Compare commits
11 Commits
037df324fd
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
2449532b30 | ||
|
|
39d2b5a609 | ||
|
|
3b2d19f8a6 | ||
|
|
4439e6d173 | ||
|
|
048244f122 | ||
|
|
09e93ef6f0 | ||
|
|
dd59d2a56d | ||
|
|
f9415c05f9 | ||
|
|
e1de4805ce | ||
|
|
f482759c2e | ||
|
|
ad35d27135 |
0
.beads/.sync.lock
Normal file
0
.beads/.sync.lock
Normal file
@@ -1 +1,2 @@
|
|||||||
{"id":"nixos-config-gx2","title":"form","status":"tombstone","priority":2,"issue_type":"task","created_at":"2026-01-11T11:49:21.688289476+01:00","created_by":"m3tam3re","updated_at":"2026-01-11T11:51:36.426124223+01:00","deleted_at":"2026-01-11T11:51:36.426124223+01:00","deleted_by":"daemon","delete_reason":"delete","original_type":"task"}
|
{"id":"nixos-config-gx2","title":"form","status":"tombstone","priority":2,"issue_type":"task","created_at":"2026-01-11T11:49:21.688289476+01:00","created_by":"m3tam3re","updated_at":"2026-01-11T11:51:36.426124223+01:00","deleted_at":"2026-01-11T11:51:36.426124223+01:00","deleted_by":"daemon","delete_reason":"delete","original_type":"task"}
|
||||||
|
{"id":"nixos-config-n4l","title":"Create Gitea action for nix-update package updates","description":"Create a Gitea action to automatically update packages in this nixos-config repository using nix-update.\n\n**Context:**\n- Gitea instance is already running on m3-atlas at code.m3ta.dev (configured in hosts/m3-atlas/services/gitea.nix)\n- The repository is self-hosted on this Gitea instance\n- nix-update is already referenced in home/features/cli/default.nix\n- Currently no Gitea workflows exist (.gitea/ directory does not exist)\n\n**Goal:**\nAutomate package updates by creating a Gitea Actions workflow that:\n1. Runs nix-update periodically (e.g., weekly or on schedule)\n2. Updates package definitions in pkgs/ directory\n3. Creates pull requests with the updates\n4. Uses appropriate secrets/credentials for the Gitea instance\n\n**Requirements:**\n- Create .gitea/workflows/ directory structure\n- Define workflow file with nix-update command\n- Configure triggers (schedule, manual, or on repository events)\n- Set up proper permissions and secrets\n- Test the workflow execution\n\n**Current Repository State:**\n- pkgs/default.nix exists but is minimal (currently just a comment)\n- Multiple nixpkgs inputs are used (unstable, 25.11, locked, master)\n- Custom m3ta-nixpkgs overlay at code.m3ta.dev/m3tam3re/nixpkgs\n- Uses agenix for secrets management\n\n**Related Files:**\n- hosts/m3-atlas/services/gitea.nix (existing Gitea configuration)\n- hosts/common/ports.nix (port management)\n- home/features/cli/default.nix (nix-update reference)\n\n**Acceptance Criteria:**\n- [ ] Create .gitea/workflows directory\n- [ ] Implement nix-update workflow YAML\n- [ ] Configure appropriate triggers\n- [ ] Test workflow on the repository\n- [ ] Document setup and configuration","status":"closed","priority":2,"issue_type":"feature","owner":"p@m3ta.dev","created_at":"2026-01-13T20:39:49.838916335+01:00","created_by":"m3tm3re","updated_at":"2026-01-13T20:51:43.833041989+01:00","closed_at":"2026-01-13T20:51:43.833041989+01:00","close_reason":"Closed"}
|
||||||
|
|||||||
2
.beads/sync_base.jsonl
Normal file
2
.beads/sync_base.jsonl
Normal file
@@ -0,0 +1,2 @@
|
|||||||
|
{"id":"nixos-config-gx2","title":"form","status":"tombstone","priority":2,"issue_type":"task","created_at":"2026-01-11T11:49:21.688289476+01:00","created_by":"m3tam3re","updated_at":"2026-01-11T11:51:36.426124223+01:00","deleted_at":"2026-01-11T11:51:36.426124223+01:00","deleted_by":"daemon","delete_reason":"delete","original_type":"task"}
|
||||||
|
{"id":"nixos-config-n4l","title":"Create Gitea action for nix-update package updates","description":"Create a Gitea action to automatically update packages in this nixos-config repository using nix-update.\n\n**Context:**\n- Gitea instance is already running on m3-atlas at code.m3ta.dev (configured in hosts/m3-atlas/services/gitea.nix)\n- The repository is self-hosted on this Gitea instance\n- nix-update is already referenced in home/features/cli/default.nix\n- Currently no Gitea workflows exist (.gitea/ directory does not exist)\n\n**Goal:**\nAutomate package updates by creating a Gitea Actions workflow that:\n1. Runs nix-update periodically (e.g., weekly or on schedule)\n2. Updates package definitions in pkgs/ directory\n3. Creates pull requests with the updates\n4. Uses appropriate secrets/credentials for the Gitea instance\n\n**Requirements:**\n- Create .gitea/workflows/ directory structure\n- Define workflow file with nix-update command\n- Configure triggers (schedule, manual, or on repository events)\n- Set up proper permissions and secrets\n- Test the workflow execution\n\n**Current Repository State:**\n- pkgs/default.nix exists but is minimal (currently just a comment)\n- Multiple nixpkgs inputs are used (unstable, 25.11, locked, master)\n- Custom m3ta-nixpkgs overlay at code.m3ta.dev/m3tam3re/nixpkgs\n- Uses agenix for secrets management\n\n**Related Files:**\n- hosts/m3-atlas/services/gitea.nix (existing Gitea configuration)\n- hosts/common/ports.nix (port management)\n- home/features/cli/default.nix (nix-update reference)\n\n**Acceptance Criteria:**\n- [ ] Create .gitea/workflows directory\n- [ ] Implement nix-update workflow YAML\n- [ ] Configure appropriate triggers\n- [ ] Test workflow on the repository\n- [ ] Document setup and configuration","status":"closed","priority":2,"issue_type":"feature","owner":"p@m3ta.dev","created_at":"2026-01-13T20:39:49.838916335+01:00","created_by":"m3tm3re","updated_at":"2026-01-13T20:51:43.833041989+01:00","closed_at":"2026-01-13T20:51:43.833041989+01:00","close_reason":"Closed"}
|
||||||
113
flake.lock
generated
113
flake.lock
generated
@@ -24,11 +24,11 @@
|
|||||||
"agents": {
|
"agents": {
|
||||||
"flake": false,
|
"flake": false,
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767965833,
|
"lastModified": 1768756367,
|
||||||
"narHash": "sha256-8tKEfJU4bxlgPJwUTUDQkVJMbwWQMiYt+moLjMIFeVY=",
|
"narHash": "sha256-s6AVS1NHXtfc9m4ccSM1+VzC2pjE6dfx9RT7JmELZpo=",
|
||||||
"ref": "refs/heads/master",
|
"ref": "refs/heads/master",
|
||||||
"rev": "3e20c82603a4ddedf04ff001adf943723a49dc37",
|
"rev": "8ebb30fb2b50026034ba87e8c0aca63b09a993b3",
|
||||||
"revCount": 7,
|
"revCount": 10,
|
||||||
"type": "git",
|
"type": "git",
|
||||||
"url": "https://code.m3ta.dev/m3tam3re/AGENTS"
|
"url": "https://code.m3ta.dev/m3tam3re/AGENTS"
|
||||||
},
|
},
|
||||||
@@ -82,11 +82,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1766150702,
|
"lastModified": 1768727946,
|
||||||
"narHash": "sha256-P0kM+5o+DKnB6raXgFEk3azw8Wqg5FL6wyl9jD+G5a4=",
|
"narHash": "sha256-le2GY+ZR6uRHMuOAc60sBR3gBD2BEk1qOZ3S5C/XFpU=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "916506443ecd0d0b4a0f4cf9d40a3c22ce39b378",
|
"rev": "558e84658d0eafc812497542ad6ca0d9654b3b0f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -162,11 +162,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767930051,
|
"lastModified": 1768836546,
|
||||||
"narHash": "sha256-YXtqo8h5bAbqC64XAPMMsZdYk8XkwkyNj/7XOsIyVf8=",
|
"narHash": "sha256-nJZkTamcXXMW+SMYiGFB6lB8l0aJw0xjssfN8xYd/Fs=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "297a08510894822ddd93ee2cfc66d6ac65a3cebb",
|
"rev": "b56c5ad14fcf8b5bc887463552483bf000ca562a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -240,20 +240,18 @@
|
|||||||
},
|
},
|
||||||
"m3ta-nixpkgs": {
|
"m3ta-nixpkgs": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixpkgs": "nixpkgs_3"
|
"nixpkgs": "nixpkgs_3",
|
||||||
|
"opencode": "opencode"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1768068765,
|
"lastModified": 1769186400,
|
||||||
"narHash": "sha256-02ZFGjzZxoba0PSeStMyHHe1GPiCUh3Ve6zltevw0RE=",
|
"narHash": "sha256-9e9yvKJPufg0mTroH+vUUzxp+eX1tvy5QLSzKSw6uLI=",
|
||||||
"ref": "refs/heads/master",
|
"path": "/home/m3tam3re/p/NIX/nixpkgs",
|
||||||
"rev": "00b858fbbed6d2ad9e9a4303bdbe96dc249c5e22",
|
"type": "path"
|
||||||
"revCount": 31,
|
|
||||||
"type": "git",
|
|
||||||
"url": "https://code.m3ta.dev/m3tam3re/nixpkgs"
|
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "git",
|
"path": "/home/m3tam3re/p/NIX/nixpkgs",
|
||||||
"url": "https://code.m3ta.dev/m3tam3re/nixpkgs"
|
"type": "path"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nix-colors": {
|
"nix-colors": {
|
||||||
@@ -293,7 +291,7 @@
|
|||||||
"nixos-generators": {
|
"nixos-generators": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"nixlib": "nixlib",
|
"nixlib": "nixlib",
|
||||||
"nixpkgs": "nixpkgs_4"
|
"nixpkgs": "nixpkgs_5"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1764234087,
|
"lastModified": 1764234087,
|
||||||
@@ -390,11 +388,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-master": {
|
"nixpkgs-master": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767950769,
|
"lastModified": 1768844247,
|
||||||
"narHash": "sha256-oT4Tj7O9361bmMbPwuAcH2zgj2fUZao7F32Bkah+AmE=",
|
"narHash": "sha256-vAPadjf0C/6Xcb/5YO30S38lSV8/gNKRwWSfpS6SGNY=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "3cf525869eaad0c4105795523d158d6985d40885",
|
"rev": "ba686298c491728b8ee1774c8520665293517540",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -406,11 +404,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-stable": {
|
"nixpkgs-stable": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767799921,
|
"lastModified": 1768621446,
|
||||||
"narHash": "sha256-r4GVX+FToWVE2My8VVZH4V0pTIpnu2ZE8/Z4uxGEMBE=",
|
"narHash": "sha256-6YwHV1cjv6arXdF/PQc365h1j+Qje3Pydk501Rm4Q+4=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "d351d0653aeb7877273920cd3e823994e7579b0b",
|
"rev": "72ac591e737060deab2b86d6952babd1f896d7c5",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -438,11 +436,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs_3": {
|
"nixpkgs_3": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1766309749,
|
"lastModified": 1768127708,
|
||||||
"narHash": "sha256-3xY8CZ4rSnQ0NqGhMKAy5vgC+2IVK0NoVEzDoOh4DA4=",
|
"narHash": "sha256-1Sm77VfZh3mU0F5OqKABNLWxOuDeHIlcFjsXeeiPazs=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "a6531044f6d0bef691ea18d4d4ce44d0daa6e816",
|
"rev": "ffbc9f8cbaacfb331b6017d5a5abb21a492c9a38",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -453,6 +451,22 @@
|
|||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_4": {
|
"nixpkgs_4": {
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1768393167,
|
||||||
|
"narHash": "sha256-n2063BRjHde6DqAz2zavhOOiLUwA3qXt7jQYHyETjX8=",
|
||||||
|
"owner": "NixOS",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"rev": "2f594d5af95d4fdac67fba60376ec11e482041cb",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "NixOS",
|
||||||
|
"ref": "nixpkgs-unstable",
|
||||||
|
"repo": "nixpkgs",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
"nixpkgs_5": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1736657626,
|
"lastModified": 1736657626,
|
||||||
"narHash": "sha256-FWlPMUzp0lkQBdhKlPqtQdqmp+/C+1MBiEytaYfrCTY=",
|
"narHash": "sha256-FWlPMUzp0lkQBdhKlPqtQdqmp+/C+1MBiEytaYfrCTY=",
|
||||||
@@ -468,13 +482,13 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_5": {
|
"nixpkgs_6": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767767207,
|
"lastModified": 1768564909,
|
||||||
"narHash": "sha256-Mj3d3PfwltLmukFal5i3fFt27L6NiKXdBezC1EBuZs4=",
|
"narHash": "sha256-Kell/SpJYVkHWMvnhqJz/8DqQg2b6PguxVWOuadbHCc=",
|
||||||
"owner": "nixos",
|
"owner": "nixos",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "5912c1772a44e31bf1c63c0390b90501e5026886",
|
"rev": "e4bae1bd10c9c57b2cf517953ab70060a828ee6f",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -484,7 +498,7 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
"nixpkgs_6": {
|
"nixpkgs_7": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1710272261,
|
"lastModified": 1710272261,
|
||||||
"narHash": "sha256-g0bDwXFmTE7uGDOs9HcJsfLFhH7fOsASbAuOzDC+fhQ=",
|
"narHash": "sha256-g0bDwXFmTE7uGDOs9HcJsfLFhH7fOsASbAuOzDC+fhQ=",
|
||||||
@@ -508,11 +522,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1767950946,
|
"lastModified": 1768844638,
|
||||||
"narHash": "sha256-1uAvkp3rbtF4fdjiiXfGydNOLFcG6J0/LXbHFgQLxKY=",
|
"narHash": "sha256-d0kHY4VjvpkAtOJxcN9xM9UvYZIxWs9f/gybe2+wHzI=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "NUR",
|
"repo": "NUR",
|
||||||
"rev": "3fabc71263f7765c342740db5360a2308ece715d",
|
"rev": "5089b930f2ee6d34412f9d2c625bbe3926bb4bee",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -521,6 +535,25 @@
|
|||||||
"type": "github"
|
"type": "github"
|
||||||
}
|
}
|
||||||
},
|
},
|
||||||
|
"opencode": {
|
||||||
|
"inputs": {
|
||||||
|
"nixpkgs": "nixpkgs_4"
|
||||||
|
},
|
||||||
|
"locked": {
|
||||||
|
"lastModified": 1769153255,
|
||||||
|
"narHash": "sha256-ardM8zEJWvTvsFMQZWivjGPB2uIqFw6QPAzrRjAHQKY=",
|
||||||
|
"owner": "anomalyco",
|
||||||
|
"repo": "opencode",
|
||||||
|
"rev": "c130dd425a32fe1c1cd3747ea6565b0e6bf50100",
|
||||||
|
"type": "github"
|
||||||
|
},
|
||||||
|
"original": {
|
||||||
|
"owner": "anomalyco",
|
||||||
|
"ref": "v1.1.34",
|
||||||
|
"repo": "opencode",
|
||||||
|
"type": "github"
|
||||||
|
}
|
||||||
|
},
|
||||||
"root": {
|
"root": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"agenix": "agenix",
|
"agenix": "agenix",
|
||||||
@@ -531,7 +564,7 @@
|
|||||||
"m3ta-nixpkgs": "m3ta-nixpkgs",
|
"m3ta-nixpkgs": "m3ta-nixpkgs",
|
||||||
"nix-colors": "nix-colors",
|
"nix-colors": "nix-colors",
|
||||||
"nixos-generators": "nixos-generators",
|
"nixos-generators": "nixos-generators",
|
||||||
"nixpkgs": "nixpkgs_5",
|
"nixpkgs": "nixpkgs_6",
|
||||||
"nixpkgs-45570c2": "nixpkgs-45570c2",
|
"nixpkgs-45570c2": "nixpkgs-45570c2",
|
||||||
"nixpkgs-9e58ed7": "nixpkgs-9e58ed7",
|
"nixpkgs-9e58ed7": "nixpkgs-9e58ed7",
|
||||||
"nixpkgs-locked": "nixpkgs-locked",
|
"nixpkgs-locked": "nixpkgs-locked",
|
||||||
@@ -544,7 +577,7 @@
|
|||||||
"rose-pine-hyprcursor": {
|
"rose-pine-hyprcursor": {
|
||||||
"inputs": {
|
"inputs": {
|
||||||
"hyprlang": "hyprlang",
|
"hyprlang": "hyprlang",
|
||||||
"nixpkgs": "nixpkgs_6",
|
"nixpkgs": "nixpkgs_7",
|
||||||
"utils": "utils"
|
"utils": "utils"
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
|
|||||||
@@ -68,6 +68,7 @@ in {
|
|||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# Aliases
|
||||||
alias .. = cd ..
|
alias .. = cd ..
|
||||||
alias ... = cd ...
|
alias ... = cd ...
|
||||||
alias h = cd $env.HOME
|
alias h = cd $env.HOME
|
||||||
|
|||||||
@@ -23,6 +23,7 @@
|
|||||||
torch
|
torch
|
||||||
srt
|
srt
|
||||||
]))
|
]))
|
||||||
|
opencode-desktop
|
||||||
pyrefly
|
pyrefly
|
||||||
nixd
|
nixd
|
||||||
alejandra
|
alejandra
|
||||||
|
|||||||
@@ -1,7 +1,4 @@
|
|||||||
{inputs, ...}: {
|
{inputs, ...}: {
|
||||||
imports =
|
|
||||||
[ "${inputs.m3ta-nixpkgs}/modules/home-manager/coding/basecamp-mcp.nix" ];
|
|
||||||
|
|
||||||
xdg.configFile = {
|
xdg.configFile = {
|
||||||
"opencode/command" = {
|
"opencode/command" = {
|
||||||
source = "${inputs.agents}/command";
|
source = "${inputs.agents}/command";
|
||||||
@@ -21,17 +18,13 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
m3ta.coding.opencode.mcp.basecamp = {
|
|
||||||
enable = true;
|
|
||||||
envFile = "/run/agenix/basecamp-env";
|
|
||||||
};
|
|
||||||
programs.opencode = {
|
programs.opencode = {
|
||||||
enable = true;
|
enable = true;
|
||||||
settings = {
|
settings = {
|
||||||
theme = "opencode";
|
theme = "opencode";
|
||||||
plugin =
|
plugin = ["oh-my-opencode" "opencode-beads" "opencode-antigravity-auth@beta"];
|
||||||
[ "oh-my-opencode" "opencode-beads" "opencode-antigravity-auth@beta" ];
|
agent =
|
||||||
agent = builtins.fromJSON
|
builtins.fromJSON
|
||||||
(builtins.readFile "${inputs.agents}/agent/agents.json");
|
(builtins.readFile "${inputs.agents}/agent/agents.json");
|
||||||
formatter = {
|
formatter = {
|
||||||
alejandra = {
|
alejandra = {
|
||||||
@@ -58,6 +51,19 @@
|
|||||||
];
|
];
|
||||||
enabled = false;
|
enabled = false;
|
||||||
};
|
};
|
||||||
|
Basecamp = {
|
||||||
|
type = "local";
|
||||||
|
command = [
|
||||||
|
"/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/venv/bin/python"
|
||||||
|
"/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/basecamp_fastmcp.py"
|
||||||
|
];
|
||||||
|
environment = {
|
||||||
|
PYTHONPATH = "/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server";
|
||||||
|
VIRTUAL_ENV = "/home/m3tam3re/p/PYTHON/Basecamp-MCP-Server/venv";
|
||||||
|
BASECAMP_ACCOUNT_ID = "5996442";
|
||||||
|
};
|
||||||
|
enabled = false;
|
||||||
|
};
|
||||||
Exa = {
|
Exa = {
|
||||||
type = "local";
|
type = "local";
|
||||||
command = [
|
command = [
|
||||||
@@ -71,7 +77,7 @@
|
|||||||
provider = {
|
provider = {
|
||||||
google = {
|
google = {
|
||||||
models = {
|
models = {
|
||||||
"antigravity-gemini-3-pro" = {
|
antigravity-gemini-3-pro = {
|
||||||
name = "Gemini 3 Pro (Antigravity)";
|
name = "Gemini 3 Pro (Antigravity)";
|
||||||
limit = {
|
limit = {
|
||||||
context = 1048576;
|
context = 1048576;
|
||||||
@@ -86,7 +92,7 @@
|
|||||||
high = {thinkingLevel = "high";};
|
high = {thinkingLevel = "high";};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"antigravity-gemini-3-flash" = {
|
antigravity-gemini-3-flash = {
|
||||||
name = "Gemini 3 Flash (Antigravity)";
|
name = "Gemini 3 Flash (Antigravity)";
|
||||||
limit = {
|
limit = {
|
||||||
context = 1048576;
|
context = 1048576;
|
||||||
@@ -103,8 +109,8 @@
|
|||||||
high = {thinkingLevel = "high";};
|
high = {thinkingLevel = "high";};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"antigravity-claude-sonnet-4-5" = {
|
antigravity-claude-sonnet-4-5 = {
|
||||||
name = "Claude Sonnet 4.5 (no thinking) (Antigravity)";
|
name = "Claude Sonnet 4.5 (Antigravity)";
|
||||||
limit = {
|
limit = {
|
||||||
context = 200000;
|
context = 200000;
|
||||||
output = 64000;
|
output = 64000;
|
||||||
@@ -114,7 +120,7 @@
|
|||||||
output = ["text"];
|
output = ["text"];
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"antigravity-claude-sonnet-4-5-thinking" = {
|
antigravity-claude-sonnet-4-5-thinking = {
|
||||||
name = "Claude Sonnet 4.5 Thinking (Antigravity)";
|
name = "Claude Sonnet 4.5 Thinking (Antigravity)";
|
||||||
limit = {
|
limit = {
|
||||||
context = 200000;
|
context = 200000;
|
||||||
@@ -129,7 +135,7 @@
|
|||||||
max = {thinkingConfig = {thinkingBudget = 32768;};};
|
max = {thinkingConfig = {thinkingBudget = 32768;};};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
"antigravity-claude-opus-4-5-thinking" = {
|
antigravity-claude-opus-4-5-thinking = {
|
||||||
name = "Claude Opus 4.5 Thinking (Antigravity)";
|
name = "Claude Opus 4.5 Thinking (Antigravity)";
|
||||||
limit = {
|
limit = {
|
||||||
context = 200000;
|
context = 200000;
|
||||||
@@ -195,11 +201,11 @@
|
|||||||
};
|
};
|
||||||
|
|
||||||
home.file.".config/opencode/oh-my-opencode.json".text = builtins.toJSON {
|
home.file.".config/opencode/oh-my-opencode.json".text = builtins.toJSON {
|
||||||
"$schema" =
|
"$schema" = "https://raw.githubusercontent.com/code-yeongyu/oh-my-opencode/master/assets/oh-my-opencode.schema.json";
|
||||||
"https://raw.githubusercontent.com/code-yeongyu/oh-my-opencode/master/assets/oh-my-opencode.schema.json";
|
google_auth = false;
|
||||||
agents = {
|
agents = {
|
||||||
Sisyphus = {
|
Sisyphus = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.7";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "allow";
|
edit = "allow";
|
||||||
bash = {
|
bash = {
|
||||||
@@ -266,21 +272,21 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
explore = {
|
explore = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.5-air";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "deny";
|
edit = "deny";
|
||||||
bash = "deny";
|
bash = "deny";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
oracle = {
|
oracle = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.7";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "deny";
|
edit = "deny";
|
||||||
bash = "deny";
|
bash = "deny";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
frontend-ui-ux-engineer = {
|
frontend-ui-ux-engineer = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.7";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "allow";
|
edit = "allow";
|
||||||
bash = {
|
bash = {
|
||||||
@@ -300,19 +306,70 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
document-writer = {
|
document-writer = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.5-air";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "allow";
|
edit = "allow";
|
||||||
bash = "deny";
|
bash = "deny";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
multimodal-looker = {
|
multimodal-looker = {
|
||||||
model = "opencode/glm-4.7-free";
|
model = "zai-coding-plan/glm-4.7";
|
||||||
permission = {
|
permission = {
|
||||||
edit = "deny";
|
edit = "deny";
|
||||||
bash = "deny";
|
bash = "deny";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
"Prometheus (Planner)" = {
|
||||||
|
model = "zai-coding-plan/glm-4.7";
|
||||||
|
permission = {
|
||||||
|
edit = "deny";
|
||||||
|
bash = "allow";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"Metis (Plan Consultant)" = {
|
||||||
|
model = "zai-coding-plan/glm-4.7";
|
||||||
|
permission = {
|
||||||
|
edit = "deny";
|
||||||
|
bash = "allow";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"Momus (Plan Reviewer)" = {
|
||||||
|
model = "zai-coding-plan/glm-4.7";
|
||||||
|
permission = {
|
||||||
|
edit = "deny";
|
||||||
|
bash = "allow";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"Atlas" = {
|
||||||
|
model = "zai-coding-plan/glm-4.7";
|
||||||
|
permission = {
|
||||||
|
edit = "deny";
|
||||||
|
bash = "allow";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
"categories" = {
|
||||||
|
"visual-engineering" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
|
"ultrabrain" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
|
"artistry" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
|
"quick" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.5-ai";
|
||||||
|
};
|
||||||
|
"unspecified-low" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
|
"unspecified-high" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
|
"writing" = {
|
||||||
|
"model" = "zai-coding-plan/glm-4.7";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
disabled_mcps = ["context7" "websearch"];
|
disabled_mcps = ["context7" "websearch"];
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -31,6 +31,7 @@ in {
|
|||||||
"XDG_CURRENT_DESKTOP,Hyprland"
|
"XDG_CURRENT_DESKTOP,Hyprland"
|
||||||
"XDG_SESSION_TYPE,wayland"
|
"XDG_SESSION_TYPE,wayland"
|
||||||
"XDG_SESSION_DESKTOP,Hyprland"
|
"XDG_SESSION_DESKTOP,Hyprland"
|
||||||
|
"NIXOS_OZONE_WL,1"
|
||||||
];
|
];
|
||||||
|
|
||||||
input = {
|
input = {
|
||||||
|
|||||||
@@ -14,7 +14,6 @@ in {
|
|||||||
xdg.portal = {
|
xdg.portal = {
|
||||||
# xdg desktop intergration (required for flatpak)
|
# xdg desktop intergration (required for flatpak)
|
||||||
enable = true;
|
enable = true;
|
||||||
wlr.enable = true;
|
|
||||||
extraPortals = with pkgs; [
|
extraPortals = with pkgs; [
|
||||||
xdg-desktop-portal-hyprland
|
xdg-desktop-portal-hyprland
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -1,8 +1,10 @@
|
|||||||
{
|
{ config, pkgs, inputs, ... }: {
|
||||||
config,
|
# Workaround for tuxedo-drivers module bug in unstable (nixpkgs#480391)
|
||||||
pkgs,
|
# The unstable module has a type error - use stable module until fix propagates
|
||||||
...
|
disabledModules = [ "hardware/tuxedo-drivers.nix" ];
|
||||||
}: {
|
imports =
|
||||||
|
[ "${inputs.nixpkgs-stable}/nixos/modules/hardware/tuxedo-drivers.nix" ];
|
||||||
|
|
||||||
hardware.nvidia = {
|
hardware.nvidia = {
|
||||||
prime = {
|
prime = {
|
||||||
offload.enable = false;
|
offload.enable = false;
|
||||||
@@ -36,18 +38,12 @@
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [ tuxedo-backlight ];
|
||||||
tuxedo-backlight
|
security.sudo.extraRules = [{
|
||||||
];
|
|
||||||
security.sudo.extraRules = [
|
|
||||||
{
|
|
||||||
users = [ "@wheel" ];
|
users = [ "@wheel" ];
|
||||||
commands = [
|
commands = [{
|
||||||
{
|
|
||||||
command = "/run/current-system/sw/bin/set-backlight";
|
command = "/run/current-system/sw/bin/set-backlight";
|
||||||
options = [ "NOPASSWD" ];
|
options = [ "NOPASSWD" ];
|
||||||
}
|
}];
|
||||||
];
|
}];
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -33,6 +33,14 @@
|
|||||||
file = ../../secrets/exa-key.age;
|
file = ../../secrets/exa-key.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
|
basecamp-client-id = {
|
||||||
|
file = ../../secrets/basecamp-client-id.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
basecamp-client-secret = {
|
||||||
|
file = ../../secrets/basecamp-client-secret.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
tailscale-key.file = ../../secrets/tailscale-key.age;
|
tailscale-key.file = ../../secrets/tailscale-key.age;
|
||||||
m3tam3re-secrets = {
|
m3tam3re-secrets = {
|
||||||
file = ../../secrets/m3tam3re-secrets.age;
|
file = ../../secrets/m3tam3re-secrets.age;
|
||||||
|
|||||||
@@ -1,51 +1,35 @@
|
|||||||
{
|
{
|
||||||
age = {
|
age = {
|
||||||
secrets = {
|
secrets = {
|
||||||
baserow-env = {
|
baserow-env = { file = ../../secrets/baserow-env.age; };
|
||||||
file = ../../secrets/baserow-env.age;
|
ghost-env = { file = ../../secrets/ghost-env.age; };
|
||||||
};
|
|
||||||
ghost-env = {
|
|
||||||
file = ../../secrets/ghost-env.age;
|
|
||||||
};
|
|
||||||
kestra-config = {
|
kestra-config = {
|
||||||
file = ../../secrets/kestra-config.age;
|
file = ../../secrets/kestra-config.age;
|
||||||
mode = "644";
|
mode = "644";
|
||||||
};
|
};
|
||||||
kestra-env = {
|
kestra-env = { file = ../../secrets/kestra-env.age; };
|
||||||
file = ../../secrets/kestra-env.age;
|
littlelink-m3tam3re = { file = ../../secrets/littlelink-m3tam3re.age; };
|
||||||
};
|
minio-root-cred = { file = ../../secrets/minio-root-cred.age; };
|
||||||
littlelink-m3tam3re = {
|
n8n-env = { file = ../../secrets/n8n-env.age; };
|
||||||
file = ../../secrets/littlelink-m3tam3re.age;
|
paperless-key = { file = ../../secrets/paperless-key.age; };
|
||||||
};
|
restreamer-env = { file = ../../secrets/restreamer-env.age; };
|
||||||
minio-root-cred = {
|
searx = { file = ../../secrets/searx.age; };
|
||||||
file = ../../secrets/minio-root-cred.age;
|
tailscale-key = { file = ../../secrets/tailscale-key.age; };
|
||||||
};
|
|
||||||
n8n-env = {
|
|
||||||
file = ../../secrets/n8n-env.age;
|
|
||||||
};
|
|
||||||
paperless-key = {
|
|
||||||
file = ../../secrets/paperless-key.age;
|
|
||||||
};
|
|
||||||
restreamer-env = {
|
|
||||||
file = ../../secrets/restreamer-env.age;
|
|
||||||
};
|
|
||||||
searx = {
|
|
||||||
file = ../../secrets/searx.age;
|
|
||||||
};
|
|
||||||
tailscale-key = {
|
|
||||||
file = ../../secrets/tailscale-key.age;
|
|
||||||
};
|
|
||||||
traefik = {
|
traefik = {
|
||||||
file = ../../secrets/traefik.age;
|
file = ../../secrets/traefik.age;
|
||||||
owner = "traefik";
|
owner = "traefik";
|
||||||
};
|
};
|
||||||
vaultwarden-env = {
|
vaultwarden-env = { file = ../../secrets/vaultwarden-env.age; };
|
||||||
file = ../../secrets/vaultwarden-env.age;
|
|
||||||
};
|
|
||||||
m3tam3re-secrets = {
|
m3tam3re-secrets = {
|
||||||
file = ../../secrets/m3tam3re-secrets.age;
|
file = ../../secrets/m3tam3re-secrets.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
|
gitea-runner-token = {
|
||||||
|
file = ../../secrets/gitea-runner-token.age;
|
||||||
|
mode = "600";
|
||||||
|
owner = "gitea-runner";
|
||||||
|
group = "gitea-runner";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -2,6 +2,7 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./containers
|
./containers
|
||||||
./gitea.nix
|
./gitea.nix
|
||||||
|
./gitea-actions-runner.nix
|
||||||
./headscale.nix
|
./headscale.nix
|
||||||
./minio.nix
|
./minio.nix
|
||||||
./mysql.nix
|
./mysql.nix
|
||||||
|
|||||||
57
hosts/m3-atlas/services/gitea-actions-runner.nix
Normal file
57
hosts/m3-atlas/services/gitea-actions-runner.nix
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
{
|
||||||
|
config,
|
||||||
|
pkgs,
|
||||||
|
...
|
||||||
|
}: {
|
||||||
|
services.gitea-actions-runner = {
|
||||||
|
instances.default = {
|
||||||
|
enable = true;
|
||||||
|
name = "${config.networking.hostName}-runner";
|
||||||
|
url = "https://code.m3ta.dev";
|
||||||
|
tokenFile = config.age.secrets.gitea-runner-token.path;
|
||||||
|
|
||||||
|
# nixos:host is primary, ubuntu is fallback
|
||||||
|
labels = [
|
||||||
|
"nixos:host"
|
||||||
|
];
|
||||||
|
|
||||||
|
# Host execution packages
|
||||||
|
hostPackages = with pkgs; [
|
||||||
|
bash
|
||||||
|
curl
|
||||||
|
coreutils
|
||||||
|
git
|
||||||
|
jq
|
||||||
|
nix
|
||||||
|
nix-update
|
||||||
|
nodejs
|
||||||
|
# Add any other tools you need for nix-update workflows
|
||||||
|
];
|
||||||
|
|
||||||
|
# Advanced settings
|
||||||
|
settings = {
|
||||||
|
runner = {
|
||||||
|
capacity = 4; # One job at a time (increase if you have resources)
|
||||||
|
timeout = "4h"; # Nix builds can take a while
|
||||||
|
};
|
||||||
|
cache = {enabled = true;};
|
||||||
|
container = {
|
||||||
|
enable_ipv6 = true;
|
||||||
|
privileged = false;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
# User management (auto-created by module, but ensuring proper setup)
|
||||||
|
users.users.gitea-runner = {
|
||||||
|
home = "/var/lib/gitea-runner";
|
||||||
|
group = "gitea-runner";
|
||||||
|
isSystemUser = true;
|
||||||
|
createHome = true;
|
||||||
|
};
|
||||||
|
users.groups.gitea-runner = {};
|
||||||
|
|
||||||
|
# Firewall: Allow Podman bridge networks for cache actions
|
||||||
|
networking.firewall.trustedInterfaces = ["br-+"];
|
||||||
|
}
|
||||||
@@ -5,9 +5,7 @@
|
|||||||
file = ../../secrets/anytype-key.age;
|
file = ../../secrets/anytype-key.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
tailscale-key = {
|
tailscale-key = { file = ../../secrets/tailscale-key.age; };
|
||||||
file = ../../secrets/tailscale-key.age;
|
|
||||||
};
|
|
||||||
wg-DE = {
|
wg-DE = {
|
||||||
file = ../../secrets/wg-DE.age;
|
file = ../../secrets/wg-DE.age;
|
||||||
path = "/etc/wireguard/DE.conf";
|
path = "/etc/wireguard/DE.conf";
|
||||||
@@ -40,6 +38,14 @@
|
|||||||
file = ../../secrets/exa-key.age;
|
file = ../../secrets/exa-key.age;
|
||||||
owner = "m3tam3re";
|
owner = "m3tam3re";
|
||||||
};
|
};
|
||||||
|
basecamp-client-id = {
|
||||||
|
file = ../../secrets/basecamp-client-id.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
|
basecamp-client-secret = {
|
||||||
|
file = ../../secrets/basecamp-client-secret.age;
|
||||||
|
owner = "m3tam3re";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -15,7 +15,7 @@
|
|||||||
gvfs.enable = true;
|
gvfs.enable = true;
|
||||||
trezord.enable = true;
|
trezord.enable = true;
|
||||||
gnome.gnome-keyring.enable = true;
|
gnome.gnome-keyring.enable = true;
|
||||||
qdrant.enable = false;
|
qdrant.enable = true;
|
||||||
stirling-pdf.enable = true;
|
stirling-pdf.enable = true;
|
||||||
avahi = {
|
avahi = {
|
||||||
enable = true;
|
enable = true;
|
||||||
|
|||||||
@@ -8,7 +8,6 @@
|
|||||||
# You can change versions, add patches, set compilation flags, anything really.
|
# You can change versions, add patches, set compilation flags, anything really.
|
||||||
# https://nixos.wiki/wiki/Overlays
|
# https://nixos.wiki/wiki/Overlays
|
||||||
modifications = final: prev: {
|
modifications = final: prev: {
|
||||||
qdrant = inputs.nixpkgs-stable.legacyPackages.${prev.system}.qdrant;
|
|
||||||
# n8n = import ./mods/n8n.nix {inherit prev;};
|
# n8n = import ./mods/n8n.nix {inherit prev;};
|
||||||
|
|
||||||
# brave = prev.brave.override {
|
# brave = prev.brave.override {
|
||||||
|
|||||||
@@ -18,7 +18,6 @@ let
|
|||||||
in {
|
in {
|
||||||
"secrets/anytype-key.age".publicKeys = systems ++ users;
|
"secrets/anytype-key.age".publicKeys = systems ++ users;
|
||||||
"secrets/anytype-key-ares.age".publicKeys = systems ++ users;
|
"secrets/anytype-key-ares.age".publicKeys = systems ++ users;
|
||||||
"secrets/basecamp-env.age".publicKeys = systems ++ users;
|
|
||||||
"secrets/baserow-env.age".publicKeys = systems ++ users;
|
"secrets/baserow-env.age".publicKeys = systems ++ users;
|
||||||
"secrets/ghost-env.age".publicKeys = systems ++ users;
|
"secrets/ghost-env.age".publicKeys = systems ++ users;
|
||||||
"secrets/littlelink-m3tam3re.age".publicKeys = systems ++ users;
|
"secrets/littlelink-m3tam3re.age".publicKeys = systems ++ users;
|
||||||
@@ -30,6 +29,9 @@ in {
|
|||||||
"secrets/paperless-key.age".publicKeys = systems ++ users;
|
"secrets/paperless-key.age".publicKeys = systems ++ users;
|
||||||
"secrets/ref-key.age".publicKeys = systems ++ users;
|
"secrets/ref-key.age".publicKeys = systems ++ users;
|
||||||
"secrets/exa-key.age".publicKeys = systems ++ users;
|
"secrets/exa-key.age".publicKeys = systems ++ users;
|
||||||
|
"secrets/basecamp-client-id.age".publicKeys = systems ++ users;
|
||||||
|
"secrets/basecamp-client-secret.age".publicKeys = systems ++ users;
|
||||||
|
"secrets/gitea-runner-token.age".publicKeys = systems ++ users;
|
||||||
"secrets/restreamer-env.age".publicKeys = systems ++ users;
|
"secrets/restreamer-env.age".publicKeys = systems ++ users;
|
||||||
"secrets/searx.age".publicKeys = systems ++ users;
|
"secrets/searx.age".publicKeys = systems ++ users;
|
||||||
"secrets/tailscale-key.age".publicKeys = systems ++ users;
|
"secrets/tailscale-key.age".publicKeys = systems ++ users;
|
||||||
|
|||||||
BIN
secrets/basecamp-client-id.age
Normal file
BIN
secrets/basecamp-client-id.age
Normal file
Binary file not shown.
21
secrets/basecamp-client-secret.age
Normal file
21
secrets/basecamp-client-secret.age
Normal file
@@ -0,0 +1,21 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 4NLKrw eqiq6a9Ht012v9ryAt2uZwpCU5/DFbiMZIkH0A/ovhc
|
||||||
|
c2ubOjYEc6RjhrZUCyKvB7chJwlCBv1KeIXdXlYcyNA
|
||||||
|
-> ssh-ed25519 5kwcsA R+KKgXolqFgs3sPFKLWBj8CYMHvsE0vcoPYjqgaYSDc
|
||||||
|
jdl1BcHDXY3lvAfFKeHl8lNgbjbxLPOL+5OaPBsJC5o
|
||||||
|
-> ssh-ed25519 9d4YIQ KYeIi3u2JB3efI5pSlc4up2wgAvR+X1xsHuRSZmr5RY
|
||||||
|
Qy6wagBuOXuy5b23stKEc/zfMpN53/56LKMgPFd5fwo
|
||||||
|
-> ssh-ed25519 3Bcr1w yYclbDnxBkGQF+MmcqNDG2VHZDcXK01Orl2c0L4auy4
|
||||||
|
wbC9r7P4hnJT+V0Ic3Pk9nQ5ZUoPL+/qR9Ab5OHv3d0
|
||||||
|
-> ssh-rsa DQlE7w
|
||||||
|
CQBYcl5SvyoDAm5n1QWE9o2er5GxYZvG2zrBtOPs+S7gnm6yHL2rtKDfxf+tpp/E
|
||||||
|
8xJHSi6t9zTWYwZ+udU8gjmawe8GcaWGYOHqjCd4H6Ic5c1aMMfUQsPR2aWlJ7R5
|
||||||
|
4B1D83pZ/PHp1Qqb/AJKoiw3DNo4KrvYS+nX4FXuDD8o9JRuY5KjbY+9E2UcHx0s
|
||||||
|
8XGZq26TY8I2hVA8519bZeI4FTqoBx0yUBuE3VjTlrd/XtgpvNk0YswyMBiqpdhG
|
||||||
|
PY+KZAnEPw3TbFtfmqbLk5QXrm4pn/TE/z4kzN9+3CkT2zbBBPGwaBAtQsOQ6yKL
|
||||||
|
ZQRtnEm9FJzOBu3fFodeBfea8vEzEmuro+zbw/94tk0zjpMzfSehRfLE8tusgO+S
|
||||||
|
/W/7yzlMVeutlWbzwpMZ4mALjz/PAYq8O3Kh88dbu9XEh0i/oWPBJiHlUdYND2YJ
|
||||||
|
5WOSlXDnotRmwB8vGmyPWS72jBfgPZLVfA7y73RzOhc6vwo4jU5Nh6ee+3LPOjfW
|
||||||
|
|
||||||
|
--- 6X7pxwraQpXikkDgLrY3ay7zcwdk9U9LHx/MP8jEgcw
|
||||||
|
<3‘jÂ<6A>ö¼uWÙF“’DæÙŸ™$Hð¹Ç†s)àSÚˆ›/ïÂëº pí3üA‰Sö^ùïóïVß‹u@9‡»µ´rš+L2
|
||||||
5
secrets/gitea-runner-token.age
Normal file
5
secrets/gitea-runner-token.age
Normal file
@@ -0,0 +1,5 @@
|
|||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 4NLKrw yQsk1NS2ujPzm4WJLl/CYi0EZRCIFvgJP2aLG09KJQE
|
||||||
|
H2QT+huNTEpE2ndSeyL38e1JW1Z+UEHObqhZQ66E28M
|
||||||
|
--- 1lhPBj02CB6BsouveThOL4pyTKXQhrUro59YXz0+fRk
|
||||||
|
qœË=÷¼V<C2BC>wÃ×Ü®1A<31>½ß²uš!óI›(ÏÄ?¤CC"ßÞ‹’3.ëÎåŽãsŒô :"úÔº|¦ÑæÃ†çY2”þ\ï<>ýˆ›Í¨«
|
||||||
Reference in New Issue
Block a user