+1
.helix/config.toml
+1
.helix/config.toml
···
1
+
editor.insert-final-newline = false
+2
-2
hosts/default.nix
+2
-2
hosts/default.nix
-1
hosts/tkaronto/modules/nixbuild.nix
-1
hosts/tkaronto/modules/nixbuild.nix
···
1
-
../../../modules/develop/nixbuild/default.nix
+6
-6
hosts/tkaronto/modules/secrets.nix
+6
-6
hosts/tkaronto/modules/secrets.nix
···
9
9
group = "systemd-network";
10
10
};
11
11
12
-
age.secrets.nixBuildKey = {
13
-
file = ../../../secrets/nixBuildKey.age;
14
-
owner = "root";
15
-
group = "nix-build-key-access";
16
-
};
17
-
users.groups."nix-build-key-access" = {};
12
+
# age.secrets.nixBuildKey = {
13
+
# file = ../../../secrets/nixBuildKey.age;
14
+
# owner = "root";
15
+
# group = "nix-build-key-access";
16
+
# };
17
+
# users.groups."nix-build-key-access" = {};
18
18
}
+1
-1
hosts/wolumonde/default.nix
+1
-1
hosts/wolumonde/default.nix
+11
hosts/wolumonde/modules/forgejo-runner.nix
+11
hosts/wolumonde/modules/forgejo-runner.nix
···
1
+
{pkgs, config, ...}: {
2
+
services.gitea-actions-runner.package = pkgs.forgejo-runner;
3
+
services.gitea-actions-runner.instances."thermex" = {
4
+
enable = true;
5
+
url = config.services.forgejo.settings.server.ROOT_URL;
6
+
name = "thermex";
7
+
tokenFile = config.age.secrets.forgejoActRunnerToken.path;
8
+
labels = ["docker:docker://yusdacra/lixpine:latest"];
9
+
settings.container.privileged = true;
10
+
};
11
+
}
+1
hosts/wolumonde/modules/secrets.nix
+1
hosts/wolumonde/modules/secrets.nix
···
10
10
# age.secrets.tmodloaderServerPass.file = ../../../secrets/tmodloaderServerPass.age;
11
11
age.secrets.websiteConfig.file = ../../../secrets/websiteConfig.age;
12
12
# age.secrets.giteaActRunnerToken.file = ../../../secrets/giteaActRunnerToken.age;
13
+
age.secrets.forgejoActRunnerToken.file = ../../../secrets/forgejoActRunnerToken.age;
13
14
# age.secrets.xrayConfig = {
14
15
# name = "xrayConfig.json";
15
16
# file = ../../../secrets/xrayConfig.age;
+17
secrets/forgejoActRunnerToken.age
+17
secrets/forgejoActRunnerToken.age
···
1
+
age-encryption.org/v1
2
+
-> ssh-rsa Abmvag
3
+
OmNZB1HxonlxQcPAmmJtUW5aZULDXFJBiBcswviAqTqZESzGCzZSe/dGEEsh9QOF
4
+
ZZpC699LqLqNMJUJFCRuy+eiXgi98J4MVMlMFPBScGF3huhuNlZ7EvryB+MAibqa
5
+
SouBuR0JXJ4dWhB5SJkA/Z5uFxwABCqvRzBZrjL5ldJoVXeTVl+e+8W/dR7VB/u1
6
+
nzdlDaVxziH6aO/al0qeaNIQXCtUmmy+IKVZ8dnwwEDZwcgNp0p227K62R0UqI95
7
+
Qsp/w+xTJyIu1XC2CaRvKA304PHbzUAqhAvexgvMXFi0A6cM4VoTk9Hrk1TH38VK
8
+
tF8LU6jh873g9JpxCXwIJlATuiXMWO8u6EWEDPs7uJm+3Pvzja1qqUrBk7kwgZy6
9
+
iLOJndyL0i52/PK6Rlt0mqsUNSzXvNuvtViKbvXsTCXPOG8vQCXj6hqNtXfFzipX
10
+
laNlH8tyLhjMaQZzlU1SS0F+J3LSpF7gDpQywr6m5HNL7iaEL+zUEinn2lpDQCD6
11
+
OWh1kTcPj8RprnH701P7vcS+21e5S0zxGXPGoYF/Xhj/BYGPz44I1d6hTYWuqSB2
12
+
n/Xw21GFykIVPSWT32Yt/zVlaQagMUHDvMDUTK7yZmxT9BYO6a783KdE2G2hPy6V
13
+
Uup5AKvbTpWtDtZ8D5u37/YO1li4Cquigw6QV7AUz5k
14
+
-> ssh-ed25519 KjIL7g 1Ctb1OJio8Uues4VZyrgvo3G4Av4TRQ8EepnoIWaJ2M
15
+
AZJRr+JmLcJ9lvhnSpw6LOCtWbi/0nQe6mL7ugRsNUg
16
+
--- Ruv76wNOAJ0qhpvcoNa06V0Eml/a+FeyPXCCTXhAdrI
17
+
��]KE���Ԫ���W�,��[_��5'J�����2��j��h^��so��W��7�@���M�g�X��%�����
-18
secrets/giteaActRunnerToken.age
-18
secrets/giteaActRunnerToken.age
···
1
-
age-encryption.org/v1
2
-
-> ssh-rsa Abmvag
3
-
QRbeL4d60GYob6F2OKpZEJUFzHTuxZorUsPvgNdIBqBKDGEQcTXEc064QCeIbvzC
4
-
Gy8UW8GXng+VFlxRnFDhTpIjOw9j0/azbTN8YzCtWpYmzNVLtGEcsnt3TJQYT45Y
5
-
voIjm/PXcObH8Qj+dCcyeRkUij0HHsJmxFWgYSoKwR9PpeN9uDWWmJ3LZeFZs2ju
6
-
RJmtOTasvQ5AwTwEIUTH1yR6iT81qLAUPDVTbMKz6QhRfLz/Vd3Db0DHcj6Q9UD/
7
-
ompDcyOLflHrdvVAomz0++nJjHFP228hnmpDKS7heo8dwOwm1FSoS+qYCB/r+mFZ
8
-
MvYlj6+gbVJ6WjUt6MRdOeqB5aO+WDHCKfv0Ld34LQrDdVxoR6x6yO23AfquEH8c
9
-
OLeat2omAhU/Hk76+EfgJYUT60MKgsNeQyufAfUd+KbonGURL4IbYGkj26a+Fiby
10
-
8a2Ya5VrHUloyjL/fbF46vFJuHmV7wbc7de8yH/NSj9VMs7G+OXR/VtQREDImeq8
11
-
MEzdQyWrLnlQMe4ONNYmnqjANAn40IMTTRO97vGyILVyDGPTO8gPixCFe9H08t6x
12
-
XMm13Kh3LsDr3+UJ1gi8AWNdB7IXEpsReHOO+SHDN5bxn4kq6C1O5wl8AhE3e5+a
13
-
0AmVpjByWykEbgVDisT96xgSW9d35BJGPfKR5HkT6Ck
14
-
-> ssh-ed25519 KjIL7g qb2Rb0oSREc426K0+Z9oL+TXxIUB+n8+cdWri+HyHyY
15
-
i6oIGtvXTbA6Hotg8jdG2BeNcuQrkiIfJYgOK8WqEyg
16
-
--- 0/5wQye+3Z1EeHOLFduhhh9V0GBKBrIzIvHLNvJPg4w
17
-
?=@��.@�Ļ�v�g��;�QF�} Mڟ��DI��ߧ�&�(T
18
-
��Hes�����Ø��1Ijо4tX�i��������
secrets/nixBuildKey.age
secrets/nixBuildKey.age
This is a binary file and will not be displayed.
+1
-3
secrets/secrets.nix
+1
-3
secrets/secrets.nix
···
7
7
"bernbotToken.age".publicKeys = [yusdacra wolumonde];
8
8
"musikquadConfig.age".publicKeys = [yusdacra wolumonde];
9
9
"nixGithubAccessToken.age".publicKeys = [yusdacra];
10
-
"nixBuildKey.age".publicKeys = [yusdacra];
11
-
"tmodloaderServerPass.age".publicKeys = [yusdacra wolumonde];
12
10
"websiteConfig.age".publicKeys = [yusdacra wolumonde];
13
-
"giteaActRunnerToken.age".publicKeys = [yusdacra wolumonde];
11
+
"forgejoActRunnerToken.age".publicKeys = [yusdacra wolumonde];
14
12
"xrayConfig.age".publicKeys = [yusdacra wolumonde];
15
13
"pdsConfig.age".publicKeys = [yusdacra wolumonde];
16
14
}
-19
secrets/tmodloaderServerPass.age
-19
secrets/tmodloaderServerPass.age
···
1
-
age-encryption.org/v1
2
-
-> ssh-rsa Abmvag
3
-
0F4C6sVSL7x9LUPXO1REpj8tnlnEbQWUaebc79Tc0nj8YJ4c4mrR3IVYq8UiObUV
4
-
xUMDjO0+XgHd4udJjmThD2UtBVYApmhYEc9Zv7199CHZARrXIgaFfNQvCnNC1E02
5
-
FKUGSh42eQuXcQIGpmj5fU9HVoAfp6VKHvp1CFYRn3J03u9yB589ROIH4ySdWSQP
6
-
cetenbKXKaZCYO8ipERumxyb76sninZjWc6BGj8HNF2ePEtXVcFOc5C/DrYX8xrs
7
-
0wzCtzj2bUZhtYFT5OAiaDBOi1dbC+eyER1uK6qC4ZFNMAuhVLeU6774QxQ5dL7G
8
-
g3FTNkyZdS9KZWl+4yntX0yFfXQbRGJErSRWW2g4w43EPniIgrMcqK5N1X+pycBD
9
-
gt1qofz07YGwXUPJfurWkuFpHcsO2/0SXsOSpuxYyzuu/tIdmjGMmiEilQUtQC++
10
-
yXdIXQzIyB9jWTwoXUMPMfsLtjwcok8l/dH+/9VWjgQZ+4wycHPDemhawnI33CDg
11
-
04zAJEimqoavHY2BD9K88qJSJViKBfSvMPSittblBlMNjvOQ0uedGwB98axXe9mh
12
-
LXa4rHnF48uL10HI0byYivamJNyfFug5G9WpH2fSjn1n90o1lp8ZPWKDVR/kj6+9
13
-
01zzFthLXqBQ6s5AyVtOP9yLWU06d2lhhBr+g5+J5WU
14
-
-> ssh-ed25519 KjIL7g sFHELT2wiMJBp/8HrwSbJPMWthkbpU72Kizvkikc60A
15
-
l6kk0fyz1mX8E5y37srUgW3zaZVtKdXyBoD55EgQaaY
16
-
-> N/}--grease Y
17
-
iItOxVW8A6Mv+7+7bPiMfkxX80VizsYC
18
-
--- hfAvTCpVuTOQnTkLljMOpbH9g6gYN+V9FruGBG99YdM
19
-
��35�W��@����lg���GƏ�����T-N���[{���qE�!L"��/�~