feat: uncucked server

This commit is contained in:
Nick 2025-12-10 15:58:39 -06:00
parent 8649008c93
commit d32ece51bf
22 changed files with 273 additions and 112 deletions

8
flake.lock generated
View file

@ -981,11 +981,11 @@
"treefmt-nix": "treefmt-nix_2" "treefmt-nix": "treefmt-nix_2"
}, },
"locked": { "locked": {
"lastModified": 1762929110, "lastModified": 1765358772,
"narHash": "sha256-MZXAaL2gJJhFMk8eg3reeVGXcLucvQrNhwCmxIbGV3U=", "narHash": "sha256-H+InZPNuIJfcyvuTQRGKSPjWH9gQ/ABstAToSkeWQD8=",
"ref": "refs/heads/main", "ref": "refs/heads/main",
"rev": "fc1f9a7ba28370a1fcb63ed2917e9a053f9c1480", "rev": "49fbc3f3118dd35a8fea5569372d04fff67c1bc3",
"revCount": 56, "revCount": 59,
"type": "git", "type": "git",
"url": "ssh://git@gitlab.com/uprootnutrition/linkpage.git" "url": "ssh://git@gitlab.com/uprootnutrition/linkpage.git"
}, },

View file

@ -1,44 +0,0 @@
{ moduleFunctions }:
let
inherit (moduleFunctions.instancesFunctions)
domain0
varPath
mntPath
;
label = "ProjectSite";
name = "projectsite";
in
{
label = label;
name = name;
short = "Project";
tags = [
"project"
];
ports = {
port0 = 1334;
};
interfaces = {
interface0 = {
email = "noreply@${domain0}";
microvm = {
id = "vm-project";
mac = "02:00:00:00:52:22";
idUser = "vmuser-project";
macUser = "02:00:00:00:00:22";
ip = "192.168.50.212";
gate = "192.168.50.1";
ssh = 2299;
};
paths = {
varPaths = {
path0 = "${varPath}/${name}";
path1 = "${varPath}/${name}/dist";
};
mntPaths = {
path0 = "${mntPath}/${name}";
};
};
};
};
}

View file

@ -61,5 +61,35 @@ in
}; };
}; };
}; };
interface1 =
let
domain = "vault.${domain0}";
secrets = "${secretPath}/${name}";
in
{
domain = domain;
subdomain = "vault";
email = "noreply@${domain0}";
microvm = {
id = "vm-${name}";
mac = "02:00:00:00:51:01";
idUser = "vmuser-vault";
macUser = "02:00:00:00:00:01";
ip = "192.168.50.111";
gate = "192.168.50.1";
ssh = 2201;
};
paths = {
varPaths = {
path0 = "${varPath}/${name}";
};
mntPaths = {
path0 = "${mntPath}/${name}";
};
secretPaths = {
path0 = secrets;
};
};
};
}; };
} }

View file

@ -23,5 +23,6 @@ in
address2 = "192.168.50.1"; # Router address2 = "192.168.50.1"; # Router
address3 = "192.168.50.0"; # Router address3 = "192.168.50.0"; # Router
address4 = "192.168.1.0"; # Router address4 = "192.168.1.0"; # Router
address5 = "24.76.173.0";
}; };
} }

View file

@ -2,7 +2,6 @@
let let
inherit (moduleFunctions.instancesFunctions) inherit (moduleFunctions.instancesFunctions)
domain1 domain1
varPath
sslPath sslPath
; ;
label = "upRootNutrition"; label = "upRootNutrition";

View file

@ -56,17 +56,19 @@ in
acme acme
caddy caddy
comfyui comfyui
forgejoCeres
impermanence impermanence
jellyfinCeres
lix lix
mastodonCeres
microvm microvm
restic
# wireguard
forgejoCeres
jellyfinCeres
linkpageCeres
mastodonCeres
minecraftCeres minecraftCeres
opencloudCeres opencloudCeres
websiteCeres
qbittorrentCeres qbittorrentCeres
restic websiteCeres
sambaCeres sambaCeres
zookeeperCeres zookeeperCeres
; ;

View file

@ -29,11 +29,4 @@ in
}; };
}; };
}; };
sops.secrets = {
"caddy/share-auth" = {
owner = "caddy";
group = "caddy";
mode = "0400";
};
};
} }

View file

@ -6,29 +6,49 @@
let let
inherit (flake.config.services) instances; inherit (flake.config.services) instances;
serviceCfg = instances.vaultwarden; serviceCfg = instances.vaultwarden;
interfaceCfg = serviceCfg.interfaces.interface0; interface0Cfg = serviceCfg.interfaces.interface0;
interface1Cfg = serviceCfg.interfaces.interface1;
host0 = interface0Cfg.domain;
host1 = "${interface1Cfg.subdomain}.${flake.inputs.linkpage.secrets.domains.projectsite}";
dns0 = instances.web.dns.provider0; dns0 = instances.web.dns.provider0;
host = interfaceCfg.domain;
dns0Path = "dns/${dns0}"; dns0Path = "dns/${dns0}";
dns1 = instances.web.dns.provider1;
dns1Path = "dns/${dns1}";
in in
{ {
security.acme.certs."${host}" = { security.acme.certs = {
"${host0}" = {
dnsProvider = dns0; dnsProvider = dns0;
environmentFile = config.sops.secrets.${dns0Path}.path; environmentFile = config.sops.secrets.${dns0Path}.path;
group = "caddy"; group = "caddy";
}; };
"${host1}" = {
dnsProvider = dns1;
environmentFile = config.sops.secrets.${dns1Path}.path;
group = "caddy";
};
};
services.caddy.virtualHosts = { services.caddy.virtualHosts = {
"${host}" = { "${host0}" = {
extraConfig = '' extraConfig = ''
reverse_proxy ${interfaceCfg.microvm.ip}:${toString serviceCfg.ports.port0} { reverse_proxy ${interface0Cfg.microvm.ip}:${toString serviceCfg.ports.port0} {
header_up X-Real-IP {remote_host} header_up X-Real-IP {remote_host}
} }
tls ${interface0Cfg.ssl.cert} ${interface0Cfg.ssl.key}
tls ${interfaceCfg.ssl.cert} ${interfaceCfg.ssl.key}
encode zstd gzip encode zstd gzip
''; '';
}; };
"${host1}" = {
extraConfig = ''
reverse_proxy ${interface1Cfg.microvm.ip}:${toString serviceCfg.ports.port0} {
header_up X-Real-IP {remote_host}
}
tls /var/lib/acme/${host1}/fullchain.pem /var/lib/acme/${host1}/key.pem
encode zstd gzip
'';
};
}; };
} }

View file

@ -18,11 +18,6 @@ in
enable = true; enable = true;
}; };
systemd.tmpfiles.rules = [
"d /run/secrets/caddy 755 caddy caddy -"
"d /var/log/caddy 755 caddy caddy -"
];
networking = { networking = {
firewall = { firewall = {
allowedTCPPorts = [ allowedTCPPorts = [

View file

@ -103,7 +103,7 @@ in
{ {
type = "user"; type = "user";
id = "vmuser-cloud"; id = "vmuser-cloud";
mac = user; mac = userMac;
} }
]; ];
forwardPorts = [ forwardPorts = [

View file

@ -0,0 +1,91 @@
{
flake,
...
}:
let
inherit (flake.config.people) user0;
in
{
websiteVM =
{
user,
ip,
mac,
ssh,
userMac,
package,
}:
{
microvm.vms."${user}-website" = {
autostart = true;
config = {
system.stateVersion = "25.05";
networking.firewall.allowedTCPPorts = [
22
80
];
services.openssh = {
enable = true;
settings.PasswordAuthentication = false;
};
environment.etc."website".source = package;
users.users.root.openssh.authorizedKeys.keys = flake.config.people.users.${user0}.sshKeys;
systemd = {
network = {
enable = true;
networks."10-enp" = {
matchConfig.Name = "enp0s3";
addresses = [
{ Address = "${ip}/24"; }
];
gateway = [ "192.168.50.1" ];
};
};
};
services.caddy = {
enable = true;
virtualHosts.":80".extraConfig = ''
root * /etc/website
file_server
try_files {path} /index.html
'';
};
microvm = {
vcpu = 1;
mem = 512;
hypervisor = "qemu";
interfaces = [
{
type = "tap";
id = "vm-ws-${user}";
mac = mac;
}
{
type = "user";
id = "vmuser-web";
mac = userMac;
}
];
forwardPorts = [
{
from = "host";
host.port = ssh;
guest.port = 22;
}
];
shares = [
{
source = "/nix/store";
mountPoint = "/nix/.ro-store";
tag = "ro-store";
proto = "virtiofs";
}
];
};
};
};
};
}

View file

@ -0,0 +1,11 @@
let
importList =
let
content = builtins.readDir ./.;
dirContent = builtins.filter (n: content.${n} == "directory") (builtins.attrNames content);
in
map (name: ./. + "/${name}") dirContent;
in
{
imports = importList;
}

View file

@ -0,0 +1,25 @@
{
flake,
config,
pkgs,
...
}:
let
inherit (import ../config { inherit flake; }) websiteVM;
inherit (flake.config.services) instances;
websiteProject =
let
websitePkg = flake.inputs.linkpage.packages.${pkgs.stdenv.hostPlatform.system}.websiteFrontend;
interfaceCfg = instances.website.interfaces.interface1;
in
websiteVM {
user = "link";
ip = interfaceCfg.microvm.ip;
mac = interfaceCfg.microvm.mac;
ssh = interfaceCfg.microvm.ssh;
userMac = interfaceCfg.microvm.macUser;
package = websitePkg;
};
in
websiteProject

View file

@ -262,7 +262,7 @@ in
cp /run/secrets/${user}-database /etc/mastodon-secrets/${user}-database cp /run/secrets/${user}-database /etc/mastodon-secrets/${user}-database
cp /run/secrets/${user}-redis /etc/mastodon-secrets/${user}-redis cp /run/secrets/${user}-redis /etc/mastodon-secrets/${user}-redis
cp /run/secrets/${user}-smtp /etc/mastodon-secrets/${user}-smtp cp /run/secrets/${user}-smtp /etc/mastodon-secrets/${user}-smtp
cp /run/secrets/${user}-fedifetcher-token /etc/mastodon-secrets/${user}-fedifetcher cp /run/secrets/${user}-fedifetcher /etc/mastodon-secrets/${user}-fedifetcher
chmod 755 /etc/mastodon-secrets chmod 755 /etc/mastodon-secrets
chmod 644 /etc/mastodon-secrets/* chmod 644 /etc/mastodon-secrets/*
''; '';
@ -450,7 +450,7 @@ in
mountPoint = "/var/lib/${serviceCfg.name}"; mountPoint = "/var/lib/${serviceCfg.name}";
proto = "virtiofs"; proto = "virtiofs";
source = "${mnt}/${serviceCfg.name}/data"; source = "${mnt}/${serviceCfg.name}/data";
tag = "${serviceCfg.name}_data"; tag = "${serviceCfg.name}_${user}_data";
} }
{ {
mountPoint = "/var/lib/postgresql"; mountPoint = "/var/lib/postgresql";

View file

@ -24,7 +24,7 @@ in
}: }:
{ {
microvm.vms = { microvm.vms = {
"${serviceCfg.name}-${user}" = { "${serviceCfg.name}-world${worldNumber}" = {
autostart = true; autostart = true;
restartIfChanged = true; restartIfChanged = true;
config = { config = {

View file

@ -152,7 +152,7 @@ in
}; };
Downloads = { Downloads = {
SavePath = "${mnt}/${serviceCfg.name}/downloads"; SavePath = "/var/lib/${serviceCfg.name}-downloads";
TempPathEnabled = false; TempPathEnabled = false;
PreAllocation = false; PreAllocation = false;
}; };
@ -172,15 +172,14 @@ in
network = { network = {
enable = true; enable = true;
networks."10-enp" = { networks."10-enp" = {
matchConfig.Name = "enp0s5"; matchConfig.Name = "enp0s6";
addresses = [ { Address = "${ip}/24"; } ]; addresses = [ { Address = "${ip}/24"; } ];
gateway = [ "192.168.50.1" ]; gateway = [ "192.168.50.1" ];
}; };
}; };
tmpfiles.rules = [ tmpfiles.rules = [
"d ${mnt}/${serviceCfg.name} 755 ${serviceCfg.name} ${serviceCfg.name} -" "d /var/lib/${serviceCfg.name}-downloads 755 ${serviceCfg.name} ${serviceCfg.name} -"
"d ${mnt}/${serviceCfg.name}/downloads 755 ${serviceCfg.name} ${serviceCfg.name} -"
]; ];
services = { services = {
@ -366,7 +365,13 @@ in
mountPoint = "/var/lib/${serviceCfg.name}"; mountPoint = "/var/lib/${serviceCfg.name}";
proto = "virtiofs"; proto = "virtiofs";
source = "${mnt}/${serviceCfg.name}"; source = "${mnt}/${serviceCfg.name}";
tag = "${serviceCfg.name}_data"; tag = "${serviceCfg.name}_${user}_data";
}
{
mountPoint = "/var/lib/${serviceCfg.name}-downloads";
proto = "virtiofs";
source = "${mnt}/${serviceCfg.name}/downloads";
tag = "${serviceCfg.name}_${user}_downloads";
} }
{ {
mountPoint = "/run/secrets"; mountPoint = "/run/secrets";
@ -391,6 +396,11 @@ in
}; };
sops.secrets = { sops.secrets = {
"caddy/share-auth" = {
owner = "caddy";
group = "caddy";
mode = "0400";
};
"torrent/${user}-wireguard-pass" = { "torrent/${user}-wireguard-pass" = {
owner = "root"; owner = "root";
mode = "0400"; mode = "0400";
@ -410,6 +420,9 @@ in
tmpfiles.rules = [ tmpfiles.rules = [
"d ${mnt}/${serviceCfg.name} 0755 microvm wheel - -" "d ${mnt}/${serviceCfg.name} 0755 microvm wheel - -"
"d ${mnt}/${serviceCfg.name}/downloads 0755 microvm wheel - -"
# "d /run/secrets/qbittorrent/caddy 755 caddy caddy -"
# "d /var/log/caddy 755 caddy caddy -"
]; ];
}; };

View file

@ -0,0 +1,25 @@
{
flake,
labHelpers,
...
}:
let
inherit (import ../../../helpers.nix { inherit flake; }) labHelpers;
inherit (labHelpers) mntPath;
inherit (import ../config { inherit flake; }) vaultwardenVM;
inherit (flake.config.people) user0;
inherit (flake.config.services.instances) vaultwarden;
interface0Cfg = vaultwarden.interfaces.interface1;
vaultwardenNick = vaultwardenVM {
user = user0;
ip = interface0Cfg.microvm.ip;
mac = interface0Cfg.microvm.mac;
userMac = interface0Cfg.microvm.macUser;
ssh = interface0Cfg.microvm.ssh;
mnt = mntPath;
host = "${interface0Cfg.subdomain}.${flake.inputs.linkpage.secrets.domains.projectsite}";
};
in
vaultwardenNick

View file

@ -1,7 +1,5 @@
{ {
config,
flake, flake,
pkgs,
... ...
}: }:
let let
@ -15,11 +13,12 @@ in
user, user,
ip, ip,
mac, mac,
ssh,
userMac, userMac,
package, package,
}: }:
{ {
microvm.vms.${serviceCfg.name} = { microvm.vms."${serviceCfg.name}" = {
autostart = true; autostart = true;
config = { config = {
system.stateVersion = "25.05"; system.stateVersion = "25.05";
@ -66,6 +65,18 @@ in
id = "vm-ws-${user}"; id = "vm-ws-${user}";
mac = mac; mac = mac;
} }
{
type = "user";
id = "vmuser-web";
mac = userMac;
}
];
forwardPorts = [
{
from = "host";
host.port = ssh;
guest.port = 22;
}
]; ];
shares = [ shares = [
{ {

View file

@ -5,7 +5,7 @@
... ...
}: }:
let let
inherit (import ../config { inherit flake config pkgs; }) websiteVM; inherit (import ../config { inherit flake; }) websiteVM;
inherit (flake.config.services) instances; inherit (flake.config.services) instances;
websiteUpRoot = websiteUpRoot =
@ -17,21 +17,10 @@ let
user = "uproot"; user = "uproot";
ip = interfaceCfg.microvm.ip; ip = interfaceCfg.microvm.ip;
mac = interfaceCfg.microvm.mac; mac = interfaceCfg.microvm.mac;
ssh = interfaceCfg.microvm.ssh;
userMac = interfaceCfg.microvm.macUser; userMac = interfaceCfg.microvm.macUser;
package = websitePkg; package = websitePkg;
}; };
websiteProject =
let
websitePkg = flake.inputs.linkpage.packages.${pkgs.stdenv.hostPlatform.system}.websiteFrontend;
interfaceCfg = instances.website.interfaces.interface1;
in in
websiteVM { websiteUpRoot
user = "project";
ip = interfaceCfg.microvm.ip;
mac = interfaceCfg.microvm.mac;
userMac = interfaceCfg.microvm.macUser;
package = websitePkg;
};
in
websiteProject // websiteUpRoot

View file

@ -17,9 +17,9 @@ in
publicKey = "fs58+Kz+eG9qAXvvMB2NkW+wa88yP61uam4HHWaBJVw="; publicKey = "fs58+Kz+eG9qAXvvMB2NkW+wa88yP61uam4HHWaBJVw=";
allowedIPs = [ allowedIPs = [
"${ceres.wireguard.ip0}/32" "${ceres.wireguard.ip0}/32"
"${instances.web.localhost.address4}/24" "${instances.web.addresses.address4}/24"
]; ];
endpoint = "${instances.web.remotehost.address0}:${builtins.toString service.ports.port1}"; endpoint = "${instances.web.addresses.address0}:${builtins.toString service.ports.port1}";
persistentKeepalive = 25; persistentKeepalive = 25;
} }
]; ];

View file

@ -11,7 +11,7 @@ mastodon:
nick-database: ENC[AES256_GCM,data:bBIjIrO0mkbg1yuLK3fP5lG/DWwwMUhqrGNTta2ejUNy,iv:HNnHryfXR+wB1f2AdY3FyDlHWDk7JPgWBRz170FKQU4=,tag:WlZdefcoWHzyPpv0bxCZ8A==,type:str] nick-database: ENC[AES256_GCM,data:bBIjIrO0mkbg1yuLK3fP5lG/DWwwMUhqrGNTta2ejUNy,iv:HNnHryfXR+wB1f2AdY3FyDlHWDk7JPgWBRz170FKQU4=,tag:WlZdefcoWHzyPpv0bxCZ8A==,type:str]
nick-redis: ENC[AES256_GCM,data:EqI1Iyy8Z00b0QzqjXsMl21zI7Bi7U8fOM+BZOiEazAE,iv:YLiiT2KLcLgS3kBKtpD/IbnEsKAuPs5XlLNH8YCEhYc=,tag:Z56WCabmtxrg4j+3eXesdQ==,type:str] nick-redis: ENC[AES256_GCM,data:EqI1Iyy8Z00b0QzqjXsMl21zI7Bi7U8fOM+BZOiEazAE,iv:YLiiT2KLcLgS3kBKtpD/IbnEsKAuPs5XlLNH8YCEhYc=,tag:Z56WCabmtxrg4j+3eXesdQ==,type:str]
nick-pass: ENC[AES256_GCM,data:WHV+iRST1H2k7muAJfp3mT0ol7l1fVDs8pG1OgBV4lKcLrMKy43wbNJ9YvK1R+CRYOh3JTbOurLAyqA50t7SvmzYKjtjXgANNx7u/mf4jgmO0TlaLxTp6Tc/YqZokUg7wgOkPRpb2+kukHIDrWPOdN0g5BFZSEvanE6ckkG0keRP,iv:XANdKTeCT4R0v7gCbuOTuXqHBN7GaiR3osW+vOt8SQ0=,tag:Ae71I4h5QweRlxoVWyJs+w==,type:str] nick-pass: ENC[AES256_GCM,data:WHV+iRST1H2k7muAJfp3mT0ol7l1fVDs8pG1OgBV4lKcLrMKy43wbNJ9YvK1R+CRYOh3JTbOurLAyqA50t7SvmzYKjtjXgANNx7u/mf4jgmO0TlaLxTp6Tc/YqZokUg7wgOkPRpb2+kukHIDrWPOdN0g5BFZSEvanE6ckkG0keRP,iv:XANdKTeCT4R0v7gCbuOTuXqHBN7GaiR3osW+vOt8SQ0=,tag:Ae71I4h5QweRlxoVWyJs+w==,type:str]
nick-fedifetcher-token: ENC[AES256_GCM,data:aqUQ1K2zCb1aicqiUwhJ9cniB6LCzGxkj26ZRT4NlZwki38Ktorf4Ntor7k=,iv:tSthNg5ubEXOUfqA4xCfaDx1LTheqiiV48XqtPEm0HQ=,tag:lxXt1G9ll5iVC/phSyO/BQ==,type:str] nick-fedifetcher: ENC[AES256_GCM,data:bAKgS3gQ2qu+6woZU/vKYhWOdJDLN9HNJbfSCkTCFksUPgIE3Uq5ugtCk3U=,iv:LXC36MpeaQwbfm1rcgvVPO2WI1P0cKe+LLtCnKxIx+Y=,tag:ie34tbpUPTODrSYTmWwYEA==,type:str]
peertube: peertube:
smtp: ENC[AES256_GCM,data:yrx7Ovy3zmApaODk+V3k26XJDUj5sGr0YAQ168V/o0dY,iv:s2P2Rf5/QnjBeNgFTXpXKPI+y8P97RJqaXRK4b19V/w=,tag:4X830RBQFzx1Mirwd5smeA==,type:str] smtp: ENC[AES256_GCM,data:yrx7Ovy3zmApaODk+V3k26XJDUj5sGr0YAQ168V/o0dY,iv:s2P2Rf5/QnjBeNgFTXpXKPI+y8P97RJqaXRK4b19V/w=,tag:4X830RBQFzx1Mirwd5smeA==,type:str]
database: ENC[AES256_GCM,data:T7cd/jrmpzdKuE7nZ6/Zh4DI8E35J26Jn/wt3yZEf+ce,iv:wfeoQljDlp0/isxsbH04ZRG31KTY0d0mBsShjy89ddo=,tag:XrtzpyRr6wvkArg2pGObBQ==,type:str] database: ENC[AES256_GCM,data:T7cd/jrmpzdKuE7nZ6/Zh4DI8E35J26Jn/wt3yZEf+ce,iv:wfeoQljDlp0/isxsbH04ZRG31KTY0d0mBsShjy89ddo=,tag:XrtzpyRr6wvkArg2pGObBQ==,type:str]
@ -22,10 +22,10 @@ forgejo:
nick-database: ENC[AES256_GCM,data:Hzojzr1TvFFfnQO2Dm8c3+QMVejqWPqsMTR+hMCaddtu,iv:4gs+yuoqjkJWrsGKhhaeXXWE3PKOZgEcbOprbUUmP/w=,tag:ul7XkzbVLGbRfwBGvhGQbQ==,type:str] nick-database: ENC[AES256_GCM,data:Hzojzr1TvFFfnQO2Dm8c3+QMVejqWPqsMTR+hMCaddtu,iv:4gs+yuoqjkJWrsGKhhaeXXWE3PKOZgEcbOprbUUmP/w=,tag:ul7XkzbVLGbRfwBGvhGQbQ==,type:str]
nick-smtp: ENC[AES256_GCM,data:wJ3Q86tVNS1V+lzOrV4IbnoR1FzJg4CoTPvjfKvN/me+,iv:yF4nZw4c6L1MoD9maXaZBNr9EgLHM0ij5468P/wzHxI=,tag:yz01ukHdwKWc+Ph6QSaiNg==,type:str] nick-smtp: ENC[AES256_GCM,data:wJ3Q86tVNS1V+lzOrV4IbnoR1FzJg4CoTPvjfKvN/me+,iv:yF4nZw4c6L1MoD9maXaZBNr9EgLHM0ij5468P/wzHxI=,tag:yz01ukHdwKWc+Ph6QSaiNg==,type:str]
zookeeper: zookeeper:
nick-env: ENC[AES256_GCM,data:Uhnk1fbHAOOpS7od9cd88JotcCqK0dWKVVV0I56/D90+pDKJ5qLKO0AnrF8ebNd8HgKMc7bkO/fO0AHRtKcei4jk5hg5vsM4EA==,iv:WR4wnxmA0XWjSwgAnFJcTUy63WJzfWiC5/ogPStR0r4=,tag:rDE3OktnQN5xJW5WXVcOlA==,type:str] boon-env: ENC[AES256_GCM,data:3aOlOkYHxpao4/+Ubud4LfyZ3yQonN0FtHEYvQHEPNjTcqJiltuXrRr0ZaJ7RwY+A/IunuZVhrjngCBRj+TWBZZ2i+uaf0BEuA==,iv:53H5+rcRIui2d71K3QTj5LYg/ae4TGOFe96t2zxQh2o=,tag:vR3IOm2XFmODLQZDTlY1zw==,type:str]
minecraft: minecraft:
nick-world0: ENC[AES256_GCM,data:r3cBMW662UaoRBy6dzIqWRlaFHopfN/t5g==,iv:Nr+lvEQTT+PDP8OMH6mUyWKo92ejRfO4fXAERMxg8sQ=,tag:2WevPfTYN4/NJNea/JwPqg==,type:str] nick-world01: ENC[AES256_GCM,data:skiM+L/uEEnst0pCDzB5XaHnLpWrLQBXuQ==,iv:CnlXwpB4paDQSaC2W9uQRTc2rgqCo6QTGC4SsYAMw6Y=,tag:D2r2X6flowP7tjuX74KzRg==,type:str]
nick-world1: ENC[AES256_GCM,data:/npb82dKLypMDkq01F1eyb+aPiqzcgL9wUX3bMLgEYk5,iv:9JWvq9E5+Gs3T9y9YqrkXbF9kl0lAWPseVK+OBrQR/w=,tag:XziFN0BMs+Nk+54vkc4+ig==,type:str] nick-world02: ENC[AES256_GCM,data:tEh+uThkn8VczSjviU58/vBUmyKBfiA7tnYiBsIlgjSb,iv:yfQvffZ3AlT4lpfEkBT5gVacogaQoIZSim+gpoD7LkU=,tag:E7matzOY08rapIxaW9lOdg==,type:str]
vaultwarden: vaultwarden:
nick-env: ENC[AES256_GCM,data:lG7pqpLJ7OsFZhWCJcPnvDxkR4Ob78buazUeLWlRSAPYEv8KarymYduecJNWCZUjUlysoU5YrHaat8tny+Vl2rYdef8oPfqlf7fITofsdmjHhAGUBJEEVQWLyEXqrEebEyeNKZwI+u8=,iv:SNptt0CPcSCTs6AAWLcC+U0/94oQapqmT1K8ZN/bIfM=,tag:2/1A+DwuWOIr0eoJmZTnwA==,type:str] nick-env: ENC[AES256_GCM,data:lG7pqpLJ7OsFZhWCJcPnvDxkR4Ob78buazUeLWlRSAPYEv8KarymYduecJNWCZUjUlysoU5YrHaat8tny+Vl2rYdef8oPfqlf7fITofsdmjHhAGUBJEEVQWLyEXqrEebEyeNKZwI+u8=,iv:SNptt0CPcSCTs6AAWLcC+U0/94oQapqmT1K8ZN/bIfM=,tag:2/1A+DwuWOIr0eoJmZTnwA==,type:str]
dns: dns:
@ -88,7 +88,7 @@ sops:
bXBOa1VSakoyaWxpODJEOU11QUZCaUEK8Ch9Ten3DdrPHF1DTH2qei85AlHUOaLD bXBOa1VSakoyaWxpODJEOU11QUZCaUEK8Ch9Ten3DdrPHF1DTH2qei85AlHUOaLD
aNfzakake7ej+MxJYdKEU0bcWofNMKzIlZa2uM10KZSENDP8d8qlig== aNfzakake7ej+MxJYdKEU0bcWofNMKzIlZa2uM10KZSENDP8d8qlig==
-----END AGE ENCRYPTED FILE----- -----END AGE ENCRYPTED FILE-----
lastmodified: "2025-12-10T02:07:35Z" lastmodified: "2025-12-10T06:36:31Z"
mac: ENC[AES256_GCM,data:W+q1Qy0tWuWBVQyVoyE2xnfxHEnHvBTt+HWnx/gEK4i+jgnJFGCn8EjZycBwr9jrMTCf70HpSnPIyKd8xg0n6E49Y0yHq6WBOG2K3SKFueqohljNf4QfpG4Gtrr6pyWFXDs5WKdRd9iszTs8jZ4bnOVNsMBggE5r8Sqt4Pu6Ico=,iv:1Pp2nLyjhSRnjPCBzFRll7m+NO/h7Y5l+nCXOoEGE6Q=,tag:9KPuFI0keIsVF5c6BPyQow==,type:str] mac: ENC[AES256_GCM,data:8juvjbgS2dM8KMJwRjXlf7GH5pSPkn9y+RmJ6ZNJLPeUKl7OONY/0iAKCdzLJUyT2lWszRAuL0lLahumqjT/DowwBODBv4RmkM8z/FYpY6emEe9PY8ZLs+QXGfiUavJX2Y98QIkEQCp3Ad+dmQzwHpYm2iYV2gUBtX2QH+NkfEk=,iv:ty71OQjZC0Z+G8verBOBUIKx+aZ9NDwx6sf5BbmYcW0=,tag:uAdU1a5g0elRGyCTH0PETA==,type:str]
unencrypted_suffix: _unencrypted unencrypted_suffix: _unencrypted
version: 3.11.0 version: 3.11.0

View file

@ -42,7 +42,7 @@ in
sops = sops =
let let
sopsPath = secret: { sopsPath = secret: {
path = "${interfaceCfg.paths.secretPaths.path0}/${serviceCfg.name}-${secret}"; # path = "${interfaceCfg.paths.secretPaths.path0}/${serviceCfg.name}-${secret}";
owner = "root"; owner = "root";
mode = "600"; mode = "600";
}; };