nix machine / user configurations

wip

-4
secrets/.gitattributes
···
-
* filter=git-crypt diff=git-crypt
-
ssh-key.pub !filter !diff
-
.gitattributes !filter !diff
-
README.md !filter !diff
···
+19
secrets/bernbotToken.age
···
···
+
age-encryption.org/v1
+
-> ssh-ed25519 KjIL7g 9zqnchTxa2RNHh6dA3ywXt7kkdP7PIT09IDW5S5NBQU
+
kBvwfU6jyBgPkjww8mm7aKjDeC/te9AySRQhWW8zDkA
+
-> ssh-rsa Abmvag
+
CK5dRW3YSK7sSZoYqxuolfjHQkIKEKbzX4Z6PjaRaF5l5+/JPQnFhi+/AvhjAD5T
+
kdgUw6NjWRRRz8oxRfdXezDv+ilFT1SomYvvbc0BtVm1MSoSrw8mwvcP10E1Ufet
+
B5SgfGR1RCKrzUxG+zD7iXRfnpvpC7RURSRqSFoLZOEiHYE+yRaEWsL7bq5jrIqt
+
OOH7OP+g+ScReyaTz02ReHqCNnKl4YqM5V1EfCEgrchwMbEFZji7cqmoTQcG0Dbd
+
c16kdGwzTJrqKkcTGnGn+MwQb5WrSvWmE5JTliq+ksC8Mujot+ufZa1UFPz3uPJh
+
j2UIc4sWTRba7Jz/nqL2Ef5d8LeXtus/TqNszRBW3AIffXl5I04kQTb+sAv8WPTx
+
fH34li8Dd2RZdK/iPlJMqsUJhnb/4QpvDQaqigAzX9WLQy4sllsXQdjSwgm8Chen
+
0peoZsFiPkQrQ3qs9tm0JI8xFbFOnvaso0o9iMGi6JZfc1Xx1P1l533yJjm6BOAl
+
h7rX7ocLi8kfTmXAIzo80Ux0WfHyWkqvMbE6E59T5tVwcTyJQwg3F8UFs+HB7zY9
+
NajjyLZP7FnLFyEY9OkdZ+TmTERu7EssHWVVnm7y3YdglUbGI7dvNrYXEfK35HEN
+
kAofFoIKRIEx/EJfcqFksb3ghIg+d3TzfMSJlefhJXg
+
-> ~am?#^s~-grease
+
TZj9QCRRKFXA4zbN86Hc88WzEJGSfhfdiylgXgsVqmgdevbrs+Yek0NpdA
+
--- TI12rWP+DxEO/4ynIKZLXUraDINwjquPe27/MLbF+ws
+
��=�W�g�ަ�|�.��U<6�J�]^8!s��Q�$ps����a��4�q?!#�f�� ҿ������JO��^�F�Twgh@낺�֨P������� �vw�`�`4�;��3 �G\�
secrets/bernbot_token

This is a binary file and will not be displayed.

secrets/default.nix

This is a binary file and will not be displayed.

+20
secrets/nixGithubAccessToken.age
···
···
+
age-encryption.org/v1
+
-> ssh-rsa Abmvag
+
f0TCb9mYA+pCLmnD+OrOCeXn4rZLQauDPctBDjw2OR8t5fRp+WMSp/dW8MmFO9iF
+
WMSpF/ga4DO3VnvsVtJ21tbekknoZqGMoIXQUL7ROYqbqWuJu0Oq63n0bJWI+Q8d
+
ugCJAhGgAkLADddneLNPLS6Fs/eO1ABGdgWBatreA32MZYHGarML1tpsCVy2s8z+
+
elfcNyGKKmjQHauvlkDYmPuRWoH7PX0Ef9fSSppYoVExwOmQxj18P7sIa5X4GSN3
+
BPSWEViUA6jO+bXsj+DLu6t9ReloFkYynamRsLtnKrGzMlJTnqCp9PAqOiOMXK9I
+
w5gC6ViD/2vPgkfogBbsFhUrGwAhrdeRJ5z+uacOq6I1mn3nZs5DnPs6BVBDKidc
+
KVEHNTwpLpEbaS6cOnXfSYuJd5UNJbnKi75cCI8I5fe0Bd5g2rJTsd3EZQOKE/34
+
3veDcCcWNL1ZykeUsUUj4V4vzSiWS5//nyFum54y3ihtvZIeFbtm2Jh403YuQHKn
+
ltFgYnIS5KjdfeQ11LOfDaHFbzIjqIWULJ6KV9zRqPmmb08diuiJ3LvXHxTVQ1/N
+
K1742vDJucMuSLhFIVq/lufCSg3DMXVJUs8U5VhaFCNTPXBWR3ZaS1AwZgm4bhW2
+
FQx+YDv5E2z0RSbqDUK07SPh33xu2XWkXEPH8KwB8d4
+
-> "J,lTC+-grease p ,
+
TRD6pwBJQ9U
+
--- uAglxAkrcJdg7FPLhAin6AUGoYQQ9O071OIZptp9790
+
�[���!!��x�"���`Y�I�� ց�G
+
(�F:dq�E��Chl����� ���}]`�6w�m`X
+
•�y�t@q�
+
l���[�R��ݐ(�~t��M�^z��
secrets/secrets.nix

This is a binary file and will not be displayed.

secrets/wolumonde.key.pub

This is a binary file and will not be displayed.

secrets/yusdacra.key.pub

This is a binary file and will not be displayed.

+17 -3
shells/default.nix
···
{tlib, ...}:
-
tlib.genPkgs (pkgs: {
default = with pkgs;
mkShell {
name = "prts";
-
buildInputs = [git git-crypt alejandra helix agenix];
-
shellHook = "echo \"$(tput bold)welcome to PRTS, $USER$(tput sgr0)\"";
};
})
···
{tlib, ...}:
+
tlib.genPkgs (pkgs: let
+
agenix-wrapped = pkgs.writeShellApplication {
+
name = "agenix";
+
runtimeInputs = [pkgs.agenix];
+
text = ''
+
if [ -z "''${1-}" ]; then
+
agenix
+
else
+
RULES="/etc/nixos/secrets/secrets.nix" agenix -i /etc/nixos/keys/ssh_key "$@"
+
fi
+
'';
+
};
+
in {
default = with pkgs;
mkShell {
name = "prts";
+
buildInputs = [git git-crypt alejandra helix agenix-wrapped rage];
+
shellHook = ''
+
echo \"$(tput bold)welcome to PRTS, $USER$(tput sgr0)\"
+
'';
};
})