2023-02-05 16:51:04 +00:00
|
|
|
let
|
|
|
|
user-daniel = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA1UfCIu7jUe64iQmp2UUyAgqZ3IYdMOo/Me6hRTnKoG";
|
|
|
|
|
|
|
|
system-sail = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJMs1BqZ+MC7XBwV+dZW8EmaZt2cOg/xcOBPS9KSzIl";
|
|
|
|
|
|
|
|
sail = [ user-daniel system-sail ];
|
|
|
|
in
|
|
|
|
{
|
2023-02-05 17:06:51 +00:00
|
|
|
# sail
|
2023-02-06 10:47:54 +00:00
|
|
|
"agenix/hosts/sail/cloudflared/environment.age".publicKeys = sail;
|
|
|
|
|
2023-02-05 19:32:19 +00:00
|
|
|
"agenix/hosts/sail/mastodon/databasePassword.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/smtpPassword.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/otpSecret.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/secretKeyBase.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/vapidPrivateKey.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/vapidPublicKey.age".publicKeys = sail;
|
2023-02-05 20:08:03 +00:00
|
|
|
"agenix/hosts/sail/mastodon/extraConfig.age".publicKeys = sail;
|
2023-02-05 19:32:19 +00:00
|
|
|
|
2023-02-05 22:25:57 +00:00
|
|
|
"agenix/hosts/sail/synapse/extraConfig.age".publicKeys = sail;
|
|
|
|
|
2023-02-05 16:51:04 +00:00
|
|
|
"agenix/hosts/sail/freshrss/userPassword.age".publicKeys = sail;
|
2023-02-05 17:06:51 +00:00
|
|
|
"agenix/hosts/sail/freshrss/databasePassword.age".publicKeys = sail;
|
2023-02-13 18:44:04 +00:00
|
|
|
|
|
|
|
"agenix/hosts/sail/nitter/config.age".publicKeys = sail;
|
2023-02-13 19:04:45 +00:00
|
|
|
"agenix/hosts/sail/nitter/auth.age".publicKeys = sail;
|
2023-02-13 19:15:10 +00:00
|
|
|
|
|
|
|
"agenix/hosts/sail/libreddit/auth.age".publicKeys = sail;
|
2023-02-15 19:35:46 +00:00
|
|
|
|
|
|
|
"agenix/hosts/sail/anonymous-overflow/config.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/anonymous-overflow/auth.age".publicKeys = sail;
|
2023-02-05 16:51:04 +00:00
|
|
|
}
|