From 9d10005e35d9d18192b22dc7b19397578dab7247 Mon Sep 17 00:00:00 2001
From: =?UTF-8?q?Leon=20Schwarz=C3=A4ugl?=
-This file has 64081 words spanning 16905 lines and was last revised on 2025-06-09 17:22:28 +0200.
+This file has 64380 words spanning 16957 lines and was last revised on 2025-06-09 19:11:36 +0200.
@@ -764,7 +764,7 @@ This section defines my Emacs configuration. For a while, I considered to use ry
-My emacs is built using the emacs-overlay nix flake, which builds a bleeding edge emacs on wayland (pgtk) with utilities like treesitter support. By executing the below source block, the current build setting can be updated at any time, and you can see my most up-to-date build options (last updated: 2025-06-09 17:22:28 +0200)
+My emacs is built using the emacs-overlay nix flake, which builds a bleeding edge emacs on wayland (pgtk) with utilities like treesitter support. By executing the below source block, the current build setting can be updated at any time, and you can see my most up-to-date build options (last updated: 2025-06-09 19:11:36 +0200)
@@ -379,7 +379,7 @@
-
@@ -711,7 +711,7 @@
WLR_RENDERER_ALLOW_SOFTWARE=1 to allow this configuration to run in a virtualized environment. I also enable qemuGuest for a smoother experience when testing on QEMU.
{ self, inputs, config, pkgs, lib, primaryUser, ... }:
@@ -2961,8 +2965,8 @@ in
_: @@ -2972,8 +2976,8 @@ in
_:
@@ -4754,8 +4758,8 @@ appimageTools.wrapType2 {
This programs simply runs ssh-keygen on the last host that I tried to ssh into. I need this frequently when working with cloud-init usually. @@ -4912,8 +4916,8 @@ in
{ lib, config, ... }:
@@ -4980,8 +4984,8 @@ in
{ lib, config, ... }:
@@ -5045,8 +5049,8 @@ in
{ lib, config, ... }:
@@ -5078,8 +5082,8 @@ in
{ lib, config, ... }:
@@ -5100,8 +5104,8 @@ in
{ lib, config, ... }:
@@ -5122,8 +5126,8 @@ in
{ lib, config, ... }:
@@ -5144,8 +5148,8 @@ in
{ lib, config, ... }:
@@ -5166,8 +5170,8 @@ in
{ lib, config, ... }:
@@ -5188,8 +5192,8 @@ in
{ lib, config, ... }:
@@ -5210,8 +5214,8 @@ in
{ lib, config, ... }:
@@ -5264,8 +5268,8 @@ in
{ lib, config, ... }:
@@ -5322,8 +5326,8 @@ in
{ lib, config, ... }:
@@ -5380,8 +5384,8 @@ in
{ lib, config, ... }:
@@ -5433,8 +5437,8 @@ in
{ lib, config, ... }:
@@ -5454,8 +5458,8 @@ in
{ lib, config, ... }:
@@ -5475,8 +5479,8 @@ in
{ lib, config, ... }:
@@ -5497,8 +5501,8 @@ in
{ lib, config, ... }:
@@ -5516,8 +5520,8 @@ in
{ lib, config, ... }:
@@ -6292,7 +6296,7 @@ Enable OpenGL, Sound, Bluetooth and various drivers.
keyboard.qmk.enable = true;
- enableAllFirmware = true;
+ enableAllFirmware = lib.mkDefault true;
bluetooth = lib.mkIf config.swarselsystems.hasBluetooth {
enable = true;
@@ -7050,8 +7054,8 @@ Most of the time I am using power-saver, however, it is good to be
{ lib, pkgs, config, ... }:
@@ -8147,8 +8151,7 @@ in
hardware = {
- # opengl.enable = true;
- enableAllFirmware = true;
+ enableAllFirmware = lib.mkForce true;
};
networking.firewall.allowedTCPPorts = [ 4040 ];
@@ -8688,29 +8691,40 @@ in
{ pkgs, lib, config, ... }:
+let
+ nextcloudDomain = "stash.swarsel.win";
+in
{
options.swarselsystems.modules.server.nextcloud = lib.mkEnableOption "enable nextcloud on server";
config = lib.mkIf config.swarselsystems.modules.server.nextcloud {
- sops.secrets.nextcloudadminpass = {
- owner = "nextcloud";
- group = "nextcloud";
- mode = "0440";
+ sops.secrets = {
+ nextcloudadminpass = {
+ owner = "nextcloud";
+ group = "nextcloud";
+ mode = "0440";
+ };
+ kanidm-nextcloud-client = {
+ owner = "nextcloud";
+ group = "nextcloud";
+ mode = "0440";
+ };
};
services = {
nextcloud = {
enable = true;
package = pkgs.nextcloud31;
- hostName = "stash.swarsel.win";
+ hostName = nextcloudDomain;
home = "/Vault/apps/nextcloud";
datadir = "/Vault/data/nextcloud";
https = true;
configureRedis = true;
maxUploadSize = "4G";
extraApps = {
- inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks;
+ inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
};
+ extraAppsEnable = true;
config = {
adminuser = "admin";
adminpassFile = config.sops.secrets.nextcloudadminpass.path;
@@ -8720,7 +8734,7 @@ in
nginx = {
virtualHosts = {
- "stash.swarsel.win" = {
+ "${nextcloudDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
@@ -8800,6 +8814,14 @@ in
3.3.2.17. paperless
+
+This is my personal document management system. It automatically pulls documents from several sources, the only manual step for physical documents is to put them in my scanner and use email delivery.
+
+
+
+Also I install Tika and Gotenberg, which are needed to create PDFs out of .eml's. This is needed for e.g. online services that only send their invoices through email body text.
+
+
{ lib, pkgs, config, ... }:
{
@@ -8815,7 +8837,7 @@ in
kanidm-paperless-client = {
owner = "paperless";
group = "paperless";
- mode = "440";
+ mode = "0440";
};
};
@@ -8838,7 +8860,7 @@ in
};
PAPERLESS_TIKA_ENABLED = "true";
PAPERLESS_TIKA_ENDPOINT = "http://localhost:9998";
- PAPERLESS_TIKA_GOTENBERG_ENDPOINT = "http://localhost:3001";
+ PAPERLESS_TIKA_GOTENBERG_ENDPOINT = "http://localhost:3002";
PAPERLESS_APPS = "allauth.socialaccount.providers.openid_connect";
PAPERLESS_SOCIALACCOUNT_PROVIDERS = builtins.toJSON {
openid_connect = {
@@ -8848,7 +8870,7 @@ in
provider_id = "kanidm";
name = "Kanidm";
client_id = "paperless";
- # secret will be added dynamically
+ # secret will be added by paperless-web.service (see below)
#secret = "";
settings.server_url = "https://sso.swarsel.win/oauth2/openid/${client_id}/.well-known/openid-configuration";
}
@@ -8868,7 +8890,7 @@ in
gotenberg = {
enable = true;
- port = 3001;
+ port = 3002;
bindIP = "127.0.0.1";
};
};
@@ -8894,6 +8916,10 @@ in
proxyPass = "http://localhost:28981";
extraConfig = ''
client_max_body_size 0;
+ proxy_connect_timeout 300;
+ proxy_send_timeout 300;
+ proxy_read_timeout 300;
+ send_timeout 300;
'';
};
};
@@ -9266,7 +9292,7 @@ in
kanidm-grafana-client = {
owner = "grafana";
group = "grafana";
- mode = "440";
+ mode = "0440";
};
};
@@ -9418,7 +9444,7 @@ in
nginx = {
virtualHosts = {
- "status.swarsel.win" = {
+ "${grafanaDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
@@ -9602,7 +9628,7 @@ in
kanidm-forgejo-client = {
owner = "forgejo";
group = "forgejo";
- mode = "440";
+ mode = "0440";
};
};
@@ -9778,9 +9804,22 @@ in
-
-3.3.2.27. kanidm
+
+3.3.2.27. kanidm
+
+The forgejo configuration is a little broken and will show a 500 error when signing in through kanidm. However, when pressing back and refreshing the page, I am logged in. Currently I cannot be bothered to fix this.
+
+
+
+A stupid (but simple) way to get the originUrl is to simply set any URL there and try to auth using kanidm. Then check the logs (journalctl -eu kanidm) and check for the line that says something along the lines of
+ `🚧 [warn]: Invalid OAuth2 redirecturi (must be an exact match to a redirect-url) - got <your =originURL=>`
+
+
+
+To get other URLs (token, etc.), use https://<kanidmdomain>/oauth2/openid/%3CclientID%3E/.well-known/oauth-authorization-server, e.g. https://sso.swarsel.win/oauth2/openid/nextcloud/.well-known/oauth-authorization-server, with clienID being the client name as specified in kanidm.
+
+
{ self, lib, pkgs, config, ... }:
let
@@ -9800,14 +9839,15 @@ in
users.groups.kanidm = { };
sops.secrets = {
- "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
+ "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
};
services.kanidm = {
@@ -9840,6 +9880,8 @@ in
"grafana.editors" = { };
"grafana.admins" = { };
"grafana.server-admins" = { };
+ "nextcloud.access" = { };
+ "nextcloud.admins" = { };
};
persons = {
swarsel = {
@@ -9851,6 +9893,7 @@ in
"paperless.access"
"grafana.access"
"forgejo.access"
+ "nextcloud.access"
];
displayName = "Swarsel";
};
@@ -9926,6 +9969,25 @@ in
};
};
};
+ nextcloud = {
+ displayName = "Nextcloud";
+ originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
+ originLanding = "https://stash.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
+ allowInsecureClientDisablePkce = true;
+ scopeMaps."nextcloud.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ preferShortUsername = true;
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup = {
+ "nextcloud.admins" = [ "admin" ];
+ };
+ };
+ };
};
};
};
@@ -9935,7 +9997,7 @@ in
services.nginx = {
virtualHosts = {
- "sso.swarsel.win" = {
+ "${kanidmDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
@@ -10168,8 +10230,8 @@ This smashes Atmosphere 1.3.2 on the switch, which is what I am currenty using.
-
-3.3.4.6. Framework
+
+3.3.4.6. Framework
This holds configuration that is specific to framework laptops.
@@ -10207,8 +10269,8 @@ This holds configuration that is specific to framework laptops.
-
-3.3.4.7. AMD CPU
+
+3.3.4.7. AMD CPU
{ lib, config, ... }:
@@ -10224,8 +10286,8 @@ This holds configuration that is specific to framework laptops.
-
-3.3.4.8. AMD GPU
+
+3.3.4.8. AMD GPU
{ lib, config, ... }:
@@ -10247,8 +10309,8 @@ This holds configuration that is specific to framework laptops.
-
-3.3.4.9. Hibernation
+
+3.3.4.9. Hibernation
{ lib, config, ... }:
@@ -10279,8 +10341,8 @@ This holds configuration that is specific to framework laptops.
-
-3.3.4.10. BTRFS
+
+3.3.4.10. BTRFS
{ lib, config, ... }:
@@ -13228,8 +13290,8 @@ The `extraConfig` section here CANNOT be reindented. This has something to do wi
-
-3.4.1.29.4. SwayOSD
+
+3.4.1.29.4. SwayOSD
{ lib, config, ... }:
@@ -14478,8 +14540,8 @@ in
-
-3.4.4.3. Framework
+
+3.4.4.3. Framework
This holds configuration that is specific to framework laptops.
@@ -18319,8 +18381,8 @@ autocmd DocStart vc-impimba-1.m.imp.ac.at/ui/webconsole mode ignore
-
-6.3. tridactyl theme
+
+6.3. tridactyl theme
@@ -18817,7 +18879,7 @@ sync USER HOST:
diff --git a/modules/nixos/common/hardware.nix b/modules/nixos/common/hardware.nix
index 6badc2a..13ca819 100644
--- a/modules/nixos/common/hardware.nix
+++ b/modules/nixos/common/hardware.nix
@@ -29,7 +29,7 @@
keyboard.qmk.enable = true;
- enableAllFirmware = true;
+ enableAllFirmware = lib.mkDefault true;
bluetooth = lib.mkIf config.swarselsystems.hasBluetooth {
enable = true;
diff --git a/modules/nixos/server/forgejo.nix b/modules/nixos/server/forgejo.nix
index c6ad306..805f6e9 100644
--- a/modules/nixos/server/forgejo.nix
+++ b/modules/nixos/server/forgejo.nix
@@ -19,7 +19,7 @@ in
kanidm-forgejo-client = {
owner = "forgejo";
group = "forgejo";
- mode = "440";
+ mode = "0440";
};
};
diff --git a/modules/nixos/server/kanidm.nix b/modules/nixos/server/kanidm.nix
index c9bc4ed..c2d60d0 100644
--- a/modules/nixos/server/kanidm.nix
+++ b/modules/nixos/server/kanidm.nix
@@ -16,14 +16,15 @@ in
users.groups.kanidm = { };
sops.secrets = {
- "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
- "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "440"; };
+ "kanidm-self-signed-crt" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-self-signed-key" = { sopsFile = certsSopsFile; owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-idm-admin-pw" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-immich" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-paperless" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-forgejo" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-grafana" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
+ "kanidm-nextcloud" = { owner = "kanidm"; group = "kanidm"; mode = "0440"; };
};
services.kanidm = {
@@ -56,6 +57,8 @@ in
"grafana.editors" = { };
"grafana.admins" = { };
"grafana.server-admins" = { };
+ "nextcloud.access" = { };
+ "nextcloud.admins" = { };
};
persons = {
swarsel = {
@@ -67,6 +70,7 @@ in
"paperless.access"
"grafana.access"
"forgejo.access"
+ "nextcloud.access"
];
displayName = "Swarsel";
};
@@ -142,6 +146,25 @@ in
};
};
};
+ nextcloud = {
+ displayName = "Nextcloud";
+ originUrl = " https://stash.swarsel.win/apps/sociallogin/custom_oidc/kanidm";
+ originLanding = "https://stash.swarsel.win/";
+ basicSecretFile = config.sops.secrets.kanidm-nextcloud.path;
+ allowInsecureClientDisablePkce = true;
+ scopeMaps."nextcloud.access" = [
+ "openid"
+ "email"
+ "profile"
+ ];
+ preferShortUsername = true;
+ claimMaps.groups = {
+ joinType = "array";
+ valuesByGroup = {
+ "nextcloud.admins" = [ "admin" ];
+ };
+ };
+ };
};
};
};
@@ -151,7 +174,7 @@ in
services.nginx = {
virtualHosts = {
- "sso.swarsel.win" = {
+ "${kanidmDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
diff --git a/modules/nixos/server/monitoring.nix b/modules/nixos/server/monitoring.nix
index f80f50f..ed21b34 100644
--- a/modules/nixos/server/monitoring.nix
+++ b/modules/nixos/server/monitoring.nix
@@ -16,7 +16,7 @@ in
kanidm-grafana-client = {
owner = "grafana";
group = "grafana";
- mode = "440";
+ mode = "0440";
};
};
@@ -168,7 +168,7 @@ in
nginx = {
virtualHosts = {
- "status.swarsel.win" = {
+ "${grafanaDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
diff --git a/modules/nixos/server/navidrome.nix b/modules/nixos/server/navidrome.nix
index 60f6a39..f88cd25 100644
--- a/modules/nixos/server/navidrome.nix
+++ b/modules/nixos/server/navidrome.nix
@@ -30,8 +30,7 @@ in
hardware = {
- # opengl.enable = true;
- enableAllFirmware = true;
+ enableAllFirmware = lib.mkForce true;
};
networking.firewall.allowedTCPPorts = [ 4040 ];
diff --git a/modules/nixos/server/nextcloud.nix b/modules/nixos/server/nextcloud.nix
index fa815cb..d5fa06d 100644
--- a/modules/nixos/server/nextcloud.nix
+++ b/modules/nixos/server/nextcloud.nix
@@ -1,27 +1,38 @@
{ pkgs, lib, config, ... }:
+let
+ nextcloudDomain = "stash.swarsel.win";
+in
{
options.swarselsystems.modules.server.nextcloud = lib.mkEnableOption "enable nextcloud on server";
config = lib.mkIf config.swarselsystems.modules.server.nextcloud {
- sops.secrets.nextcloudadminpass = {
- owner = "nextcloud";
- group = "nextcloud";
- mode = "0440";
+ sops.secrets = {
+ nextcloudadminpass = {
+ owner = "nextcloud";
+ group = "nextcloud";
+ mode = "0440";
+ };
+ kanidm-nextcloud-client = {
+ owner = "nextcloud";
+ group = "nextcloud";
+ mode = "0440";
+ };
};
services = {
nextcloud = {
enable = true;
package = pkgs.nextcloud31;
- hostName = "stash.swarsel.win";
+ hostName = nextcloudDomain;
home = "/Vault/apps/nextcloud";
datadir = "/Vault/data/nextcloud";
https = true;
configureRedis = true;
maxUploadSize = "4G";
extraApps = {
- inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks;
+ inherit (pkgs.nextcloud30Packages.apps) mail calendar contacts cospend phonetrack polls tasks sociallogin;
};
+ extraAppsEnable = true;
config = {
adminuser = "admin";
adminpassFile = config.sops.secrets.nextcloudadminpass.path;
@@ -31,7 +42,7 @@
nginx = {
virtualHosts = {
- "stash.swarsel.win" = {
+ "${nextcloudDomain}" = {
enableACME = true;
forceSSL = true;
acmeRoot = null;
diff --git a/modules/nixos/server/paperless.nix b/modules/nixos/server/paperless.nix
index 0ac2d54..72a1cdf 100644
--- a/modules/nixos/server/paperless.nix
+++ b/modules/nixos/server/paperless.nix
@@ -12,7 +12,7 @@
kanidm-paperless-client = {
owner = "paperless";
group = "paperless";
- mode = "440";
+ mode = "0440";
};
};
@@ -35,7 +35,7 @@
};
PAPERLESS_TIKA_ENABLED = "true";
PAPERLESS_TIKA_ENDPOINT = "http://localhost:9998";
- PAPERLESS_TIKA_GOTENBERG_ENDPOINT = "http://localhost:3001";
+ PAPERLESS_TIKA_GOTENBERG_ENDPOINT = "http://localhost:3002";
PAPERLESS_APPS = "allauth.socialaccount.providers.openid_connect";
PAPERLESS_SOCIALACCOUNT_PROVIDERS = builtins.toJSON {
openid_connect = {
@@ -45,7 +45,7 @@
provider_id = "kanidm";
name = "Kanidm";
client_id = "paperless";
- # secret will be added dynamically
+ # secret will be added by paperless-web.service (see below)
#secret = "";
settings.server_url = "https://sso.swarsel.win/oauth2/openid/${client_id}/.well-known/openid-configuration";
}
@@ -65,7 +65,7 @@
gotenberg = {
enable = true;
- port = 3001;
+ port = 3002;
bindIP = "127.0.0.1";
};
};
@@ -91,6 +91,10 @@
proxyPass = "http://localhost:28981";
extraConfig = ''
client_max_body_size 0;
+ proxy_connect_timeout 300;
+ proxy_send_timeout 300;
+ proxy_read_timeout 300;
+ send_timeout 300;
'';
};
};
diff --git a/secrets/winters/secrets.yaml b/secrets/winters/secrets.yaml
index 582508b..cd73b9b 100644
--- a/secrets/winters/secrets.yaml
+++ b/secrets/winters/secrets.yaml
@@ -33,7 +33,9 @@ vpnprot: ENC[AES256_GCM,data:/NV2,iv:wVvlcdisq2PdLeNpaxE7cwBsKEJgoi/MAmWoTgHFMbQ
vpnloc: ENC[AES256_GCM,data:U8ModKho4vSHnMo9BOE978V6ZlMeQEoLaFW/,iv:Sw06YsWSZ4tGt/TRhRGkU4KdLBcmZTCY4mGqQbpEh7Q=,tag:kDoTkpzXZKEUIa1CSh3Pwg==,type:str]
#ENC[AES256_GCM,data:yp7ApA4YLSk=,iv:O/SQxKe9EWqExHbeKsTXvbst0pjCxy3yiOjmeCVjmdY=,tag:RMkAOLOLCodnPSDEuImwRw==,type:comment]
swarseluser: ENC[AES256_GCM,data:XvmOHYFNhb/bAYAZ/kmUWbbmRy/WrxSYri/Y5k+SH4N7ZIjuZDHOkWk93ERFuTb77HvhbPX/NRQraUoJoFsxGGg5co/gJnyfRg==,iv:J50PeDcC4PM3+yQ/YQNb8TW4kubwi2kjjSFU0RVFM30=,tag:ydLYkz1YKyguGZZZD/JcLA==,type:str]
+#ENC[AES256_GCM,data:7UtHAqAZLmzT,iv:xBbdv1aHFrSc5/H6o3VujZdtAN7JwHbpckDcoZ5z78M=,tag:0ZEFJcPa6RIwv+kIgNHj4A==,type:comment]
nextcloudadminpass: ENC[AES256_GCM,data:ZOCsu4/ijfheBfY9ZR5DBXSB,iv:bNlTLKQblnt2eYJqVgXwCaGAyAw2yhlb9Whsz0LBhm4=,tag:VQAWP/b8IghzXDFLJxXZ4Q==,type:str]
+kanidm-nextcloud-client: ENC[AES256_GCM,data:RJ5XSYvnJS6r2zzs2SOBZYx+GV7EVjB7XQ==,iv:KfinHenUiYgWrZtMBSGTuVUd5aZlfxvM7Rf8ocFv64k=,tag:WiknAlc29ohsLwnBCXzHpQ==,type:str]
#ENC[AES256_GCM,data:dyEwvFDSvI0=,iv:4LPFthS73mIYQt6MRLBTeNxCwKnJGc7sNFJfZCpMU3Y=,tag:X2mBwG1++2gcFIOi/xIgFA==,type:comment]
grafanaadminpass: ENC[AES256_GCM,data:TBu0WOdvE+9CAH8EVm8=,iv:/usKOYscSXpo8tiSV/Las9eucBeYnpwG5DM9gJg8bfU=,tag:/LZqwuPWQyjSZURnsqq3hA==,type:str]
kanidm-grafana-client: ENC[AES256_GCM,data:tV25k0XoFZ9wLF0UWvAabgigayowr3wo0g==,iv:p0y/UyIrFBTvWZKHbfdOSEpbMun7dZ8FyB5W7VS0oSY=,tag:+jKD+d9cRGKJkapGYxUEnw==,type:str]
@@ -53,6 +55,7 @@ kanidm-immich: ENC[AES256_GCM,data:is5Zx9FE9Qb/cajv6ZQU6B/0iKUgbBCp/g==,iv:vBU6w
kanidm-paperless: ENC[AES256_GCM,data:bJJC20q8aJVzmIMXAHWvOoH652lSCFXDNg==,iv:0ctoPwxzMD1cSpZ7DyjOv9qP+cYt0MJsk2cfuzft3n8=,tag:KX1MtgOvcMxt1QHhAcXWcg==,type:str]
kanidm-forgejo: ENC[AES256_GCM,data:zw0LcfNJw4q28l1E9q58D9bTKtl/CjGA3w==,iv:fYRGasFiM7PXeP5sWW6whj10CUKIqCfhIYQCNZjxQGo=,tag:sxQJa+ItPA+L3keWZ34SJA==,type:str]
kanidm-grafana: ENC[AES256_GCM,data:61PEA1fBcaRy8+x0dn9WrH9P0D+NOkbeZw==,iv:kbR3JWzHsmsef+VlFGciZmyforxJCdvzHijvGFvFwpk=,tag:K+6baLIKy0L37KrJEQUgPg==,type:str]
+kanidm-nextcloud: ENC[AES256_GCM,data:9FjsOzBos18ouHBeuzrzHIpCDowFt0Aktw==,iv:iqUQUsWsO5N+KZqHyqNxMxSija/yPrrrAqvz4b1NG1M=,tag:/WC3wg/eYXV3hLJPRVWLog==,type:str]
sops:
age:
- recipient: age1h72072slm2pthn9m2qwjsyy2dsazc6hz97kpzh4gksvv0r2jqecqul8w63
@@ -64,8 +67,8 @@ sops:
MEZ1UWw3alF1WnJZMFZvMFBpbDFJZlUKGRnoEEgjgJ9SSblmldtY6d8MdAy01yxl
qkvEIoXbL+ky2ira7EgjD0legThzCnmlXUlcSn3SpwbkAGgcfd2kWA==
-----END AGE ENCRYPTED FILE-----
- lastmodified: "2025-06-09T14:21:21Z"
- mac: ENC[AES256_GCM,data:6CPsA5krx40G1FoKNQsOFvw3KPX5orSmtYeXeLj0PuDP6l+Pus6LNGxhMyLkL5b/QUx/48ocFwFguRjvREH/qh7K0p6+QJgcJHzE7VLAQw7vZA9m2MB3d3z4LlC7YSUrqlTd67BOt68Jdf1/jpvf71YYcWMC1v1pcVmsoQTR4S4=,iv:ZqO+gqrJLp/XgLzyxE3/zV6Ef9HY2ICgd5vX1CSDVGs=,tag:zsP2y46vscb9xnfWIwiPKw==,type:str]
+ lastmodified: "2025-06-09T16:04:54Z"
+ mac: ENC[AES256_GCM,data:ggq/mHOw4kaIalgVNI9YASGewzOwR8+DxhvuuOLo3L4Qnn71/HtXkYnKPMm+Ip58AJi7yH5adNOP2q7MZ/wlG/Ygg95PiM/dBso7l79suycrBo+Zz2bGwUjnT6d35Sz2lqsAIDZgpSwk2M51FjivVXD+Un0aWlt/dj5XOwBhlnU=,iv:WRuIlZ1zc+ITNC4R4Zn2ORy7G2hRFnlEBvnjts4n+RE=,tag:wduo+u6Kjm3LyvkLO8OG+w==,type:str]
pgp:
- created_at: "2024-12-17T16:24:32Z"
enc: |-