISK9cZGltytClc -ODhQutW6IMHsFw+wQC4n6TOMCbydrPUWXlfwgQelpZs --> ssh-ed25519 yHDAQw xbtvz5r0XfNY/cKWiIuUKO5tt+iGZMbc0d/PT4HhyGs -g/3IKnsKniQ3aB++htgM1JUmfsDzWWJ4lylAw5rBpyI --> ssh-ed25519 VyYH/Q yhDle9FTAXot4gB23F7rOLNqJ1j3PMZmk7OMbKaGayE -j2XnSG589GUmvM4NunfgbcvdDBCpDJ6GubxI2UR3IE4 --> ssh-ed25519 hPp1nw I86wd3J4YZTlis1s/Q6SQP7j492NVe64DWu6Pe8ujFI -jgkh4YTEuBE1qCTooWPWZxQri8KSPYnWYkIhcEhIAIM --> C+QwV1[-grease 7bFy^.lq Y) 5 -Vw2f+pwTja8b9veFqdxVZSMGsgii+SMUfn9eAVqTjEAmWxawSQ ---- V75Y+46buomIjWtz/zwOBNkZ9ZAKcKV3NDy42NDjPU4 -CrFA -B62-̍D s&H  \ No newline at end of file +-> ssh-ed25519 6AT2/g xp04CsJvlYhBZS5W/MSDLWGiNCegAjg4XPv43wU5u0g +i6q0YgKOFGaHOKVYMppNtcvjCFfHHqOS9M+oh2mqc1M +-> ssh-ed25519 dMQYog Mk90WFb+fYCFV7afu3+VbuAtOlvRAgpJGFGqn4ZWGjE +wHeScgV248lHiL0B/QEraD4QOBudezhJPrppY50u7S8 +-> G/9-grease +0hCyP7pGu5xkk4eWJTpLWy6f8Zuo8wmgBSNFK7bgzfYdW29mdOrO2Ey3Oa2Gvtji +rze9v27gMUFRXOqPHNmaSjAneCwtcqTMReV+LZr9q9FN6qZnzAE +--- /SN6cSyrvbDEHTiIvv4MdoVkIjz3yZkvtr2SVBE1rRk +=1fJX~DcaF@ݹc=89;sv \ No newline at end of file