diff --git a/hosts/nougat-2/acme.nix b/hosts/nougat-2/acme.nix new file mode 100644 index 0000000..e0d7b42 --- /dev/null +++ b/hosts/nougat-2/acme.nix @@ -0,0 +1,43 @@ +{ + config, + lib, + pkgs, + self, + ... +}: let + exDomain = (import ./ex-domain.nix) lib; + pubsolarDomain = import ./pubsolar-domain.nix; + + hostingdeProviderConf = { + dnsProvider = "hostingde"; + credentialsFile = "${pkgs.writeText "hostingde-creds" '' + HOSTINGDE_API_KEY_FILE=${config.age.secrets."hosting.de-api.key".path} + ''}"; + }; +in { + age.secrets."hosting.de-api.key" = { + file = "${self}/secrets/hosting.de-api.key"; + mode = "440"; + owner = "acme"; + }; + + security.acme = { + acceptTerms = true; + defaults.email = "acme@benjaminbaedorf.eu"; + + certs."b12f.io" = hostingdeProviderConf; + certs."mail.b12f.io" = hostingdeProviderConf; + certs."transmission.b12f.io" = hostingdeProviderConf; + + certs."${exDomain}" = hostingdeProviderConf; + certs."mail.${exDomain}" = hostingdeProviderConf; + + certs."${pubsolarDomain}" = hostingdeProviderConf; + certs."www.${pubsolarDomain}" = hostingdeProviderConf; + certs."auth.${pubsolarDomain}" = hostingdeProviderConf; + certs."git.${pubsolarDomain}" = hostingdeProviderConf; + certs."ci.${pubsolarDomain}" = hostingdeProviderConf; + certs."list.${pubsolarDomain}" = hostingdeProviderConf; + certs."obs-portal.${pubsolarDomain}" = hostingdeProviderConf; + }; +} diff --git a/hosts/nougat-2/caddy.nix b/hosts/nougat-2/caddy.nix new file mode 100644 index 0000000..727054a --- /dev/null +++ b/hosts/nougat-2/caddy.nix @@ -0,0 +1,141 @@ +{ + config, + lib, + pkgs, + self, + ... +}: let + pubsolarDomain = import ./pubsolar-domain.nix; +in { + networking.networkmanager.unmanaged = ["interface-name:ve-caddy"]; + networking.nat = { + enable = true; + + internalInterfaces = ["ve-caddy"]; + externalInterface = "enp0s31f6"; + + # Lazy IPv6 connectivity for the container + enableIPv6 = true; + }; + containers.caddy = { + autoStart = true; + privateNetwork = true; + hostAddress = "192.168.101.0"; + localAddress = "192.168.102.0"; + hostAddress6 = "fc00::1"; + localAddress6 = "fc00::2"; + + forwardPorts = [ + { + containerPort = 443; + hostPort = 443; + protocol = "tcp"; + } + { + containerPort = 80; + hostPort = 80; + protocol = "tcp"; + } + ]; + + bindMounts = { + "/srv/www/" = { + hostPath = "/data/www/"; + isReadOnly = false; + }; + }; + + config = { + services.caddy = { + enable = lib.mkForce true; + group = "hakkonaut"; + email = "admins@pub.solar"; + globalConfig = lib.mkForce '' + auto_https off + ''; + acmeCA = null; + virtualHosts = { + "dashboard.nougat-2.b12f.io" = { + extraConfig = '' + reverse_proxy :2019 + ''; + }; + "www.b12f.io" = { + extraConfig = '' + redir https://pub.solar{uri} + ''; + }; + "mail.b12f.io" = { + extraConfig = '' + redir / /realms/pub.solar/account temporary + reverse_proxy :8080 + ''; + }; + + "${pubsolarDomain}" = { + logFormat = lib.mkForce '' + output discard + ''; + extraConfig = '' + # PubSolarOS images + handle /os/download/* { + root * /srv/www + file_server /os/download/* browse + } + # serve base domain pub.solar for mastodon.pub.solar + # https://masto.host/mastodon-usernames-different-from-the-domain-used-for-installation/ + handle /.well-known/host-meta { + redir https://mastodon.${pubsolarDomain}{uri} + } + # pub.solar website + handle { + root * /srv/www/pub.solar + try_files {path}.html {path} + file_server + } + # minimal error handling, respond with status code and text + handle_errors { + respond "{http.error.status_code} {http.error.status_text}" + } + ''; + }; + "www.${pubsolarDomain}" = { + logFormat = lib.mkForce '' + output discard + ''; + extraConfig = '' + redir https://${pubsolarDomain}{uri} + ''; + }; + "auth.${pubsolarDomain}" = { + logFormat = lib.mkForce '' + output discard + ''; + extraConfig = '' + redir / /realms/${pubsolarDomain}/account temporary + reverse_proxy 192.168.103.0:8080 + ''; + }; + "git.${pubsolarDomain}" = { + logFormat = lib.mkForce '' + output discard + ''; + extraConfig = '' + redir /user/login /user/oauth2/keycloak temporary + reverse_proxy 192.168.101.0:3000 + ''; + }; + "ci.${pubsolarDomain}" = { + logFormat = lib.mkForce '' + output discard + ''; + extraConfig = '' + reverse_proxy 192.168.101.0:8080 + ''; + }; + }; + }; + networking.firewall.allowedTCPPorts = [80 443]; + }; + }; +} diff --git a/hosts/nougat-2/concourse.nix b/hosts/nougat-2/concourse.nix new file mode 100644 index 0000000..9bc1fe9 --- /dev/null +++ b/hosts/nougat-2/concourse.nix @@ -0,0 +1,105 @@ +{ + config, + lib, + pkgs, + self, + ... +}: let + pubsolarDomain = import ./pubsolar-domain.nix; + + getSecret = name: + lib.attrsets.setAttrByPath [name] { + file = "${self}/secrets/${name}.age"; + mode = "600"; + owner = "concourse"; + }; + + keys = [ + "concourse-session-signing-key" + "concourse-worker-key" + "concourse-tsa-host-key" + ]; + + secrets = + [ + "concourse-secrets" + "concourse-db-secrets" + ] + ++ keys; +in { + age.secrets = lib.lists.foldl (a: b: a // getSecret b) {} secrets; + + users.users.concourse = { + description = "Concourse Service"; + home = "/var/lib/concourse"; + useDefaultShell = true; + uid = 10001; + group = "concourse"; + isSystemUser = true; + }; + + users.groups.concourse = {}; + + systemd.tmpfiles.rules = [ + "d '/var/lib/concourse' 0750 concourse concourse - -" + ]; + + virtualisation.oci-containers = { + containers."concourse-db" = { + image = "postgres:14"; + autoStart = true; + user = "994"; + volumes = [ + "/data/concourse/db:/var/lib/postgresql/data" + ]; + extraOptions = [ + "--network=concourse-net" + ]; + environmentFiles = [ + config.age.secrets.concourse-db-secrets.path + ]; + }; + + containers."concourse" = { + image = "concourse/concourse:7.9.1"; + autoStart = true; + user = "10001"; + ports = [ + "8080:8080" + ]; + dependsOn = ["concourse-db"]; + extraOptions = [ + "--network=concourse-net" + ]; + volumes = [ + "${config.age.secrets.concourse-session-signing-key.path}:/keys/session_signing_key" + "${config.age.secrets.concourse-worker-key.path}:/keys/worker_key" + "${config.age.secrets.concourse-tsa-host-key.path}:/keys/tsa_host_key" + ]; + + environment = { + CONCOURSE_EXTERNAL_URL = "https://ci.${pubsolarDomain}"; + + CONCOURSE_ADD_LOCAL_USER = "crew:changeme"; + CONCOURSE_MAIN_TEAM_LOCAL_USER = "crew"; + + # instead of relying on the default "detect" + CONCOURSE_WORKER_BAGGAGECLAIM_DRIVER = "overlay"; + CONCOURSE_X_FRAME_OPTIONS = "allow"; + CONCOURSE_CONTENT_SECURITY_POLICY = "*"; + CONCOURSE_CLUSTER_NAME = "pub.solar"; + CONCOURSE_WORKER_CONTAINERD_DNS_SERVER = "8.8.8.8"; + + CONCOURSE_SESSION_SIGNING_KEY = "/keys/session_signing_key"; + CONCOURSE_TSA_HOST_KEY = "/keys/tsa_host_key"; + CONCOURSE_TSA_AUTHORIZED_KEYS = "/keys/worker_key"; + + # For ARM-based machine, change the Concourse runtime to "houdini" + CONCOURSE_WORKER_RUNTIME = "containerd"; + }; + environmentFiles = [ + config.age.secrets.concourse-secrets.path + ]; + }; + }; +} diff --git a/hosts/nougat-2/configuration.nix b/hosts/nougat-2/configuration.nix index 7c89b18..f86ac19 100644 --- a/hosts/nougat-2/configuration.nix +++ b/hosts/nougat-2/configuration.nix @@ -88,6 +88,34 @@ in { services.openssh.enable = true; services.openssh.settings.PermitRootLogin = "prohibit-password"; + pub-solar.core.disk-encryption-active = false; + pub-solar.core.lite = true; + + virtualisation = { + docker = { + enable = true; + extraOptions = '' + --data-root /data/docker + ''; + }; + + oci-containers = { + backend = "docker"; + }; + }; + + security.sudo.extraRules = [ + { + users = ["${psCfg.user.name}"]; + commands = [ + { + command = "ALL"; + options = ["NOPASSWD"]; + } + ]; + } + ]; + # This value determines the NixOS release with which your system is to be # compatible, in order to avoid breaking some software such as database # servers. You should change this only after NixOS release notes say you diff --git a/hosts/nougat-2/email.nix b/hosts/nougat-2/email.nix new file mode 100644 index 0000000..91a11bb --- /dev/null +++ b/hosts/nougat-2/email.nix @@ -0,0 +1,39 @@ +{ + config, + lib, + pkgs, + ... +}: let + exDomain = (import ./ex-domain.nix) lib; +in { + imports = [ + (builtins.fetchTarball { + # Pick a commit from the branch you are interested in + url = "https://gitlab.com/simple-nixos-mailserver/nixos-mailserver/-/archive/0c1801b48995ec6909e040abedaa56a64f0db430/nixos-mailserver-0c1801b48995ec6909e040abedaa56a64f0db430.tar.gz"; + # And set its hash + sha256 = ""; + }) + ]; + + mailserver = { + enable = true; + fqdn = "mail.b12f.io"; + domains = ["b12f.io" exDomain]; + + # A list of all login accounts. To create the password hashes, use + # nix-shell -p mkpasswd --run 'mkpasswd -sm bcrypt' + loginAccounts."mail@b12f.io" = { + hashedPassword = "$2b$05$Ak1YLaRtdBI6h0uwSIzpKuF3v9JIxRBwODrARTLSlPM8guYI1rNmC"; + aliases = ["@example.com"]; + }; + + loginAccounts."mail@${exDomain}" = { + hashedPassword = "$2b$05$wWs55JDK1.LiPqKPF3egfu/3ocEQGihD7hkvLqvVsAzmKSzL0DGdi"; + aliases = [("@" + exDomain)]; + }; + + # Use Let's Encrypt certificates. Note that this needs to set up a stripped + # down nginx and opens port 80. + certificateScheme = "acme"; + }; +} diff --git a/hosts/nougat-2/ex-domain.nix b/hosts/nougat-2/ex-domain.nix new file mode 100644 index 0000000..9ceabd2 --- /dev/null +++ b/hosts/nougat-2/ex-domain.nix @@ -0,0 +1 @@ +lib: lib.concatStrings (lib.lists.reverseList ["et" ".n" "zz" "wd" "h"]) diff --git a/hosts/nougat-2/gitea.nix b/hosts/nougat-2/gitea.nix new file mode 100644 index 0000000..9ccf664 --- /dev/null +++ b/hosts/nougat-2/gitea.nix @@ -0,0 +1,84 @@ +{ + config, + lib, + pkgs, + self, + ... +}: let + pubsolarDomain = import ./pubsolar-domain.nix; +in { + age.secrets.gitea-database-password = { + file = "${self}/secrets/gitea-database-password.age"; + mode = "600"; + owner = "gitea"; + }; + + # age.secrets.gitea-mailer-password = { + # file = "${self}/secrets/gitea-mailer-password.age"; + # mode = "600"; + # owner = "gitea"; + # }; + + services.gitea = { + enable = true; + package = pkgs.forgejo; + appName = "pub.solar git server"; + database = { + type = "postgres"; + passwordFile = config.age.secrets.gitea-database-password.path; + }; + lfs.enable = true; + # mailerPasswordFile = config.age.secrets.gitea-mailer-password.path; + settings = { + server = { + DOMAIN = "git.${pubsolarDomain}"; + HTTP_ADDR = "127.0.0.1"; + HTTP_PORT = 3000; + ROOT_URL = "https://git.${pubsolarDomain}"; + }; + mailer = { + ENABLED = false; + PROTOCOL = "smtps"; + SMTP_ADDR = "mx2.greenbaum.cloud"; + SMTP_PORT = 465; + FROM = ''"pub.solar git server" ''; + USER = "admins@pub.solar"; + }; + "repository.signing" = { + SIGNING_KEY = "default"; + MERGES = "always"; + }; + openid = { + ENABLE_OPENID_SIGNIN = true; + ENABLE_OPENID_SIGNUP = true; + }; + # uncomment after initial deployment, first user is admin user + # required to setup SSO (oauth openid-connect, keycloak auth provider) + service.ALLOW_ONLY_EXTERNAL_REGISTRATION = true; + service.ENABLE_NOTIFY_MAIL = true; + session.COOKIE_SECURE = lib.mkForce true; + }; + }; + + # See: https://docs.gitea.io/en-us/signing/#installing-and-generating-a-gpg-key-for-gitea + # Required for gitea server side gpg signatures + # configured/setup manually in: + # /var/lib/gitea/data/home/.gitconfig + # /var/lib/gitea/data/home/.gnupg/ + # sudo su gitea + # export GNUPGHOME=/var/lib/gitea/data/home/.gnupg + # gpg --quick-gen-key 'pub.solar gitea ' ed25519 + # TODO: implement declarative GPG key generation and + # gitea gitconfig + programs.gnupg.agent = { + enable = true; + pinentryFlavor = "curses"; + }; + # Required to make gpg work without a graphical environment? + # otherwise generating a new gpg key fails with this error: + # gpg: agent_genkey failed: No pinentry + # see: https://github.com/NixOS/nixpkgs/issues/97861#issuecomment-827951675 + environment.variables = { + GPG_TTY = "$(tty)"; + }; +} diff --git a/hosts/nougat-2/hardware-configuration.nix b/hosts/nougat-2/hardware-configuration.nix index 3e84500..32aae64 100644 --- a/hosts/nougat-2/hardware-configuration.nix +++ b/hosts/nougat-2/hardware-configuration.nix @@ -42,6 +42,11 @@ fsType = "vfat"; }; + fileSystems."/data" = { + device = "/dev/disk/by-uuid/824341f0-fd56-4db7-bb7e-4f161d94144b"; + fsType = "ext4"; + }; + swapDevices = [ {device = "/dev/disk/by-uuid/f37e9f96-0174-4cac-a0bb-b63b2a67a4ad";} ]; diff --git a/hosts/nougat-2/keycloak.nix b/hosts/nougat-2/keycloak.nix new file mode 100644 index 0000000..a5fea07 --- /dev/null +++ b/hosts/nougat-2/keycloak.nix @@ -0,0 +1,48 @@ +{ + config, + lib, + inputs, + pkgs, + self, + ... +}: let + pubsolarDomain = import ./pubsolar-domain.nix; +in { + age.secrets.keycloak-database-password = { + file = "${self}/secrets/keycloak-database-password.age"; + mode = "700"; + #owner = "keycloak"; + }; + + containers.keycloak = { + autoStart = true; + privateNetwork = true; + hostAddress = "192.168.101.0"; + localAddress = "192.168.103.0"; + hostAddress6 = "fc00::1"; + localAddress6 = "fc00::3"; + + bindMounts = { + "/var/lib/postgresql/14" = { + hostPath = "/data/keycloak/db"; + isReadOnly = false; + }; + }; + + config = { + services.keycloak = { + enable = true; + database.passwordFile = config.age.secrets.keycloak-database-password.path; + settings = { + hostname = "auth.${pubsolarDomain}"; + http-host = "0.0.0.0"; + http-port = 8080; + proxy = "edge"; + }; + themes = { + "pub.solar" = inputs.keycloak-theme-pub-solar.legacyPackages.${pkgs.system}.keycloak-theme-pub-solar; + }; + }; + }; + }; +} diff --git a/hosts/nougat-2/mailman.nix b/hosts/nougat-2/mailman.nix new file mode 100644 index 0000000..2bbc086 --- /dev/null +++ b/hosts/nougat-2/mailman.nix @@ -0,0 +1,143 @@ +{ + config, + lib, + pkgs, + self, + ... +}: let + postfixConfig = pkgs.writeTextFile { + name = "main.cf"; + text = builtins.readFile ./postfix/main.cf; + }; +in { + system.activationScripts.mkMailmanNet = let + docker = config.virtualisation.oci-containers.backend; + dockerBin = "${pkgs.${docker}}/bin/${docker}"; + in '' + ${dockerBin} network inspect mailman-net >/dev/null 2>&1 || ${dockerBin} network create mailman-net --subnet 172.20.1.0/24 + ''; + + users.users.mailman = { + description = "Mailman Service"; + home = "/var/lib/mailman"; + useDefaultShell = true; + uid = 993; + # Group hakkonaut so caddy can serve the static files from mailman-web directly + group = "hakkonaut"; + isSystemUser = true; + }; + + systemd.tmpfiles.rules = [ + "d '/var/lib/mailman' 0750 mailman hakkonaut - -" + ]; + + age.secrets.mailman-core-secrets = { + file = "${self}/secrets/mailman-core-secrets.age"; + mode = "600"; + owner = "mailman"; + }; + + age.secrets.mailman-web-secrets = { + file = "${self}/secrets/mailman-web-secrets.age"; + mode = "600"; + owner = "mailman"; + }; + + age.secrets.mailman-db-secrets = { + file = "${self}/secrets/mailman-db-secrets.age"; + mode = "600"; + owner = "mailman"; + }; + + virtualisation = { + docker = { + enable = true; + }; + + oci-containers = { + backend = "docker"; + containers."mailman-core" = { + image = "maxking/mailman-core:0.4"; + autoStart = true; + user = "993"; + volumes = [ + "/var/lib/mailman/core:/opt/mailman/" + ]; + extraOptions = [ + "--network=mailman-net" + ]; + environment = { + DATABASE_TYPE = "postgres"; + DATABASE_CLASS = "mailman.database.postgresql.PostgreSQLDatabase"; + MTA = "postfix"; + }; + environmentFiles = [ + config.age.secrets.mailman-core-secrets.path + ]; + ports = [ + "127.0.0.1:8001:8001" # API + "127.0.0.1:8024:8024" # LMTP - incoming emails + ]; + }; + + containers."mailman-web" = { + image = "maxking/mailman-web:0.4"; + autoStart = true; + user = "993"; + volumes = [ + "/var/lib/mailman/web:/opt/mailman-web-data" + ]; + extraOptions = [ + "--network=mailman-net" + ]; + environment = { + DATABASE_TYPE = "postgres"; + SERVE_FROM_DOMAIN = "list.pub.solar"; + MAILMAN_ADMIN_USER = "admin"; + MAILMAN_ADMIN_EMAIL = "admins@pub.solar"; + }; + environmentFiles = [ + config.age.secrets.mailman-web-secrets.path + ]; + ports = [ + "127.0.0.1:8000:8000" # HTTP + # "127.0.0.1:8080:8080" # uwsgi + ]; + }; + + containers."mailman-db" = { + image = "postgres:14-alpine"; + autoStart = true; + user = "993"; + extraOptions = [ + "--network=mailman-net" + ]; + volumes = [ + "/var/lib/mailman/database:/var/lib/postgresql/data" + ]; + environmentFiles = [ + config.age.secrets.mailman-db-secrets.path + ]; + }; + + containers."mailman-postfix" = { + image = "mailu/postfix:1.9.46"; + autoStart = true; + user = "993"; + extraOptions = [ + "--network=mailman-net" + ]; + volumes = [ + "/var/lib/mailman/postfix/overrides:/overrides:ro" + "/var/lib/mailman/postfix/mailqueue:/var/spool/postfix" + "/var/lib/mailman/postfix/data:/var/lib/postfix" + "/var/lib/mailman/core:/var/lib/mailman/core" + "${postfixConfig}:/etc/postfix/main.cf" + ]; + environmentFiles = [ + config.age.secrets.mailman-db-secrets.path + ]; + }; + }; + }; +} diff --git a/hosts/nougat-2/nougat-2.nix b/hosts/nougat-2/nougat-2.nix index 14d2118..cda9fab 100644 --- a/hosts/nougat-2/nougat-2.nix +++ b/hosts/nougat-2/nougat-2.nix @@ -11,24 +11,11 @@ with lib; let in { imports = [ ./configuration.nix + + ./acme.nix + ./caddy.nix + ./keycloak.nix + ./gitea.nix + ./concourse.nix ]; - - config = { - hardware.cpu.intel.updateMicrocode = true; - - pub-solar.core.disk-encryption-active = false; - pub-solar.core.lite = true; - - security.sudo.extraRules = [ - { - users = ["${psCfg.user.name}"]; - commands = [ - { - command = "ALL"; - options = ["NOPASSWD"]; - } - ]; - } - ]; - }; } diff --git a/hosts/nougat-2/postfix/main.cf b/hosts/nougat-2/postfix/main.cf new file mode 100644 index 0000000..56fb794 --- /dev/null +++ b/hosts/nougat-2/postfix/main.cf @@ -0,0 +1,692 @@ +# Global Postfix configuration file. This file lists only a subset +# of all parameters. For the syntax, and for a complete parameter +# list, see the postconf(5) manual page (command: "man 5 postconf"). +# +# For common configuration examples, see BASIC_CONFIGURATION_README +# and STANDARD_CONFIGURATION_README. To find these documents, use +# the command "postconf html_directory readme_directory", or go to +# http://www.postfix.org/BASIC_CONFIGURATION_README.html etc. +# +# For best results, change no more than 2-3 parameters at a time, +# and test if Postfix still works after every change. + +# COMPATIBILITY +# +# The compatibility_level determines what default settings Postfix +# will use for main.cf and master.cf settings. These defaults will +# change over time. +# +# To avoid breaking things, Postfix will use backwards-compatible +# default settings and log where it uses those old backwards-compatible +# default settings, until the system administrator has determined +# if any backwards-compatible default settings need to be made +# permanent in main.cf or master.cf. +# +# When this review is complete, update the compatibility_level setting +# below as recommended in the RELEASE_NOTES file. +# +# The level below is what should be used with new (not upgrade) installs. +# +compatibility_level = 3.6 + +# SOFT BOUNCE +# +# The soft_bounce parameter provides a limited safety net for +# testing. When soft_bounce is enabled, mail will remain queued that +# would otherwise bounce. This parameter disables locally-generated +# bounces, and prevents the SMTP server from rejecting mail permanently +# (by changing 5xx replies into 4xx replies). However, soft_bounce +# is no cure for address rewriting mistakes or mail routing mistakes. +# +#soft_bounce = no + +# LOCAL PATHNAME INFORMATION +# +# The queue_directory specifies the location of the Postfix queue. +# This is also the root directory of Postfix daemons that run chrooted. +# See the files in examples/chroot-setup for setting up Postfix chroot +# environments on different UNIX systems. +# +queue_directory = /var/spool/postfix + +# The command_directory parameter specifies the location of all +# postXXX commands. +# +command_directory = /usr/sbin + +# The daemon_directory parameter specifies the location of all Postfix +# daemon programs (i.e. programs listed in the master.cf file). This +# directory must be owned by root. +# +daemon_directory = /usr/libexec/postfix + +# The data_directory parameter specifies the location of Postfix-writable +# data files (caches, random numbers). This directory must be owned +# by the mail_owner account (see below). +# +data_directory = /var/lib/postfix + +# QUEUE AND PROCESS OWNERSHIP +# +# The mail_owner parameter specifies the owner of the Postfix queue +# and of most Postfix daemon processes. Specify the name of a user +# account THAT DOES NOT SHARE ITS USER OR GROUP ID WITH OTHER ACCOUNTS +# AND THAT OWNS NO OTHER FILES OR PROCESSES ON THE SYSTEM. In +# particular, don't specify nobody or daemon. PLEASE USE A DEDICATED +# USER. +# +mail_owner = postfix + +# The default_privs parameter specifies the default rights used by +# the local delivery agent for delivery to external file or command. +# These rights are used in the absence of a recipient user context. +# DO NOT SPECIFY A PRIVILEGED USER OR THE POSTFIX OWNER. +# +#default_privs = nobody + +# INTERNET HOST AND DOMAIN NAMES +# +# The myhostname parameter specifies the internet hostname of this +# mail system. The default is to use the fully-qualified domain name +# from gethostname(). $myhostname is used as a default value for many +# other configuration parameters. +# +myhostname = list.pub.solar +#myhostname = virtual.domain.tld + +# The mydomain parameter specifies the local internet domain name. +# The default is to use $myhostname minus the first component. +# $mydomain is used as a default value for many other configuration +# parameters. +# +#mydomain = domain.tld + +# SENDING MAIL +# +# The myorigin parameter specifies the domain that locally-posted +# mail appears to come from. The default is to append $myhostname, +# which is fine for small sites. If you run a domain with multiple +# machines, you should (1) change this to $mydomain and (2) set up +# a domain-wide alias database that aliases each user to +# user@that.users.mailhost. +# +# For the sake of consistency between sender and recipient addresses, +# myorigin also specifies the default domain name that is appended +# to recipient addresses that have no @domain part. +# +#myorigin = $myhostname +#myorigin = $mydomain + +# RECEIVING MAIL + +# The inet_interfaces parameter specifies the network interface +# addresses that this mail system receives mail on. By default, +# the software claims all active interfaces on the machine. The +# parameter also controls delivery of mail to user@[ip.address]. +# +# See also the proxy_interfaces parameter, for network addresses that +# are forwarded to us via a proxy or network address translator. +# +# Note: you need to stop/start Postfix when this parameter changes. +# +#inet_interfaces = all +#inet_interfaces = $myhostname +#inet_interfaces = $myhostname, localhost + +# The proxy_interfaces parameter specifies the network interface +# addresses that this mail system receives mail on by way of a +# proxy or network address translation unit. This setting extends +# the address list specified with the inet_interfaces parameter. +# +# You must specify your proxy/NAT addresses when your system is a +# backup MX host for other domains, otherwise mail delivery loops +# will happen when the primary MX host is down. +# +#proxy_interfaces = +#proxy_interfaces = 1.2.3.4 + +# The mydestination parameter specifies the list of domains that this +# machine considers itself the final destination for. +# +# These domains are routed to the delivery agent specified with the +# local_transport parameter setting. By default, that is the UNIX +# compatible delivery agent that lookups all recipients in /etc/passwd +# and /etc/aliases or their equivalent. +# +# The default is $myhostname + localhost.$mydomain + localhost. On +# a mail domain gateway, you should also include $mydomain. +# +# Do not specify the names of virtual domains - those domains are +# specified elsewhere (see VIRTUAL_README). +# +# Do not specify the names of domains that this machine is backup MX +# host for. Specify those names via the relay_domains settings for +# the SMTP server, or use permit_mx_backup if you are lazy (see +# STANDARD_CONFIGURATION_README). +# +# The local machine is always the final destination for mail addressed +# to user@[the.net.work.address] of an interface that the mail system +# receives mail on (see the inet_interfaces parameter). +# +# Specify a list of host or domain names, /file/name or type:table +# patterns, separated by commas and/or whitespace. A /file/name +# pattern is replaced by its contents; a type:table is matched when +# a name matches a lookup key (the right-hand side is ignored). +# Continue long lines by starting the next line with whitespace. +# +# See also below, section "REJECTING MAIL FOR UNKNOWN LOCAL USERS". +# +#mydestination = $myhostname, localhost.$mydomain, localhost +#mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain +#mydestination = $myhostname, localhost.$mydomain, localhost, $mydomain, +# mail.$mydomain, www.$mydomain, ftp.$mydomain + +# REJECTING MAIL FOR UNKNOWN LOCAL USERS +# +# The local_recipient_maps parameter specifies optional lookup tables +# with all names or addresses of users that are local with respect +# to $mydestination, $inet_interfaces or $proxy_interfaces. +# +# If this parameter is defined, then the SMTP server will reject +# mail for unknown local users. This parameter is defined by default. +# +# To turn off local recipient checking in the SMTP server, specify +# local_recipient_maps = (i.e. empty). +# +# The default setting assumes that you use the default Postfix local +# delivery agent for local delivery. You need to update the +# local_recipient_maps setting if: +# +# - You define $mydestination domain recipients in files other than +# /etc/passwd, /etc/aliases, or the $virtual_alias_maps files. +# For example, you define $mydestination domain recipients in +# the $virtual_mailbox_maps files. +# +# - You redefine the local delivery agent in master.cf. +# +# - You redefine the "local_transport" setting in main.cf. +# +# - You use the "luser_relay", "mailbox_transport", or "fallback_transport" +# feature of the Postfix local delivery agent (see local(8)). +# +# Details are described in the LOCAL_RECIPIENT_README file. +# +# Beware: if the Postfix SMTP server runs chrooted, you probably have +# to access the passwd file via the proxymap service, in order to +# overcome chroot restrictions. The alternative, having a copy of +# the system passwd file in the chroot jail is just not practical. +# +# The right-hand side of the lookup tables is conveniently ignored. +# In the left-hand side, specify a bare username, an @domain.tld +# wild-card, or specify a user@domain.tld address. +# +#local_recipient_maps = unix:passwd.byname $alias_maps +#local_recipient_maps = proxy:unix:passwd.byname $alias_maps +#local_recipient_maps = + +# The unknown_local_recipient_reject_code specifies the SMTP server +# response code when a recipient domain matches $mydestination or +# ${proxy,inet}_interfaces, while $local_recipient_maps is non-empty +# and the recipient address or address local-part is not found. +# +# The default setting is 550 (reject mail) but it is safer to start +# with 450 (try again later) until you are certain that your +# local_recipient_maps settings are OK. +# +# unknown_local_recipient_reject_code = 550 + +# TRUST AND RELAY CONTROL + +# The mynetworks parameter specifies the list of "trusted" SMTP +# clients that have more privileges than "strangers". +# +# In particular, "trusted" SMTP clients are allowed to relay mail +# through Postfix. See the smtpd_recipient_restrictions parameter +# in postconf(5). +# +# You can specify the list of "trusted" network addresses by hand +# or you can let Postfix do it for you (which is the default). +# +# By default (mynetworks_style = subnet), Postfix "trusts" SMTP +# clients in the same IP subnetworks as the local machine. +# On Linux, this works correctly only with interfaces specified +# with the "ifconfig" command. +# +# Specify "mynetworks_style = class" when Postfix should "trust" SMTP +# clients in the same IP class A/B/C networks as the local machine. +# Don't do this with a dialup site - it would cause Postfix to "trust" +# your entire provider's network. Instead, specify an explicit +# mynetworks list by hand, as described below. +# +# Specify "mynetworks_style = host" when Postfix should "trust" +# only the local machine. +# +#mynetworks_style = class +#mynetworks_style = subnet +#mynetworks_style = host + +# Alternatively, you can specify the mynetworks list by hand, in +# which case Postfix ignores the mynetworks_style setting. +# +# Specify an explicit list of network/netmask patterns, where the +# mask specifies the number of bits in the network part of a host +# address. +# +# You can also specify the absolute pathname of a pattern file instead +# of listing the patterns here. Specify type:table for table-based lookups +# (the value on the table right-hand side is not used). +# +mynetworks = mailman-core,mailman-web +#mynetworks = $config_directory/mynetworks +#mynetworks = hash:/etc/postfix/network_table + +# The relay_domains parameter restricts what destinations this system will +# relay mail to. See the smtpd_recipient_restrictions description in +# postconf(5) for detailed information. +# +# By default, Postfix relays mail +# - from "trusted" clients (IP address matches $mynetworks) to any destination, +# - from "untrusted" clients to destinations that match $relay_domains or +# subdomains thereof, except addresses with sender-specified routing. +# The default relay_domains value is $mydestination. +# +# In addition to the above, the Postfix SMTP server by default accepts mail +# that Postfix is final destination for: +# - destinations that match $inet_interfaces or $proxy_interfaces, +# - destinations that match $mydestination +# - destinations that match $virtual_alias_domains, +# - destinations that match $virtual_mailbox_domains. +# These destinations do not need to be listed in $relay_domains. +# +# Specify a list of hosts or domains, /file/name patterns or type:name +# lookup tables, separated by commas and/or whitespace. Continue +# long lines by starting the next line with whitespace. A file name +# is replaced by its contents; a type:name table is matched when a +# (parent) domain appears as lookup key. +# +# NOTE: Postfix will not automatically forward mail for domains that +# list this system as their primary or backup MX host. See the +# permit_mx_backup restriction description in postconf(5). +# +#relay_domains = $mydestination + +# INTERNET OR INTRANET + +# The relayhost parameter specifies the default host to send mail to +# when no entry is matched in the optional transport(5) table. When +# no relayhost is given, mail is routed directly to the destination. +# +# On an intranet, specify the organizational domain name. If your +# internal DNS uses no MX records, specify the name of the intranet +# gateway host instead. +# +# In the case of SMTP, specify a domain, host, host:port, [host]:port, +# [address] or [address]:port; the form [host] turns off MX lookups. +# +# If you're connected via UUCP, see also the default_transport parameter. +# +#relayhost = $mydomain +#relayhost = [gateway.my.domain] +#relayhost = [mailserver.isp.tld] +#relayhost = uucphost +#relayhost = [an.ip.add.ress] + +# REJECTING UNKNOWN RELAY USERS +# +# The relay_recipient_maps parameter specifies optional lookup tables +# with all addresses in the domains that match $relay_domains. +# +# If this parameter is defined, then the SMTP server will reject +# mail for unknown relay users. This feature is off by default. +# +# The right-hand side of the lookup tables is conveniently ignored. +# In the left-hand side, specify an @domain.tld wild-card, or specify +# a user@domain.tld address. +# +#relay_recipient_maps = hash:/etc/postfix/relay_recipients + +# INPUT RATE CONTROL +# +# The in_flow_delay configuration parameter implements mail input +# flow control. This feature is turned on by default, although it +# still needs further development (it's disabled on SCO UNIX due +# to an SCO bug). +# +# A Postfix process will pause for $in_flow_delay seconds before +# accepting a new message, when the message arrival rate exceeds the +# message delivery rate. With the default 100 SMTP server process +# limit, this limits the mail inflow to 100 messages a second more +# than the number of messages delivered per second. +# +# Specify 0 to disable the feature. Valid delays are 0..10. +# +#in_flow_delay = 1s + +# ADDRESS REWRITING +# +# The ADDRESS_REWRITING_README document gives information about +# address masquerading or other forms of address rewriting including +# username->Firstname.Lastname mapping. + +# ADDRESS REDIRECTION (VIRTUAL DOMAIN) +# +# The VIRTUAL_README document gives information about the many forms +# of domain hosting that Postfix supports. + +# "USER HAS MOVED" BOUNCE MESSAGES +# +# See the discussion in the ADDRESS_REWRITING_README document. + +# TRANSPORT MAP +# +# See the discussion in the ADDRESS_REWRITING_README document. + +# ALIAS DATABASE +# +# The alias_maps parameter specifies the list of alias databases used +# by the local delivery agent. The default list is system dependent. +# +# On systems with NIS, the default is to search the local alias +# database, then the NIS alias database. See aliases(5) for syntax +# details. +# +# If you change the alias database, run "postalias /etc/aliases" (or +# wherever your system stores the mail alias file), or simply run +# "newaliases" to build the necessary DBM or DB file. +# +# It will take a minute or so before changes become visible. Use +# "postfix reload" to eliminate the delay. +# +#alias_maps = dbm:/etc/aliases +#alias_maps = hash:/etc/aliases +#alias_maps = hash:/etc/aliases, nis:mail.aliases +#alias_maps = netinfo:/aliases + +# The alias_database parameter specifies the alias database(s) that +# are built with "newaliases" or "sendmail -bi". This is a separate +# configuration parameter, because alias_maps (see above) may specify +# tables that are not necessarily all under control by Postfix. +# +#alias_database = dbm:/etc/aliases +#alias_database = dbm:/etc/mail/aliases +#alias_database = hash:/etc/aliases +#alias_database = hash:/etc/aliases, hash:/opt/majordomo/aliases + +# ADDRESS EXTENSIONS (e.g., user+foo) +# +# The recipient_delimiter parameter specifies the separator between +# user names and address extensions (user+foo). See canonical(5), +# local(8), relocated(5) and virtual(5) for the effects this has on +# aliases, canonical, virtual, relocated and .forward file lookups. +# Basically, the software tries user+foo and .forward+foo before +# trying user and .forward. +# +#recipient_delimiter = + + +# DELIVERY TO MAILBOX +# +# The home_mailbox parameter specifies the optional pathname of a +# mailbox file relative to a user's home directory. The default +# mailbox file is /var/spool/mail/user or /var/mail/user. Specify +# "Maildir/" for qmail-style delivery (the / is required). +# +#home_mailbox = Mailbox +#home_mailbox = Maildir/ + +# The mail_spool_directory parameter specifies the directory where +# UNIX-style mailboxes are kept. The default setting depends on the +# system type. +# +#mail_spool_directory = /var/mail +#mail_spool_directory = /var/spool/mail + +# The mailbox_command parameter specifies the optional external +# command to use instead of mailbox delivery. The command is run as +# the recipient with proper HOME, SHELL and LOGNAME environment settings. +# Exception: delivery for root is done as $default_user. +# +# Other environment variables of interest: USER (recipient username), +# EXTENSION (address extension), DOMAIN (domain part of address), +# and LOCAL (the address localpart). +# +# Unlike other Postfix configuration parameters, the mailbox_command +# parameter is not subjected to $parameter substitutions. This is to +# make it easier to specify shell syntax (see example below). +# +# Avoid shell meta characters because they will force Postfix to run +# an expensive shell process. Procmail alone is expensive enough. +# +# IF YOU USE THIS TO DELIVER MAIL SYSTEM-WIDE, YOU MUST SET UP AN +# ALIAS THAT FORWARDS MAIL FOR ROOT TO A REAL USER. +# +#mailbox_command = /some/where/procmail +#mailbox_command = /some/where/procmail -a "$EXTENSION" + +# The mailbox_transport specifies the optional transport in master.cf +# to use after processing aliases and .forward files. This parameter +# has precedence over the mailbox_command, fallback_transport and +# luser_relay parameters. +# +# Specify a string of the form transport:nexthop, where transport is +# the name of a mail delivery transport defined in master.cf. The +# :nexthop part is optional. For more details see the sample transport +# configuration file. +# +# NOTE: if you use this feature for accounts not in the UNIX password +# file, then you must update the "local_recipient_maps" setting in +# the main.cf file, otherwise the SMTP server will reject mail for +# non-UNIX accounts with "User unknown in local recipient table". +# +# Cyrus IMAP over LMTP. Specify ``lmtpunix cmd="lmtpd" +# listen="/var/imap/socket/lmtp" prefork=0'' in cyrus.conf. +#mailbox_transport = lmtp:unix:/var/imap/socket/lmtp +# +# Cyrus IMAP via command line. Uncomment the "cyrus...pipe" and +# subsequent line in master.cf. +#mailbox_transport = cyrus + +# The fallback_transport specifies the optional transport in master.cf +# to use for recipients that are not found in the UNIX passwd database. +# This parameter has precedence over the luser_relay parameter. +# +# Specify a string of the form transport:nexthop, where transport is +# the name of a mail delivery transport defined in master.cf. The +# :nexthop part is optional. For more details see the sample transport +# configuration file. +# +# NOTE: if you use this feature for accounts not in the UNIX password +# file, then you must update the "local_recipient_maps" setting in +# the main.cf file, otherwise the SMTP server will reject mail for +# non-UNIX accounts with "User unknown in local recipient table". +# +#fallback_transport = lmtp:unix:/file/name +#fallback_transport = cyrus +#fallback_transport = + +# The luser_relay parameter specifies an optional destination address +# for unknown recipients. By default, mail for unknown@$mydestination, +# unknown@[$inet_interfaces] or unknown@[$proxy_interfaces] is returned +# as undeliverable. +# +# The following expansions are done on luser_relay: $user (recipient +# username), $shell (recipient shell), $home (recipient home directory), +# $recipient (full recipient address), $extension (recipient address +# extension), $domain (recipient domain), $local (entire recipient +# localpart), $recipient_delimiter. Specify ${name?value} or +# ${name:value} to expand value only when $name does (does not) exist. +# +# luser_relay works only for the default Postfix local delivery agent. +# +# NOTE: if you use this feature for accounts not in the UNIX password +# file, then you must specify "local_recipient_maps =" (i.e. empty) in +# the main.cf file, otherwise the SMTP server will reject mail for +# non-UNIX accounts with "User unknown in local recipient table". +# +#luser_relay = $user@other.host +#luser_relay = $local@other.host +#luser_relay = admin+$local + +# JUNK MAIL CONTROLS +# +# The controls listed here are only a very small subset. The file +# SMTPD_ACCESS_README provides an overview. + +# The header_checks parameter specifies an optional table with patterns +# that each logical message header is matched against, including +# headers that span multiple physical lines. +# +# By default, these patterns also apply to MIME headers and to the +# headers of attached messages. With older Postfix versions, MIME and +# attached message headers were treated as body text. +# +# For details, see "man header_checks". +# +#header_checks = regexp:/etc/postfix/header_checks + +# FAST ETRN SERVICE +# +# Postfix maintains per-destination logfiles with information about +# deferred mail, so that mail can be flushed quickly with the SMTP +# "ETRN domain.tld" command, or by executing "sendmail -qRdomain.tld". +# See the ETRN_README document for a detailed description. +# +# The fast_flush_domains parameter controls what destinations are +# eligible for this service. By default, they are all domains that +# this server is willing to relay mail to. +# +#fast_flush_domains = $relay_domains + +# SHOW SOFTWARE VERSION OR NOT +# +# The smtpd_banner parameter specifies the text that follows the 220 +# code in the SMTP server's greeting banner. Some people like to see +# the mail version advertised. By default, Postfix shows no version. +# +# You MUST specify $myhostname at the start of the text. That is an +# RFC requirement. Postfix itself does not care. +# +#smtpd_banner = $myhostname ESMTP $mail_name +#smtpd_banner = $myhostname ESMTP $mail_name ($mail_version) + +# PARALLEL DELIVERY TO THE SAME DESTINATION +# +# How many parallel deliveries to the same user or domain? With local +# delivery, it does not make sense to do massively parallel delivery +# to the same user, because mailbox updates must happen sequentially, +# and expensive pipelines in .forward files can cause disasters when +# too many are run at the same time. With SMTP deliveries, 10 +# simultaneous connections to the same domain could be sufficient to +# raise eyebrows. +# +# Each message delivery transport has its XXX_destination_concurrency_limit +# parameter. The default is $default_destination_concurrency_limit for +# most delivery transports. For the local delivery agent the default is 2. + +#local_destination_concurrency_limit = 2 +#default_destination_concurrency_limit = 20 + +# DEBUGGING CONTROL +# +# The debug_peer_level parameter specifies the increment in verbose +# logging level when an SMTP client or server host name or address +# matches a pattern in the debug_peer_list parameter. +# +debug_peer_level = 2 + +# The debug_peer_list parameter specifies an optional list of domain +# or network patterns, /file/name patterns or type:name tables. When +# an SMTP client or server host name or address matches a pattern, +# increase the verbose logging level by the amount specified in the +# debug_peer_level parameter. +# +#debug_peer_list = 127.0.0.1 +#debug_peer_list = some.domain + +# The debugger_command specifies the external command that is executed +# when a Postfix daemon program is run with the -D option. +# +# Use "command .. & sleep 5" so that the debugger can attach before +# the process marches on. If you use an X-based debugger, be sure to +# set up your XAUTHORITY environment variable before starting Postfix. +# +debugger_command = + PATH=/bin:/usr/bin:/usr/local/bin:/usr/X11R6/bin + ddd $daemon_directory/$process_name $process_id & sleep 5 + +# If you can't use X, use this to capture the call stack when a +# daemon crashes. The result is in a file in the configuration +# directory, and is named after the process name and the process ID. +# +# debugger_command = +# PATH=/bin:/usr/bin:/usr/local/bin; export PATH; (echo cont; +# echo where) | gdb $daemon_directory/$process_name $process_id 2>&1 +# >$config_directory/$process_name.$process_id.log & sleep 5 +# +# Another possibility is to run gdb under a detached screen session. +# To attach to the screen session, su root and run "screen -r +# " where uniquely matches one of the detached +# sessions (from "screen -list"). +# +# debugger_command = +# PATH=/bin:/usr/bin:/sbin:/usr/sbin; export PATH; screen +# -dmS $process_name gdb $daemon_directory/$process_name +# $process_id & sleep 1 + +# INSTALL-TIME CONFIGURATION INFORMATION +# +# The following parameters are used when installing a new Postfix version. +# +# sendmail_path: The full pathname of the Postfix sendmail command. +# This is the Sendmail-compatible mail posting interface. +# +sendmail_path = /usr/sbin/sendmail + +# newaliases_path: The full pathname of the Postfix newaliases command. +# This is the Sendmail-compatible command to build alias databases. +# +newaliases_path = /usr/bin/newaliases + +# mailq_path: The full pathname of the Postfix mailq command. This +# is the Sendmail-compatible mail queue listing command. +# +mailq_path = /usr/bin/mailq + +# setgid_group: The group for mail submission and queue management +# commands. This must be a group name with a numerical group ID that +# is not shared with other accounts, not even with the Postfix account. +# +setgid_group = postdrop + +# html_directory: The location of the Postfix HTML documentation. +# +html_directory = no + +# manpage_directory: The location of the Postfix on-line manual pages. +# +manpage_directory = /usr/share/man + +# sample_directory: The location of the Postfix sample configuration files. +# This parameter is obsolete as of Postfix 2.1. +# +sample_directory = /etc/postfix + +# readme_directory: The location of the Postfix README files. +# +readme_directory = /usr/share/doc/postfix/readme +inet_protocols = ipv4 +meta_directory = /etc/postfix +shlib_directory = /usr/lib/postfix + + +# Config below taken and adapted from +# https://github.com/maxking/docker-mailman#postfix +recipient_delimiter = + +unknown_local_recipient_reject_code = 550 +owner_request_special = no + +transport_maps = + regexp:/var/lib/mailman/core/var/data/postfix_lmtp +local_recipient_maps = + regexp:/var/lib/mailman/core/var/data/postfix_lmtp +relay_domains = + regexp:/var/lib/mailman/core/var/data/postfix_domains diff --git a/hosts/nougat-2/pubsolar-domain.nix b/hosts/nougat-2/pubsolar-domain.nix new file mode 100644 index 0000000..86b39de --- /dev/null +++ b/hosts/nougat-2/pubsolar-domain.nix @@ -0,0 +1 @@ +"pub.solar.b12f.io" diff --git a/hosts/nougat-2/transmission.nix b/hosts/nougat-2/transmission.nix new file mode 100644 index 0000000..cbaa95b --- /dev/null +++ b/hosts/nougat-2/transmission.nix @@ -0,0 +1,7 @@ +{ + config, + lib, + pkgs, + ... +}: { +} diff --git a/pkgs/concourse.nix b/pkgs/concourse.nix new file mode 100644 index 0000000..c720330 --- /dev/null +++ b/pkgs/concourse.nix @@ -0,0 +1,21 @@ +self: +with self; let + pname = "concourse"; + version = "7.9.1"; + tarfile = "${pname}-${version}-linux-amd64.tgz"; +in + stdenv.mkDerivation rec { + inherit pname version; + + src = builtins.fetchTarball { + url = "https://github.com/concourse/concourse/releases/download/v${version}/${tarfile}"; + sha256 = "sha256:0w3q4bj9wxw0w7jrk9r8va5ipz26k2szsfx34ss9hh2bbpp7mryw"; + }; + + phases = ["installPhase"]; + + installPhase = '' + mkdir -p $out/bin + cp -r $src/* $out/ + ''; + } diff --git a/pkgs/default.nix b/pkgs/default.nix index 0125119..6281e07 100644 --- a/pkgs/default.nix +++ b/pkgs/default.nix @@ -3,6 +3,7 @@ with final; { # keep sources this first sources = prev.callPackage (import ./_sources/generated.nix) {}; # then, call packages with `final.callPackage` + concourse = import ./concourse.nix final; import-gtk-settings = writeShellScriptBin "import-gtk-settings" (import ./import-gtk-settings.nix final); lgcl = writeShellScriptBin "lgcl" (import ./lgcl.nix final); mailto-mutt = writeShellScriptBin "mailto-mutt" (import ./mailto-mutt.nix final); diff --git a/secrets/concourse-db-secrets.age b/secrets/concourse-db-secrets.age new file mode 100644 index 0000000..3c18d6b Binary files /dev/null and b/secrets/concourse-db-secrets.age differ diff --git a/secrets/concourse-secrets.age b/secrets/concourse-secrets.age new file mode 100644 index 0000000..f6785af --- /dev/null +++ b/secrets/concourse-secrets.age @@ -0,0 +1,47 @@ +age-encryption.org/v1 +-> ssh-rsa kFDS0A +O2w0L1wXVm6+y3ZHO0plWlWfxd/gKE5P0JRSnRQ9hAQGdjNRbsI1nfW54Ce2uSx4 +1rre6tIWLjkInnqCfkkAYH03hN8uDmD0fZX8rKLcyX3GjL1rs4zVu1LDgMz1dCtk +yVdM3RTR4WoPOsIdUCCHMHi1r53VsJ8QQ1FLxHknMu1gaI95AshN1+q3SqZIJAR3 +9VsPi+3K9A6H1fqPzVTs+2WLvDIxsziRlhkIzBBmuhkwWIVsqcS+K5q2+lexVvKQ +iDQpDUHOunuN7sS63DWonjLHQwwOKRhaP7l8H+vZxENGtKDOZzcZqynL1Esy/J1M +g4MAGyqYb+ViNYnAZTUBWmhzWSlYhNU6wHICy8MPb5VqO5N5ywz4Bzyimj9q8KEP +IpNyjbtP1Twp50AYNrxySSo+Hi+LiAbO560H1Qr4CB921piPotX3+B/vlAGUfP4r +liU6DeiAHdq1DSzuDXm12TWwKEobfqNq6ofyLUCaAbxXBAYLfMUcxp3GfmUgDRO6 +u7y9UlGTg7sCfn3esmrFjA0QIS4AtOR02JDTstT+X2eU+oNhZ6tNAnM1CQs9mSpA +3lhGLbs3bCfgP5oVdV2lmecHkp3h/ubIPAQyHKxK7sq/3Mz8AmqWijD/D4n4SiPl +KtxDJgG1Vz56kYiUam5Xe2Lounics2gnEO4DRgj8vwk +-> ssh-ed25519 TnSWKQ L1FW6RvYZsZnjIw6+RkLwgNp7U/qWim1nATWqzTazxA +KKICuaBcXT30LH9QmWu3G0n45ccXWoWDWzJ0yKobtME +-> ssh-rsa 8daibg +dG9a1OcqCQuKlkutuJzB77OuwKnD+22kDdKPW4ztJT5tkT/vDBcJpmWN8/YQjrsW +HUSFimlSs1Cvs1ICLjA/w1iaUgZdTTB9t1L+vNKjirbd+BqdAZhi+B8Q1cBHbX5d +aArCQba2UoYg4NL/jU3/fqCujWe0qyWu5IlXL7uP5PQI3f+eDKEqah2sEYI8TBkB +auNlxibuz0pHTUTZiftPhXtwuTkbX4KzcXOg7811J5ZW4rfPyCfnIMqmHydWG8Kf +6qwpogv9ISO426kAZBUhAnor1sPePhm2wNf7I1MpCulJq6Yl6cJ0hH5EoC51yvZB +UGlwmItV8t0derPyp9OlNAy8SFRiikUa/rNZFPNnQwK66+J/rhn39tWCvWdH1r1s +T8lAvRBU4ynyP7H7Xa3eFAijxT0ztjGbjDE9nH+V9tjiKFoo8/nr0SHTgjd8Ckpk +0IUVlru5pPlIDX2f5Z4sxHabXtu//zqcn5TgoYauTWa5TenmhSeRBOUystJQYV88 +IFGT9OfQEpadD+JoUuRz4r+WcnrVf54uYdr9n8PazrmGmRV0oM9hW8rEMUJ4FMnY +a+3nOC4zqmMgfwL+w3TC94q5gKTtEkY4csLWE1zTo5HxewPtyoCvjecAA6h8EnXE +9/SnCtHVM42IDwBXda2YltbozAhro+O07ngKYI3GaFg +-> ssh-ed25519 2Ca8Kg uFzUXtXy8l0c6MXtPp7t4G2NIcsPxKApqxQNWreLO0E +t4QgjwiEAsYVgChi6cSZ7e0lxQ9UK50UPiXDTNQeC/Y +-> ssh-rsa 2ggJWw +c79JRDp3Io0bqtk/fxgvnVQo30ESXDH1og5IYRliMI6otUeDjcLAF8x30h+7LL8y +4xj38jx8FzPje6wEcMXQxqIxHdHZHEpUyxnu1H1ZfJX63LoqaD9BVEWrI+bWqLgo +7RXPFX5zKxeBZjcMHh+Z+pK/8I/S7p9ZYbI7n5TVqI5VIkZPy3fySLjGP5BH55is +Ziu80pXyknoqYz9/FPtmscb1IYGt82wewM2Q0rnnNTFEyg+0aG4wS3BCyf0tzIJq +066Fi8tZ8jv9BVOnlAtVV6kjQohxCsvcuPsgNja0ewr7wAg7UQd/DPkA0jqgHiT8 +F3qIsouJZHsl9w6NtE9d/IdKYGfDZrcxTxhE/WM7dYIeYhT0X/Z/CCApRHtMNZZj +DXgU2lnMycBSSBs45f/rsqosZVPXlVt6jnPyxspOxjp5s82ODeufFB+R0Es/eqdM +ubImNOAQT/GdtXona52/C002W3JSFfT7gg3O/8FfKMVwfn+eYvDv3bEMXLMjkeR3 + +-> -Fh\{x.n-grease v +QdBJf4GvnkoWIxTgdT6Lmjrm05ojy7RIUUYjE8fOlMXsQQkkFatIAGCKJeKVOggW +ZfNrjYmvdbdmq3bxkOc7JnZEg1WFRrgwObdiMWn0B75NMuMvKpRY0oPe1+OrjgFw +1Qk +--- JoZy3uGEHXt9eoUUr/dZMc0Rn6XrcNLTZHbniBgY/Zo +p zgo)L/hħ?uZ1ls FݢW/ZNAmϿ3ĠJ>*:BZp2 +2z|8x6Y̴+mOn~~ +Jȵak[i9 k~TVvO&gXҊ C{T$p\jvkTzT_ _7&xMw ::ͥs6W*/VQP7!L V}M\͟NNvv!KF`9.A/i_s#>AbZbI \ No newline at end of file diff --git a/secrets/concourse-session-signing-key.age b/secrets/concourse-session-signing-key.age new file mode 100644 index 0000000..43d8ce6 Binary files /dev/null and b/secrets/concourse-session-signing-key.age differ diff --git a/secrets/concourse-tsa-host-key.age b/secrets/concourse-tsa-host-key.age new file mode 100644 index 0000000..1ae5259 Binary files /dev/null and b/secrets/concourse-tsa-host-key.age differ diff --git a/secrets/concourse-worker-key.age b/secrets/concourse-worker-key.age new file mode 100644 index 0000000..74f2246 Binary files /dev/null and b/secrets/concourse-worker-key.age differ diff --git a/secrets/gitea-database-password.age b/secrets/gitea-database-password.age new file mode 100644 index 0000000..28264ca --- /dev/null +++ b/secrets/gitea-database-password.age @@ -0,0 +1,20 @@ +age-encryption.org/v1 +-> ssh-rsa kFDS0A +j4vAJUTfwqSNwCxwbD8CQ1NCosHwl7WeWQ6yzJTVTS91GuBiPHy31sB4HsoLIvMS +S6fqRaDWytvcQqGu1zrKISVER8nJBeprhaDV0wK4cmDPAgnkoPBOzp6ZEXGoEhM9 +pQBosLYGtInnCXVbdd2cWCaKLcmjMaItZzeC/xcjgAmkWOhbkt5DQbcxoplcPdJ3 +v4UGpVSylpO99Th3UyWQ0uQ66I2hkvipJaEbeXZakLdb5RWRDQAdjHQVThjxaNr6 +IzQ5dlIHPbH1fUSkj7vC5RyTbJC9o2MaiO4TnrMrwqfmrN18KvmtrzIsaeH6695B +2hwpaQzJRt/eM9aWX29eRGzaaZPKpajhNlZO6ADGDnBtLrlFRsGDkxdaSVCknZce +e7xo/MHtjs6HrITUSkrclP9uiNrsgz9lUd0j6bqZJMEsIAPlKXsckhoinr9pVxWG +wHhwaYCFKh0JGO2x/LFwTfhiLWtUGWWbv24wU2nKXInQE2BNKz/kDNoVSKnXwxUF +Y8FNR/SnLpYrVLvJozWGs5XaIDNmmnKspBzwA4T/uUttt/VsZkpDY1MC+M/l0SRv +iEhzFiDcR8ZLqLOm40F1ZcuDjpMnc26Vw9MnJlU5drkC68UmSnhdtfwZrz8tIjM5 +AE2xrygSJIdcRBwXfr1WCpgT8fkXmloumGbeAeC7MGs +-> ssh-ed25519 cakP9w u0fC9unKSlgCaf8LeexabNZHN5TiE7Ji9edwTAY2hy0 +R47comlzrdTwh5/HyYcJWnbaJXz5Gyiyl5grPhWA4FE +-> {SpZO^-grease V[ P= +oCMLf3Ix+ganP4GNp1mFZvfeJPp5ohdIyR8ZWUstJAmxJ8uja6MHc0JOjnWfGvtW +k4oWmmkOrRx6 +--- PMDSGvBkvUV+g/tYN3n93q7ikX3vwsd9yvHi1PvNjjg +-7pl?PMPª:B}m3&]ma1O-$N!7gL|w=L5 \ No newline at end of file diff --git a/secrets/hosting.de-api.key b/secrets/hosting.de-api.key new file mode 100644 index 0000000..32c936b --- /dev/null +++ b/secrets/hosting.de-api.key @@ -0,0 +1,20 @@ +age-encryption.org/v1 +-> ssh-rsa kFDS0A +MLbUT2OZ5uLq2uC4GdBNhQqrN8BjF3FibWT5NpfcL+ryr5wI1HfHnTINQR1SfcP6 +e7YF2+lJXiI+Clp+V3/eG5mDMXo358lr1usQPo3AJp0L/F+ZXuYgXIYgp/H6CpX7 +ztVM3BavlwvKibiFzpJVESIQW/aMp+fotTG5BBCzQ9P5ejpRCyBnw023VXG4bul6 +kSBbjaclmXAB/kErB/CBrQX8khYzy/sPWMeyKfNpQNRebwHfwifSKtwvl9CrII0S +6UAK6oKhi+5heqCtn0t2ToY+Jo9ccMjf1tKuQkUkT9gxJqalYakK9Z/Cn1YjteS1 +/QBE+pVNJYtqeND2kWoh7GDgHMN3RpSOZTTfLYWMatfwdZn78y5Qnri6GxKMMpcH +HJjFR3/u08sa5Z6QJN5ajMCze5QEVCfkbP7OUvdD77JagoR2TGphJXHWuHBBjNT0 +67GnaVjtjBSkPc2wHaB9jXCLcpkYtx2JwvcYIBmyzu+uw3dVXekT54dXMckW04B9 +2A+zH35yNX7cG1BdAaqXsj0q8XHLi+ZyyZBB/OSXFaz07JI8Uo7V17MU6N+yFCbn +UeIh82gingQU1+OBRSi1Qbee76RqRGOB9oJywxWYoj0tfCb5j+CW0UH18rKRCy1p +nbyIY2mp1pVMVnkv+UH5HDJZYTVt6H8HllKZcqy8tUQ +-> ssh-ed25519 cakP9w r7YM3I761Ly8mdPE5Aue4piOtU2WuBCX/ZkuODcC11E ++FGBvDNQiChuuYWGzo9lKiFGWtkGpd+h+zbi0fjR610 +-> f(eo)$--grease = zT ssh-rsa kFDS0A +DWQcu9+8Tt6PbnhhtjaEh4JwKckPzGp8T886OitKmT36ONeX1xm4rxUV1BlZJESH +bBUorgCjlVeNadhrvMH6f79iq84Itz3wFsRn3wtXTHPjyOjXKq3mBFCZchkNQXrQ +kAlHVSU4KxArWdDgxZlSDDjqVKUO2otOax0jQIrATyoyXxydv3IrY+I/QJNXyMVV +TWWur2MjLfRtXf8pKhKHhZMGthOtnYRYJplR638hw4TQ0j4/7J34qcZZgNoo4pUY +FHO1xLqxdRzMiE5Kn7drhJ667QeEANZUr1sPjejXahMx/oYatpZ7YxDk2l8P4bcO +qAiQ5Z3h1wfhfhHJWLCXac9jBifZeMXXsi43lB7/A+8OCPPZbJam6ng9Nqi6q52S +nCwY54c50mDp1iS8b8coBnVqr4JPA+mipy31KGmbysxjKRV7SovYuPq6xzGzL9gO +nAxpvwGuPShuKQMQ373u0NL5Fx3gnSwBpDax9Q8ZIvkn/iGIjntQj8IaDDXUtOUg +6r3wQD8m8C54q8hdOeb8dvDTb8YkXJGumikOwx04KhhX/MJbIMpwSmhZGHdCY44v +qhTQcnudnPUskTZsenY4pw9LOdzuVeLqGL2359qvw8w8KTNtZfeif0xCpWBKMOw8 +F3wdYRaowGp0Hqi1wb+mKtiz4Tyx93crkflrpxs5hT8 +-> ssh-ed25519 cakP9w m4+f1g38ZLRWqO1eKOSnu/0wJ+ou4j/4VgR8IJhh9Bc +1MkqVLAk5hZyyvjVSU7ScIitGkIiQlCl7oxJCBw7xmE +-> Bp=k^MJA-grease +iP4iWQsV1F2QEiShf0j9AhCUq+SXOxQ +--- d1wE82sM45YxhJkxchil/8TFhZMjyDVSySvgS6BQCck +dVQrJ8rg( +if6O#Wj,d q