2023-02-05 16:51:04 +00:00
|
|
|
let
|
|
|
|
user-daniel = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA1UfCIu7jUe64iQmp2UUyAgqZ3IYdMOo/Me6hRTnKoG";
|
|
|
|
|
|
|
|
system-sail = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBJMs1BqZ+MC7XBwV+dZW8EmaZt2cOg/xcOBPS9KSzIl";
|
2023-04-04 12:35:49 +00:00
|
|
|
system-attic = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHe6N3LfPxu7KNsyuI8YE3R0OHLTxNw5+WhuQjKL6PUr";
|
2023-04-13 14:45:01 +00:00
|
|
|
system-mediaserver = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDlB0cL5CtTOyARWSE2yUsNU4JHUPmr71710mZHzsmbX";
|
2023-06-07 18:40:27 +00:00
|
|
|
system-argon = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPP9ygczyi6g8abvj1I0eAj7N2Rli9UMlkC8VT6SnWLU";
|
2023-02-05 16:51:04 +00:00
|
|
|
|
|
|
|
sail = [ user-daniel system-sail ];
|
2023-04-04 12:35:49 +00:00
|
|
|
attic = [ user-daniel system-attic ];
|
2023-04-13 14:45:01 +00:00
|
|
|
mediaserver = [ user-daniel system-mediaserver ];
|
2023-06-07 18:40:27 +00:00
|
|
|
argon = [ user-daniel system-argon ];
|
2023-02-05 16:51:04 +00:00
|
|
|
in
|
|
|
|
{
|
2023-02-05 17:06:51 +00:00
|
|
|
# sail
|
2023-03-05 22:02:49 +00:00
|
|
|
"agenix/hosts/sail/acme/credentials.age".publicKeys = sail;
|
|
|
|
|
2023-04-04 13:05:39 +00:00
|
|
|
"agenix/hosts/sail/tailscale/authkey.age".publicKeys = sail;
|
|
|
|
|
2023-02-05 19:32:19 +00:00
|
|
|
"agenix/hosts/sail/mastodon/databasePassword.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/smtpPassword.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/otpSecret.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/secretKeyBase.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/vapidPrivateKey.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mastodon/vapidPublicKey.age".publicKeys = sail;
|
2023-02-05 20:08:03 +00:00
|
|
|
"agenix/hosts/sail/mastodon/extraConfig.age".publicKeys = sail;
|
2023-02-05 19:32:19 +00:00
|
|
|
|
2023-02-05 22:25:57 +00:00
|
|
|
"agenix/hosts/sail/synapse/extraConfig.age".publicKeys = sail;
|
|
|
|
|
2023-03-18 23:54:53 +00:00
|
|
|
"agenix/hosts/sail/signald/environment.age".publicKeys = sail;
|
|
|
|
|
2023-03-25 13:08:09 +00:00
|
|
|
"agenix/hosts/sail/weewx/config.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/weewx/skin.age".publicKeys = sail;
|
|
|
|
|
2023-03-17 20:58:31 +00:00
|
|
|
"agenix/hosts/sail/mosquitto/passwordWeewxProxy.age".publicKeys = sail;
|
|
|
|
"agenix/hosts/sail/mosquitto/passwordWeewx.age".publicKeys = sail;
|
|
|
|
|
2023-02-27 16:51:39 +00:00
|
|
|
"agenix/hosts/sail/atuin/environment.age".publicKeys = sail;
|
|
|
|
|
2023-02-05 16:51:04 +00:00
|
|
|
"agenix/hosts/sail/freshrss/userPassword.age".publicKeys = sail;
|
2023-02-05 17:06:51 +00:00
|
|
|
"agenix/hosts/sail/freshrss/databasePassword.age".publicKeys = sail;
|
2023-02-13 18:44:04 +00:00
|
|
|
|
2023-03-20 12:49:46 +00:00
|
|
|
"agenix/hosts/sail/invidious/databasePassword.age".publicKeys = sail;
|
|
|
|
|
2023-02-13 18:44:04 +00:00
|
|
|
"agenix/hosts/sail/nitter/config.age".publicKeys = sail;
|
2023-03-05 18:22:15 +00:00
|
|
|
|
2023-02-15 19:35:46 +00:00
|
|
|
"agenix/hosts/sail/anonymous-overflow/config.age".publicKeys = sail;
|
2023-02-28 13:55:57 +00:00
|
|
|
|
|
|
|
"agenix/hosts/sail/proxitok/environment.age".publicKeys = sail;
|
2023-04-04 12:35:49 +00:00
|
|
|
|
|
|
|
# attic
|
|
|
|
"agenix/hosts/attic/user/danielPassword.age".publicKeys = attic;
|
2023-04-04 13:05:39 +00:00
|
|
|
|
2023-04-04 20:05:11 +00:00
|
|
|
"agenix/hosts/attic/acme/credentials.age".publicKeys = attic;
|
|
|
|
|
2023-04-04 13:05:39 +00:00
|
|
|
"agenix/hosts/attic/tailscale/authkey.age".publicKeys = attic;
|
2023-04-04 15:20:09 +00:00
|
|
|
|
|
|
|
"agenix/hosts/attic/atticd/environment.age".publicKeys = attic;
|
2023-04-13 14:45:01 +00:00
|
|
|
|
|
|
|
# mediaserver
|
|
|
|
"agenix/hosts/mediaserver/user/danielPassword.age".publicKeys = mediaserver;
|
2023-04-13 16:16:44 +00:00
|
|
|
|
2023-04-14 13:20:51 +00:00
|
|
|
"agenix/hosts/mediaserver/acme/credentials.age".publicKeys = mediaserver;
|
|
|
|
|
2023-04-13 16:16:44 +00:00
|
|
|
"agenix/hosts/mediaserver/tailscale/authkey.age".publicKeys = mediaserver;
|
2023-04-13 18:56:25 +00:00
|
|
|
|
2023-04-13 20:46:32 +00:00
|
|
|
"agenix/hosts/mediaserver/wireguard/config.age".publicKeys = mediaserver;
|
2023-04-20 13:02:34 +00:00
|
|
|
|
|
|
|
"agenix/hosts/mediaserver/tubearchivist/environmentTA.age".publicKeys = mediaserver;
|
|
|
|
|
|
|
|
"agenix/hosts/mediaserver/tubearchivist/environmentES.age".publicKeys = mediaserver;
|
2023-04-26 11:53:36 +00:00
|
|
|
|
|
|
|
"agenix/hosts/mediaserver/aria2/config.age".publicKeys = mediaserver;
|
2023-05-21 21:14:53 +00:00
|
|
|
|
|
|
|
"agenix/hosts/mediaserver/unpackerr/config.age".publicKeys = mediaserver;
|
2023-06-07 18:40:27 +00:00
|
|
|
|
|
|
|
# argon
|
|
|
|
"agenix/hosts/argon/user/danielPassword.age".publicKeys = argon;
|
|
|
|
|
|
|
|
"agenix/hosts/argon/acme/credentials.age".publicKeys = argon;
|
|
|
|
|
|
|
|
"agenix/hosts/argon/tailscale/authkey.age".publicKeys = argon;
|
|
|
|
|
2023-06-10 18:48:07 +00:00
|
|
|
"agenix/hosts/argon/adguardhome-sync/environment.age".publicKeys = argon;
|
|
|
|
|
2023-06-07 18:40:27 +00:00
|
|
|
"agenix/hosts/argon/weewx-proxy/environment.age".publicKeys = argon;
|
2023-02-05 16:51:04 +00:00
|
|
|
}
|