chore: weekly flake update #16

Merged
pazpi merged 6 commits from auto-update/2026-01-30 into master 2026-02-04 10:41:13 +01:00
36 changed files with 111 additions and 122 deletions

View file

@ -1,3 +1,3 @@
# Containers # Containers
Easy to deploy in portainer that nix For deployments via Dockhand (WIP)

36
flake.lock generated
View file

@ -39,11 +39,11 @@
"uv2nix": "uv2nix" "uv2nix": "uv2nix"
}, },
"locked": { "locked": {
"lastModified": 1768220016, "lastModified": 1769348998,
"narHash": "sha256-jIYGoq90mDkeVEM9r9CHa/3H1ByYp7ZkE0IRf+haysE=", "narHash": "sha256-nP4gw7bdwYGa+TQEvpMrYrp6/wsGklrC2cmIUjP4HNI=",
"owner": "nix-community", "owner": "nix-community",
"repo": "authentik-nix", "repo": "authentik-nix",
"rev": "94c544f6cd51735728391c8e9463efc893ddf26b", "rev": "eee255ff2ffd90477889740a56ee75cf7020886e",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -55,11 +55,11 @@
"authentik-src": { "authentik-src": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1769201216, "lastModified": 1769532389,
"narHash": "sha256-IGtjOOtjJb8qoVC5HAq2Sb8VgdW3PjNFamNtwHqKpEY=", "narHash": "sha256-DO7wfgQBZ2uecbr+nptSHbz06ErT415SDucg7JFg7Y0=",
"owner": "goauthentik", "owner": "goauthentik",
"repo": "authentik", "repo": "authentik",
"rev": "b72e3b55a0d7b9873231b2f0a845331f1f8d4db7", "rev": "aafb7cb7dc709eead634b5570b01d9e04f272d7a",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -262,11 +262,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1768949235, "lastModified": 1769580047,
"narHash": "sha256-TtjKgXyg1lMfh374w5uxutd6Vx2P/hU81aEhTxrO2cg=", "narHash": "sha256-tNqCP/+2+peAXXQ2V8RwsBkenlfWMERb+Uy6xmevyhM=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "75ed713570ca17427119e7e204ab3590cc3bf2a5", "rev": "366d78c2856de6ab3411c15c1cb4fb4c2bf5c826",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -360,11 +360,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1769086393, "lastModified": 1769302137,
"narHash": "sha256-3ymIZ8s3+hu7sDl/Y48o6bwMxorfKrmn97KuWiw1vjY=", "narHash": "sha256-QEDtctEkOsbx8nlFh4yqPEOtr4tif6KTqWwJ37IM2ds=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "9f7ba891ea5fc3ededd7804f1a23fafadbcb26ca", "rev": "a351494b0e35fd7c0b7a1aae82f0afddf4907aa8",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -376,11 +376,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1769089682, "lastModified": 1769598131,
"narHash": "sha256-9yA/LIuAVQq0lXelrZPjLuLVuZdm03p8tfmHhnDIkms=", "narHash": "sha256-e7VO/kGLgRMbWtpBqdWl0uFg8Y2XWFMdz0uUJvlML8o=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "078d69f03934859a181e81ba987c2bb033eebfc5", "rev": "fa83fd837f3098e3e678e6cf017b2b36102c7211",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -407,11 +407,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1769018530, "lastModified": 1769461804,
"narHash": "sha256-MJ27Cy2NtBEV5tsK+YraYr2g851f3Fl1LpNHDzDX15c=", "narHash": "sha256-msG8SU5WsBUfVVa/9RPLaymvi5bI8edTavbIq3vRlhI=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "88d3861acdd3d2f0e361767018218e51810df8a1", "rev": "bfc1b8a4574108ceef22f02bafcf6611380c100d",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -12,7 +12,11 @@ in
oidc = { oidc = {
clientId = "FiIJTqBIlMKmeSBjznUFgXIJadt71av8dfICvZvf"; clientId = "FiIJTqBIlMKmeSBjznUFgXIJadt71av8dfICvZvf";
endpoint = "https://auth.pasetto.me/application/o/dashy/"; endpoint = "https://auth.pasetto.me/application/o/dashy/";
scope = ["openid" "profile" "email"]; scope = [
"openid"
"profile"
"email"
];
}; };
}; };
webSearch = { webSearch = {
@ -325,10 +329,10 @@ in
}; };
items = [ items = [
{ {
title = "Portainer"; title = "Docker";
description = "Container Management"; description = "Container Management";
url = "https://portainer.${p.domains.public}"; url = "https://${p.hosts.docker}.${p.domains.public}";
icon = "hl-portainer"; icon = "hl-docker";
} }
{ {
title = "Primary DNS"; title = "Primary DNS";
@ -354,7 +358,7 @@ in
url = "https://node.${p.domains.public}:8006"; url = "https://node.${p.domains.public}:8006";
icon = "hl-proxmox"; icon = "hl-proxmox";
} }
{ {
title = "Krzo"; title = "Krzo";
description = "Proxmox Node"; description = "Proxmox Node";
url = "https://krzo.${p.domains.public}:8006"; url = "https://krzo.${p.domains.public}:8006";

View file

@ -125,7 +125,7 @@ in
uptime-kuma.proxy = { uptime-kuma.proxy = {
enable = true; enable = true;
domain = p.domains.public; domain = p.domains.public;
host = p.hosts.portainer; host = p.hosts.docker;
}; };
librenms.proxy = { librenms.proxy = {
@ -172,17 +172,22 @@ in
} }
{ {
subdomain = "ai"; subdomain = "ai";
host = "http://${p.hosts.portainer}:4080"; host = "http://${p.hosts.docker}:4080";
domain = p.domains.public; domain = p.domains.public;
} }
{ {
subdomain = "keep"; subdomain = "keep";
host = "http://${p.hosts.portainer}:3000"; host = "http://${p.hosts.docker}:3000";
domain = p.domains.public; domain = p.domains.public;
} }
{ {
subdomain = "maps"; subdomain = "maps";
host = "http://${p.hosts.portainer}:48080"; host = "http://${p.hosts.docker}:5000";
domain = p.domains.public;
}
{
subdomain = "dock";
host = "http://${p.hosts.docker}:3333";
domain = p.domains.public; domain = p.domains.public;
} }
]; ];
@ -193,11 +198,6 @@ in
virtualisation = { virtualisation = {
proxmox.enable = true; proxmox.enable = true;
portainer.proxy = {
enable = true;
domain = p.domains.public;
host = p.hosts.portainer;
};
}; };
}; };

21
hosts/docker/default.nix Normal file
View file

@ -0,0 +1,21 @@
{
pkgs,
lib,
...
}:
{
my = {
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
monitoring.uptime-kuma.enable = true;
virtualisation = {
proxmox.enable = true;
};
};
system.stateVersion = "24.11";
}

View file

@ -29,7 +29,7 @@
"auth" "auth"
"metrics" "metrics"
"nextcloud" "nextcloud"
"portainer" "docker"
"vaultwarden" "vaultwarden"
"immich" "immich"
"firefly-iii" "firefly-iii"
@ -155,12 +155,12 @@
]; ];
}; };
portainer = { docker = {
module = ./portainer; module = ./docker;
tags = [ tags = [
"lxc" "lxc"
"bacco" "bacco"
"portainer" "docker"
"secondary" "secondary"
]; ];
}; };

View file

@ -104,7 +104,7 @@ in
"${p.hosts.nextcloud}:${defaultNodePort}" "${p.hosts.nextcloud}:${defaultNodePort}"
"${p.hosts.vaultwarden}:${defaultNodePort}" "${p.hosts.vaultwarden}:${defaultNodePort}"
"${p.hosts.plex}:${defaultNodePort}" "${p.hosts.plex}:${defaultNodePort}"
"${p.hosts.portainer}:${defaultNodePort}" "${p.hosts.docker}:${defaultNodePort}"
]; ];
} }
]; ];

View file

@ -17,7 +17,7 @@ in
nextcloud = "nextcloud.${private-domain}"; nextcloud = "nextcloud.${private-domain}";
vaultwarden = "vaultwarden.${private-domain}"; vaultwarden = "vaultwarden.${private-domain}";
plex = "plex.${private-domain}"; plex = "plex.${private-domain}";
portainer = "portainer.${private-domain}"; docker = "docker.${private-domain}";
colmena = "colmena.${private-domain}"; colmena = "colmena.${private-domain}";
pve01 = "bacco${private-domain}"; pve01 = "bacco${private-domain}";
pve02 = "node.${private-domain}"; pve02 = "node.${private-domain}";

View file

@ -1,38 +0,0 @@
{
config,
pkgs,
lib,
...
}:
let
portainerDataDir = "/var/lib/portainer"; # Define the directory for persistent data
in
{
age.secrets.watchtowerSecrets.file = ../../secrets/watchtower-secrets.age;
my = {
utils = {
commons.enable = true;
lxc-standard.enable = true;
};
monitoring.uptime-kuma.enable = true;
virtualisation = {
proxmox.enable = true;
portainer = {
enable = true;
enableWatchtower = true;
environmentSecrets = config.age.secrets.watchtowerSecrets.path;
};
};
};
# Extra packages
environment.shellAliases = {
docker = "sudo docker";
};
system.stateVersion = "24.11";
}

View file

@ -103,7 +103,7 @@ in
final: prev: { final: prev: {
authentikComponents = prev.authentikComponents // { authentikComponents = prev.authentikComponents // {
gopkgs = prev.authentikComponents.gopkgs.override { gopkgs = prev.authentikComponents.gopkgs.override {
buildGo124Module = pkgs.buildGo125Module; buildGo125Module = pkgs.buildGo125Module;
}; };
}; };
} }

View file

@ -16,7 +16,7 @@ let
machines.caddy machines.caddy
machines.metrics machines.metrics
]; ];
watchtower-secrets = [ machines.portainer ]; watchtower-secrets = [ machines.docker ];
authentik-env = [ machines.auth ]; authentik-env = [ machines.auth ];
dns01-admin-password = [ machines.dns01 ]; dns01-admin-password = [ machines.dns01 ];
dns02-admin-password = [ machines.dns02 ]; dns02-admin-password = [ machines.dns02 ];

Binary file not shown.

Binary file not shown.

View file

@ -1,9 +1,10 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 qaHa5g JDYajBrgbhmlxlp6BOYmayavSBD0kkJpCHvckczl2Hc -> ssh-ed25519 qaHa5g r1s6gQZZ6spXDa3YksYXbcYtwQxjYCnYqRlL2b3shzc
Vea1sj6nmQ2VU+5Kf2M02BcDLS+vWDqjsvLzruSHKkE gFyNsuyXpcrhKKuXUQnKVvC7rAZaoJAALxV9St51F7s
-> ssh-ed25519 uqg2jw uXzaoV/Sq3Y2DQmAxMyOtP69WUEWQj2RcCS0VHnrbU0 -> ssh-ed25519 uqg2jw mAExf33ZWQC/otjOlponu8aJlVlqpZH5w7R1C+xBUy8
QYJD7NY/hdIzfyovYIHz1b2JSTzov+8MCoNAYkeOCK0 G0wDMc1j8xEUWlA+Om7rCJwN3uuPLr9mgM/ZjqXSBL4
-> ssh-ed25519 a0HhMw hm8GkkuScZiCM+jY6HEZpPlzQpAJ5NxMMMoGl/oCwQ4 -> ssh-ed25519 a0HhMw trAZZw0oVhlecjdN13R2aGXKSxE4c/LXELT6i+sKnQc
/sGmc7XTdXyxgScF2huBnoho38Ie3maw4KHHHDWkiRw ++dsWaAUTPZqZb3TqggDeLjErh/8Wv9PnLp7/j/13Qc
--- U5Hy5/jK+Yej2y1hwbM+mIpxmxraYdwx/ka2EduPCek --- NLfCOJgGIqI3vCrRs+4pQ2gqKkTkVh/VK4O3PxnNiXA
,÷¡ÿ`›ùˆÚàŸ~Q³ …£§v¢ßHÒ<48>|5¼ï¡ùO€a¿n_±àSêg ˆTûš?#0Q[@±_)ñK„f<E2809E>KÈÚ}9¸QÝ«±úhÓ
œ7³ì)Žn¬É

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -1,9 +1,11 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 xSWWeQ 1ELSHFW5xDmS3R5XpEBecA3+vMJzYskLaDgWIYZAMRU -> ssh-ed25519 xSWWeQ a1i+WDaOrAuTQJYpCV7/zZ25mgDLUtFf1isc8uTvUCc
4nTfGewJ4pm1xTBo9CDO9hdNYnCSrJ2FfSe1qeGt5Bs n5ge1cJ1bp3LzhleDUEZbmYYK17HKurwhfded0YJjQo
-> ssh-ed25519 uqg2jw DCqusDELTWtg6X+xl6S97LS3f0BfsoKnSa68aLQbtxM -> ssh-ed25519 uqg2jw VS1osLeEyC11hg4/jdVrFcF20Y1243zJPWjiF6ongkw
8qxUZpiRDe6yzqy0KhS19JerfBA57etTzz7+UjhujlU XGoL5+8/ccfndcM+lUzs7yShS1WgSLT7AHeJSEHSOFA
-> ssh-ed25519 a0HhMw JNKlu6vvAbLuc0xGFad/3HihP9uUuRbhBkZOPgubcgg -> ssh-ed25519 a0HhMw xxzIyXafnVGv70rb5G7JNL2gYXELNAjw0tieWUPZjU4
jrW5wU1vnbk1ltDFtQJSbLGWveT98BexkOajoYc/HxA 01ag9xGVFI76aBaUpuXdxg3VmEB3FpoRhYNwsRlz8b4
--- atlqyy47gXhvPf+gWm7DmhwJ0N7lDOwoEiIp3P4dAHQ --- QfrxirayYUNwCnoSR5T7aP+j2DUPyKdZYEaFmd2vRnc
w7Wá Ó9ä;Ëe³è¸Ì³Ƶ–²­J ^à<úÆS?²4(°e¸!ÐXtˆ"6i{y.Þ}ìÛ‹^%ú+:ÔŠ¹YÝ!C6i )ͦãòV07Í”¤Tô¡‰VêÈ®B²=ô«ò9žVzÃ(ˆ,^—–èðRq£écmnl^<kyÎVcŠ,qL¹- ·æà
. ÄÙm3Ù•m[ât[ƒ2áÝC$ÕJiv¹î|cÅhVÓbÇ9Päe"Í”¦I~Á@èæÿ°ìŽÞþÇw“c
§`ñé'Ž_×OJžXª:âWN˜ §¦|´% H?ÒbûOe_0#¯´ü.ÏðBiΫµf<C2B5>â“ÂNIÕy}<05>ÑQmF ²ù ›¯<59>âÛsRSl­ª<C2AD>l

View file

@ -1,10 +1,9 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 VfYKTQ xMoobFdxUR6z+ZpRQbu69K6DfjFouS2/VeY14z6aBlI -> ssh-ed25519 VfYKTQ AbM14mSwas9zGjq+LusHB35CP2vj1B7VcZbYHbkqzho
Yana0VF9enzOkV/BzZ7z7tmhWDEiCSJzzaiJpjOC+IU ImZfK7ICMHhhMJGWHDlm/2PpUSPVCohiQXJeADH6m5k
-> ssh-ed25519 uqg2jw zCL88Iu2tKMpHjcZwe/0CV04acj0vzJok3T7enf/zUQ -> ssh-ed25519 uqg2jw BciWCj0ArQ0j3zXH0FJGvqWcME3UMWOo4Q5c4R015RA
fnrg9+13tzjL0sIiLP2WWKeYufL3ksm8HHljEnIAZJs djrxeoG6DRXKqjnJTrFjY8iZB6mlpmF8s9c5VkS1l/E
-> ssh-ed25519 a0HhMw AMKdtR6XaroB3cGuXCYc2Fw3HHwNcBXvRC1lWH1CLgk -> ssh-ed25519 a0HhMw RiZ6SKx1Bww4/TARRDS0ZSaU9pweqbrE+TbtPLNOuQY
HFwgqLhfuHy4+XMafonoqDjgaaQ+L5s71cP+/3kVt+o OxNw2jmEQ7y/Pd34yMYIP0/wVVEFvMg16tQF6FzVr6Q
--- qqPpy+/ZW87v13ptI33zO1yxIVkoU0D/dKh6dmcogRw --- 1dC9eVZB5S8zx18K1XyJOQUKOsAv4WlXhHXuij3XNMM
©)ĐäKÝľ_¬Á_ »më`"3iNnx¼3f°êY6Ǭ ÀÙ¾û©¬è„¿;¿Ÿ0JÅ™DP
77Á c%{UsĘiçićČŇ ˝^ŚQ;<šô»îf

View file

@ -1,10 +1,9 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 S1eK8A F5K7JIXTSg+5AfFuRsFtbxhbX/3a/x7SNZ9eiiG2FXo -> ssh-ed25519 S1eK8A nuwCf9oMLnaY4No1xiDJlHiCctR5brAyjAi7y/8sUlQ
umaFiXV9ypTxdXzRl/X37fyQlWwFsug7TD+prQ4w97I r4TBp9fLxthd0tyZOvO8HLbxWF31xepvHn+TKUDTbT8
-> ssh-ed25519 uqg2jw JaT2wgqEQpnfbzspUpEBpa8M5OCYs53RnRwWpaWpzSA -> ssh-ed25519 uqg2jw JFJoBxg5FXacTlg1RdP7nMXOlI49/ztVOLAfhjDHuVE
OHp83Xf5WdHNxG3Wsm4zsy9wOLZDcoaFpRxQGtoNdi8 J0FM0sVFcT75b4FJtmLya4GTm8ytvW+G2/PsSyzwguQ
-> ssh-ed25519 a0HhMw yZEM714bWIN657VGrGDBmSZZljOURIZwYZmKV+Zyi1Q -> ssh-ed25519 a0HhMw ZyQIQhEXiA4ZKB/T3KrNVbkHPUY0DyFxEmWgGrvY31Y
nL1koyimO4OGaE2c1Mbm+9u6GR7Axi3t3Ay842ck9kQ Pc0G82/RgETkawX346yFRMjh3GiVrs9g9i28Zh/1pZg
--- ycl+WPu2ZtL+Av2/hTn8tJOkVrQPjNwdp1R4fwI4ObI --- yIhMYtPBSmLN2w2012b2jgcJsDzH27/I9Fi/ChZX7MM
ü.Cø­è/ ゥ_<EFBFBD>B9p]勳、fXR#aゥ4ニpスIu.6ΠPソqw|躁[w=p播
4©2¢Gq%zÓ)ý<>&îbLr“jäóyÒ!Ñ*IúçE>Œð

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -1,9 +1,9 @@
age-encryption.org/v1 age-encryption.org/v1
-> ssh-ed25519 HvFEmA Q+XkhVoaICO0J/pa2m+oxiScwCOhoH/Erbzxb4QwuDQ -> ssh-ed25519 HvFEmA UWbeWTSBZ78hSnN4jozMvMUUsNnG8CfcoDbJ7KXt9yk
wexloSa07qcMCp6nZDz+fE3eAQJJ6VKcF8zNoAm3GhE 5H0/lJ2fy/4nGqTzOGX8apfNqOEhDKy/vMy4gbx+bPM
-> ssh-ed25519 uqg2jw Q+MFZ9kpICAk65WAx1l0JyPwUFdBEQQDvwUdOkOghwQ -> ssh-ed25519 uqg2jw tCXS8mQPkIvlosi3Y7Auy9CQ39ikfDYB6lJ5tmmbCzU
3i5249ur+HAuDIflPEgHG9/i+ZMlMU/IY95mbuAiYaM iLeWcqkgqgUxKexVUast1Sp4TbLXSMU+NNyJyT1PU4A
-> ssh-ed25519 a0HhMw IuLcBhMtGOW8HXIxSGZuIVX15lfsPpgx2sBPwSQ4dVM -> ssh-ed25519 a0HhMw uaYgjglhXYZPYi4QqH6xitkkduJTE/Af7x2zsRCUc10
F+jlFf4Mdyt7bcUimFWQajlIvFhGnckxdxrxQdJ87NY bZRzpwR6vCCx1Dnu6u2fZ3Ud+qciXQFq640kkzSKtm8
--- YMyXtuT9aN/Le5+XZuHojFrfCjILigxdP9VWsBxi7VY --- a5/HmRVLLvwE1ViHhUi8UcwN5iaumYXP1Weqx1MM7yU
(޲{b{ЮR±3YcÎ¥5T{CâÄ»òMŠfƒ©}ÆÁé šcÓg—Ó<1E>ïgbØjú´³‰U.û°îVUŠCx»c«£ÅÁhçu9R-::í`OºŒ Ù< á¬|ø°”gz·†ßNýj¨þ©rRæ}BtÞXhõ·ð¹$G)LÏ £¤¦º=W¸^h Qwið¡üøxŒ^ ~®=…[°ý@k ±¨/+¢êÉA÷”7

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View file

@ -13,7 +13,7 @@ rec {
nextcloud = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGYobAlQ9tPKjyh7eE2Ku81ZiMY6OWd3ELDqo+xBmjbC"; nextcloud = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGYobAlQ9tPKjyh7eE2Ku81ZiMY6OWd3ELDqo+xBmjbC";
vaultwarden = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOW9uYQpPMiKvI/KFRvd/5f9J8a0zLaQxstWRI8VNObV"; vaultwarden = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOW9uYQpPMiKvI/KFRvd/5f9J8a0zLaQxstWRI8VNObV";
plex = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINp9itRJGSSVWLxwrcudyGUNOOKl+qqtf+IzLHrhffyt"; plex = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINp9itRJGSSVWLxwrcudyGUNOOKl+qqtf+IzLHrhffyt";
portainer = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMgg4SKMCw2/21l1crY7trFnrCmNSrkYPl3vEDnJ8aQn"; docker = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMgg4SKMCw2/21l1crY7trFnrCmNSrkYPl3vEDnJ8aQn";
auth = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFsSQbXHRt+MpUh+YQxd5p6YPnbbWR/4ylz/pXjdZ9Bs"; auth = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFsSQbXHRt+MpUh+YQxd5p6YPnbbWR/4ylz/pXjdZ9Bs";
dns01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII7BdiP/dCE6FHoJylcBKQ5AXz06UpLHNyeuvfLVccSi"; dns01 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII7BdiP/dCE6FHoJylcBKQ5AXz06UpLHNyeuvfLVccSi";
dns02 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ+HIq6/ebjiv71xDozdOTn5AdnXgr1fGqIzXnH7Not+"; dns02 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJ+HIq6/ebjiv71xDozdOTn5AdnXgr1fGqIzXnH7Not+";
@ -26,6 +26,7 @@ rec {
n8n = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP18IdsIxK7EdIOLSONJ4NA6AfLnM/3NkR3+OCDvJWXJ"; n8n = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIP18IdsIxK7EdIOLSONJ4NA6AfLnM/3NkR3+OCDvJWXJ";
librenms = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM/dmfOVzj37ZYwLTs+jjQUQYRIgvW3NrtBDsr8rllss"; librenms = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIM/dmfOVzj37ZYwLTs+jjQUQYRIgvW3NrtBDsr8rllss";
immich = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF8H49AYwKmHLV5QwgqNjlFRhLVg/k3/kKR53/ihz/cu"; immich = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF8H49AYwKmHLV5QwgqNjlFRhLVg/k3/kKR53/ihz/cu";
ilpost-podcast = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHo3tGrspZlSVbC1X/MHFFwDGj8G8+ZrZihU28DkbJEh";
}; };
# Machines able to provisioning other machines # Machines able to provisioning other machines