forked from Fediversity/Fediversity
Merge branch 'form' of git.fediversity.eu:kiara/Fediversity into form
This commit is contained in:
commit
50d32dc05f
550 changed files with 1745 additions and 3042 deletions
|
@ -118,12 +118,12 @@ Contact the project team if you have questions or suggestions, or if you're inte
|
||||||
Most of the directories in this repository have their own README going into more
|
Most of the directories in this repository have their own README going into more
|
||||||
details as to what they are for. As an overview:
|
details as to what they are for. As an overview:
|
||||||
|
|
||||||
- [`deployment/`](./deployment) contains bits and pieces having to do with
|
- [`deployment/`](./deployment) contains work to generate a full Fediversity
|
||||||
auto-deployment of test VMs on a private Proxmox. This directory is
|
deployment from a minimal configuration.
|
||||||
deprecated, the information it contains outdate. Refer to `infra/` instead.
|
|
||||||
|
|
||||||
- [`infra/`](./infra) contains the configurations for the various VMs that are
|
- [`infra/`](./infra) contains the configurations for the various VMs that are
|
||||||
in production for the project, for instance the Git instances or the Wiki.
|
in production for the project, for instance the Git instances or the Wiki, as
|
||||||
|
well as means to provision and set up new ones.
|
||||||
|
|
||||||
- [`keys/`](./keys) contains the public keys of the contributors to this project
|
- [`keys/`](./keys) contains the public keys of the contributors to this project
|
||||||
as well as the systems that we administrate.
|
as well as the systems that we administrate.
|
||||||
|
|
|
@ -1,223 +1,6 @@
|
||||||
# Provisioning VMs via Proxmox
|
# Deployment
|
||||||
|
|
||||||
NOTE: This directory is outdated and most of the interesting code has moved to
|
This repository contains work to generate a full Fediversity deployment from a
|
||||||
`infra/`. There is still some information to extract from here, but treat all
|
minimal configuration. This is different from [`../services/`](../services) that
|
||||||
that you read with a grain of salt.
|
focuses on one machine, providing a polished and unified interface to different
|
||||||
|
Fediverse services.
|
||||||
## Quick links
|
|
||||||
|
|
||||||
Proxmox API doc
|
|
||||||
: <https://pve.proxmox.com/pve-docs/api-viewer>
|
|
||||||
|
|
||||||
Fediversity Proxmox
|
|
||||||
: <http://192.168.51.81:8006/>
|
|
||||||
|
|
||||||
## Basic terminology
|
|
||||||
|
|
||||||
Node
|
|
||||||
: physical host
|
|
||||||
|
|
||||||
## Fediversity Proxmox
|
|
||||||
|
|
||||||
- It is only accessible via Procolix\'s VPN:
|
|
||||||
- Get credentials for the VPN portal and Proxmox from
|
|
||||||
[Kevin](https://git.fediversity.eu/kevin).
|
|
||||||
|
|
||||||
- Log in to the [VPN
|
|
||||||
portal](https://vpn.fediversity.eu/vpn-user-portal/home).
|
|
||||||
|
|
||||||
- Create a **New Configuration**:
|
|
||||||
- Select **WireGuard (UDP)**
|
|
||||||
- Enter some name, e.g. `fediversity`
|
|
||||||
- Click Download
|
|
||||||
|
|
||||||
- Write the WireGuard configuration to a file
|
|
||||||
`fediversity-vpn.config` next to your NixOS configuration
|
|
||||||
|
|
||||||
- Add that file's path to `.git/info/exclude` and make sure
|
|
||||||
it doesn't otherwise leak (for example, use
|
|
||||||
[Agenix](https://github.com/ryantm/agenix) to manage
|
|
||||||
secrets)
|
|
||||||
|
|
||||||
- To your NixOS configuration, add
|
|
||||||
|
|
||||||
``` nix
|
|
||||||
networking.wg-quick.interfaces.fediversity.configFile = toString ./fediversity-vpn.config;
|
|
||||||
```
|
|
||||||
- Select "Promox VE authentication server".
|
|
||||||
- Ignore the "You do not have a valid subscription" message.
|
|
||||||
|
|
||||||
## Automatically
|
|
||||||
|
|
||||||
This directory contains scripts that can automatically provision or
|
|
||||||
remove a Proxmox VM. For now, they are tied to one node in the
|
|
||||||
Fediversity Proxmox, but it would not be difficult to make them more
|
|
||||||
generic. Try:
|
|
||||||
|
|
||||||
```sh
|
|
||||||
bash proxmox/provision.sh --help
|
|
||||||
bash proxmox/remove.sh --help
|
|
||||||
```
|
|
||||||
|
|
||||||
## Preparing the machine configuration
|
|
||||||
|
|
||||||
- It is nicer if the machine is a QEMU guest. On NixOS:
|
|
||||||
|
|
||||||
``` nix
|
|
||||||
services.qemuGuest.enable = true
|
|
||||||
```
|
|
||||||
|
|
||||||
- Choose name for your machine.
|
|
||||||
|
|
||||||
- Choose static IPs for your machine. The IPv4 and IPv6 subnets
|
|
||||||
available for Fediversity testing are:
|
|
||||||
|
|
||||||
- `95.215.187.0/24`. Gateway is `95.215.187.1`.
|
|
||||||
- `2a00:51c0:13:1305::/64`. Gateway is `2a00:51c0:13:1305::1`.
|
|
||||||
|
|
||||||
- I have been using id `XXX` (starting from `001`), name `fediXXX`,
|
|
||||||
`95.215.187.XXX` and `2a00:51c0:13:1305::XXX`.
|
|
||||||
|
|
||||||
- Name servers should be `95.215.185.6` and `95.215.185.7`.
|
|
||||||
|
|
||||||
- Check [Netbox](https://netbox.protagio.org) to see which addresses
|
|
||||||
are free.
|
|
||||||
|
|
||||||
## Manually via the GUI
|
|
||||||
|
|
||||||
### Upload your ISO
|
|
||||||
|
|
||||||
- Go to Fediversity proxmox.
|
|
||||||
- In the left view, expand under the node that you want and click on
|
|
||||||
"local".
|
|
||||||
- Select "ISO Images", then click "Upload".
|
|
||||||
- Note: You can also download from URL.
|
|
||||||
- Note: You should click on "local" and not "local-zfs".
|
|
||||||
|
|
||||||
### Creating the VM
|
|
||||||
|
|
||||||
- Click "Create VM" at the top right corner.
|
|
||||||
|
|
||||||
#### General
|
|
||||||
|
|
||||||
Node
|
|
||||||
: which node will host the VM; has to be the same
|
|
||||||
|
|
||||||
VM ID
|
|
||||||
: Has to be unique, probably best to use the `xxxx` in `vm0xxxx`
|
|
||||||
(yet to be decided)
|
|
||||||
|
|
||||||
Name
|
|
||||||
: Usually `vm` + 5 digits, e.g. `vm02199`
|
|
||||||
|
|
||||||
Resource pool
|
|
||||||
: Fediversity
|
|
||||||
|
|
||||||
#### OS
|
|
||||||
|
|
||||||
Use CD/DVD disc image file (iso)
|
|
||||||
|
|
||||||
:
|
|
||||||
|
|
||||||
Storage
|
|
||||||
: local, means storage of the node.
|
|
||||||
|
|
||||||
ISO image
|
|
||||||
: select the image previously uploaded
|
|
||||||
|
|
||||||
No need to touch anything else
|
|
||||||
|
|
||||||
#### System
|
|
||||||
|
|
||||||
BIOS
|
|
||||||
: OVMF (UEFI)
|
|
||||||
|
|
||||||
EFI Storage
|
|
||||||
: `linstor_storage`; this is a storage shared by all of the Proxmox
|
|
||||||
machines.
|
|
||||||
|
|
||||||
Pre-Enroll keys
|
|
||||||
: MUST be unchecked
|
|
||||||
|
|
||||||
Qemu Agent
|
|
||||||
: check
|
|
||||||
|
|
||||||
#### Disks
|
|
||||||
|
|
||||||
- Tick "advanced" at the bottom.
|
|
||||||
- Disk size (GiB) :: 40 (depending on requirements)
|
|
||||||
- SSD emulation :: check (only visible if "Advanced" is checked)
|
|
||||||
- Discard :: check, so that blocks of removed data are cleared
|
|
||||||
|
|
||||||
#### CPU
|
|
||||||
|
|
||||||
Sockets
|
|
||||||
: 1 (depending on requirements)
|
|
||||||
|
|
||||||
Cores
|
|
||||||
: 2 (depending on requirements)
|
|
||||||
|
|
||||||
Enable NUMA
|
|
||||||
: check
|
|
||||||
|
|
||||||
#### Memory
|
|
||||||
|
|
||||||
Memory (MiB)
|
|
||||||
: choose what you want
|
|
||||||
|
|
||||||
Ballooning Device
|
|
||||||
: leave checked (only visible if "Advanced" is checked)
|
|
||||||
|
|
||||||
#### Network
|
|
||||||
|
|
||||||
Bridge
|
|
||||||
: `vnet1306`. This is the provisioning bridge;
|
|
||||||
we will change it later.
|
|
||||||
|
|
||||||
Firewall
|
|
||||||
: uncheck, we will handle the firewall on the VM itself
|
|
||||||
|
|
||||||
#### Confirm
|
|
||||||
|
|
||||||
### Install and start the VM
|
|
||||||
|
|
||||||
- Start the VM a first time.
|
|
||||||
- Select the VM in the left panel. You might have to expand the
|
|
||||||
node on which it is hosted.
|
|
||||||
- Select "Console" and start the VM.
|
|
||||||
- Install the VM as you would any other machine.
|
|
||||||
- [*Shutdown the VM*]{.spurious-link target="Shutdown the VM"}.
|
|
||||||
- After the VM has been installed:
|
|
||||||
- Select the VM again, then go to "Hardware".
|
|
||||||
- Double click on the CD/DVD Drive line. Select "Do not use any
|
|
||||||
media" and press OK.
|
|
||||||
- Double click on Network Device, and change the bridge to
|
|
||||||
`vnet1305`, the public bridge.
|
|
||||||
- Start the VM again.
|
|
||||||
|
|
||||||
### Remove the VM
|
|
||||||
|
|
||||||
- [*Shutdown the VM*]{.spurious-link target="Shutdown the VM"}.
|
|
||||||
- On the top right corner, click "More", then "Remove".
|
|
||||||
- Enter the ID of the machine.
|
|
||||||
- Check "Purge from job configurations"
|
|
||||||
- Check "Destroy unreferenced disks owned by guest"
|
|
||||||
- Click "Remove".
|
|
||||||
|
|
||||||
### Move the VM to another node
|
|
||||||
|
|
||||||
- Make sure there is no ISO plugged in.
|
|
||||||
- Click on the VM. Click migrate. Choose target node. Go.
|
|
||||||
- Since the storage is shared, it should go pretty fast (~1 minute).
|
|
||||||
|
|
||||||
### Shutdown the VM
|
|
||||||
|
|
||||||
- Find the VM in the left panel.
|
|
||||||
- At the top right corner appears a "Shutdown" button with a submenu.
|
|
||||||
- Clicking "Shutdown" sends a signal to shutdown the machine. This
|
|
||||||
might not work if the machine is not listening for that signal.
|
|
||||||
- Brutal solution: in the submenu, select "Stop".
|
|
||||||
- The checkbox "Overrule active shutdown tasks" means that the machine
|
|
||||||
should be stopped even if a shutdown is currently ongoing. This is
|
|
||||||
particularly important if you have tried to shut the machine down
|
|
||||||
normally just before.
|
|
||||||
|
|
190
deployment/default.nix
Normal file
190
deployment/default.nix
Normal file
|
@ -0,0 +1,190 @@
|
||||||
|
## `makeMakeDeployment` -- Function to help hosting providers make a
|
||||||
|
## `makeDeployment` function.
|
||||||
|
##
|
||||||
|
## https://factoryfactoryfactory.net/
|
||||||
|
|
||||||
|
## Generic utilities used in this function, eg. nixpkgs, NixOps4 providers, etc.
|
||||||
|
## REVIEW: We should maybe be more specific than just `inputs`.
|
||||||
|
{
|
||||||
|
lib,
|
||||||
|
nixops4,
|
||||||
|
nixops4-nixos,
|
||||||
|
fediversity,
|
||||||
|
}:
|
||||||
|
|
||||||
|
## Information on the hosting provider's infrastructure. This is where we inform
|
||||||
|
## this function of where it can find eg. Proxmox.
|
||||||
|
{
|
||||||
|
## Four NixOS configuration resource modules for four services. Those are VMs
|
||||||
|
## that are already deployed and on which we will push our configurations.
|
||||||
|
##
|
||||||
|
## - Ultimately, we just want a pool of VMs, or even just a Proxmox.
|
||||||
|
## - Each machine is flagged for a certain use case until we control DNS.
|
||||||
|
garageConfigurationResource,
|
||||||
|
mastodonConfigurationResource,
|
||||||
|
peertubeConfigurationResource,
|
||||||
|
pixelfedConfigurationResource,
|
||||||
|
}:
|
||||||
|
|
||||||
|
## From the hosting provider's perspective, the function is meant to be
|
||||||
|
## partially applied only until here.
|
||||||
|
|
||||||
|
## Information on the specific deployment that we request. This is the
|
||||||
|
## information coming from the FediPanel.
|
||||||
|
##
|
||||||
|
## FIXME: lock step the interface with the definitions in the FediPanel
|
||||||
|
panelConfig:
|
||||||
|
|
||||||
|
let
|
||||||
|
inherit (lib) mkMerge mkIf;
|
||||||
|
|
||||||
|
in
|
||||||
|
|
||||||
|
## Regular arguments of a NixOps4 deployment module.
|
||||||
|
{ providers, ... }:
|
||||||
|
|
||||||
|
{
|
||||||
|
providers = { inherit (nixops4.modules.nixops4Provider) local; };
|
||||||
|
|
||||||
|
resources =
|
||||||
|
let
|
||||||
|
## NOTE: All of these secrets are publicly available in this source file
|
||||||
|
## and will end up in the Nix store. We don't care as they are only ever
|
||||||
|
## used for testing anyway.
|
||||||
|
##
|
||||||
|
## FIXME: Generate and store in NixOps4's state.
|
||||||
|
mastodonS3KeyConfig =
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GK3515373e4c851ebaad366558";
|
||||||
|
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "7d37d093435a41f2aab8f13c19ba067d9776c90215f56614adad6ece597dbb34";
|
||||||
|
};
|
||||||
|
peertubeS3KeyConfig =
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GK1f9feea9960f6f95ff404c9b";
|
||||||
|
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "7295c4201966a02c2c3d25b5cea4a5ff782966a2415e3a196f91924631191395";
|
||||||
|
};
|
||||||
|
pixelfedS3KeyConfig =
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GKb5615457d44214411e673b7b";
|
||||||
|
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "5be6799a88ca9b9d813d1a806b64f15efa49482dbe15339ddfaf7f19cf434987";
|
||||||
|
};
|
||||||
|
|
||||||
|
makeConfigurationResource = resourceModule: config: {
|
||||||
|
type = providers.local.exec;
|
||||||
|
imports = [
|
||||||
|
nixops4-nixos.modules.nixops4Resource.nixos
|
||||||
|
resourceModule
|
||||||
|
|
||||||
|
{
|
||||||
|
## NOTE: With NixOps4, there are several levels and all of them live
|
||||||
|
## in the NixOS module system:
|
||||||
|
##
|
||||||
|
## 1. Each NixOps4 deployment is a module.
|
||||||
|
## 2. Each NixOps4 resource is a module. This very comment is
|
||||||
|
## inside an attrset imported as a module in a resource.
|
||||||
|
## 3. Each NixOps4 'configuration' resource contains an attribute
|
||||||
|
## 'nixos.module', itself a NixOS configuration module.
|
||||||
|
nixos.module =
|
||||||
|
{ ... }:
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
config
|
||||||
|
fediversity
|
||||||
|
];
|
||||||
|
};
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
|
in
|
||||||
|
|
||||||
|
mkMerge [
|
||||||
|
|
||||||
|
(mkIf (panelConfig.mastodon.enable || panelConfig.peertube.enable || panelConfig.pixelfed.enable) {
|
||||||
|
garage-configuration = makeConfigurationResource garageConfigurationResource (
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
fediversity = {
|
||||||
|
inherit (panelConfig) domain;
|
||||||
|
garage.enable = true;
|
||||||
|
pixelfed = pixelfedS3KeyConfig { inherit pkgs; };
|
||||||
|
mastodon = mastodonS3KeyConfig { inherit pkgs; };
|
||||||
|
peertube = peertubeS3KeyConfig { inherit pkgs; };
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
})
|
||||||
|
|
||||||
|
(mkIf panelConfig.mastodon.enable {
|
||||||
|
mastodon-configuration = makeConfigurationResource mastodonConfigurationResource (
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
fediversity = {
|
||||||
|
inherit (panelConfig) domain;
|
||||||
|
temp.initialUser = {
|
||||||
|
inherit (panelConfig.initialUser) username email displayName;
|
||||||
|
# FIXME: disgusting, but nvm, this is going to be replaced by
|
||||||
|
# proper central authentication at some point
|
||||||
|
passwordFile = pkgs.writeText "password" panelConfig.initialUser.password;
|
||||||
|
};
|
||||||
|
|
||||||
|
mastodon = mastodonS3KeyConfig { inherit pkgs; } // {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
|
||||||
|
temp.cores = 1; # FIXME: should come from NixOps4 eventually
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
})
|
||||||
|
|
||||||
|
(mkIf panelConfig.peertube.enable {
|
||||||
|
peertube-configuration = makeConfigurationResource peertubeConfigurationResource (
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
fediversity = {
|
||||||
|
inherit (panelConfig) domain;
|
||||||
|
temp.initialUser = {
|
||||||
|
inherit (panelConfig.initialUser) username email displayName;
|
||||||
|
# FIXME: disgusting, but nvm, this is going to be replaced by
|
||||||
|
# proper central authentication at some point
|
||||||
|
passwordFile = pkgs.writeText "password" panelConfig.initialUser.password;
|
||||||
|
};
|
||||||
|
|
||||||
|
peertube = peertubeS3KeyConfig { inherit pkgs; } // {
|
||||||
|
enable = true;
|
||||||
|
## NOTE: Only ever used for testing anyway.
|
||||||
|
##
|
||||||
|
## FIXME: Generate and store in NixOps4's state.
|
||||||
|
secretsFile = pkgs.writeText "secret" "574e093907d1157ac0f8e760a6deb1035402003af5763135bae9cbd6abe32b24";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
})
|
||||||
|
|
||||||
|
(mkIf panelConfig.pixelfed.enable {
|
||||||
|
pixelfed-configuration = makeConfigurationResource pixelfedConfigurationResource (
|
||||||
|
{ pkgs, ... }:
|
||||||
|
{
|
||||||
|
fediversity = {
|
||||||
|
inherit (panelConfig) domain;
|
||||||
|
temp.initialUser = {
|
||||||
|
inherit (panelConfig.initialUser) username email displayName;
|
||||||
|
# FIXME: disgusting, but nvm, this is going to be replaced by
|
||||||
|
# proper central authentication at some point
|
||||||
|
passwordFile = pkgs.writeText "password" panelConfig.initialUser.password;
|
||||||
|
};
|
||||||
|
|
||||||
|
pixelfed = pixelfedS3KeyConfig { inherit pkgs; } // {
|
||||||
|
enable = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
})
|
||||||
|
];
|
||||||
|
}
|
|
@ -1,136 +0,0 @@
|
||||||
{ inputs, self, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
allVmIds = builtins.genList (x: 100 + x) 156; # 100 -- 255
|
|
||||||
|
|
||||||
in
|
|
||||||
{
|
|
||||||
flake.nixosConfigurations.provisioning =
|
|
||||||
let
|
|
||||||
inherit (builtins) map listToAttrs;
|
|
||||||
makeProvisioningConfiguration =
|
|
||||||
vmid:
|
|
||||||
inputs.nixpkgs.lib.nixosSystem {
|
|
||||||
modules = [
|
|
||||||
{ procolix.vmid = vmid; }
|
|
||||||
./procolixVm.nix
|
|
||||||
inputs.disko.nixosModules.default
|
|
||||||
];
|
|
||||||
};
|
|
||||||
in
|
|
||||||
listToAttrs (
|
|
||||||
map (vmid: {
|
|
||||||
name = "fedi${toString vmid}";
|
|
||||||
value = makeProvisioningConfiguration vmid;
|
|
||||||
}) allVmIds
|
|
||||||
);
|
|
||||||
|
|
||||||
nixops4Deployments.feditest =
|
|
||||||
{ providers, ... }:
|
|
||||||
|
|
||||||
let
|
|
||||||
inherit (builtins) readFile;
|
|
||||||
|
|
||||||
makeProcolixVmResource = vmid: vmconfig: {
|
|
||||||
type = providers.local.exec;
|
|
||||||
imports = [ inputs.nixops4-nixos.modules.nixops4Resource.nixos ];
|
|
||||||
|
|
||||||
ssh = {
|
|
||||||
host = "95.215.187.${toString vmid}";
|
|
||||||
hostPublicKey = readFile ./hostKeys/fedi${toString vmid}/ssh_host_ed25519_key.pub;
|
|
||||||
};
|
|
||||||
|
|
||||||
nixpkgs = inputs.nixpkgs;
|
|
||||||
nixos.module = {
|
|
||||||
imports = [
|
|
||||||
vmconfig
|
|
||||||
{ procolix.vmid = vmid; }
|
|
||||||
./procolixVm.nix
|
|
||||||
self.nixosModules.fediversity
|
|
||||||
inputs.disko.nixosModules.default
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
## NOTE: All of these secrets are publicly available in this source file
|
|
||||||
## and will end up in the Nix store. We don't care as they are only ever
|
|
||||||
## used for testing anyway.
|
|
||||||
pixelfedS3KeyConfig =
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GKb5615457d44214411e673b7b";
|
|
||||||
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "5be6799a88ca9b9d813d1a806b64f15efa49482dbe15339ddfaf7f19cf434987";
|
|
||||||
};
|
|
||||||
mastodonS3KeyConfig =
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GK3515373e4c851ebaad366558";
|
|
||||||
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "7d37d093435a41f2aab8f13c19ba067d9776c90215f56614adad6ece597dbb34";
|
|
||||||
};
|
|
||||||
peertubeS3KeyConfig =
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
s3AccessKeyFile = pkgs.writeText "s3AccessKey" "GK1f9feea9960f6f95ff404c9b";
|
|
||||||
s3SecretKeyFile = pkgs.writeText "s3SecretKey" "7295c4201966a02c2c3d25b5cea4a5ff782966a2415e3a196f91924631191395";
|
|
||||||
};
|
|
||||||
|
|
||||||
in
|
|
||||||
{
|
|
||||||
providers = { inherit (inputs.nixops4.modules.nixops4Provider) local; };
|
|
||||||
|
|
||||||
resources = {
|
|
||||||
fedi100 = makeProcolixVmResource 100 (
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
fediversity = {
|
|
||||||
domain = "abundos.eu";
|
|
||||||
garage.enable = true;
|
|
||||||
pixelfed = pixelfedS3KeyConfig { inherit pkgs; };
|
|
||||||
mastodon = mastodonS3KeyConfig { inherit pkgs; };
|
|
||||||
peertube = peertubeS3KeyConfig { inherit pkgs; };
|
|
||||||
};
|
|
||||||
}
|
|
||||||
);
|
|
||||||
|
|
||||||
fedi101 = makeProcolixVmResource 101 (
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
fediversity = {
|
|
||||||
domain = "abundos.eu";
|
|
||||||
pixelfed = pixelfedS3KeyConfig { inherit pkgs; } // {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
);
|
|
||||||
|
|
||||||
fedi102 = makeProcolixVmResource 102 (
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
fediversity = {
|
|
||||||
domain = "abundos.eu";
|
|
||||||
mastodon = mastodonS3KeyConfig { inherit pkgs; } // {
|
|
||||||
enable = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
temp.cores = 1; # FIXME: should come from NixOps4 eventually
|
|
||||||
};
|
|
||||||
}
|
|
||||||
);
|
|
||||||
|
|
||||||
fedi103 = makeProcolixVmResource 103 (
|
|
||||||
{ pkgs, ... }:
|
|
||||||
{
|
|
||||||
fediversity = {
|
|
||||||
domain = "abundos.eu";
|
|
||||||
peertube = peertubeS3KeyConfig { inherit pkgs; } // {
|
|
||||||
enable = true;
|
|
||||||
## NOTE: Only ever used for testing anyway.
|
|
||||||
secretsFile = pkgs.writeText "secret" "574e093907d1157ac0f8e760a6deb1035402003af5763135bae9cbd6abe32b24";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
);
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -1,7 +0,0 @@
|
||||||
Host keys
|
|
||||||
=========
|
|
||||||
|
|
||||||
NixOps4 needs the SSH host keys of the machines to work. In the future, it will
|
|
||||||
handle the deployment and therefore will not be needing our input for this. In
|
|
||||||
the meantime, we just savagely hardcode the ~250 host keys that we will be
|
|
||||||
using.
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAf+jlWoTpC8KyKdyQLUgKtr7bVzJS8HgKDMIXc7BzJgAAAAJARqo92EaqP
|
|
||||||
dgAAAAtzc2gtZWQyNTUxOQAAACAf+jlWoTpC8KyKdyQLUgKtr7bVzJS8HgKDMIXc7BzJgA
|
|
||||||
AAAEAWVnRvRE2d4Us+F96d34qz9x/xiuAzhX4+KBbK+n6aMR/6OVahOkLwrIp3JAtSAq2v
|
|
||||||
ttXMlLweAoMwhdzsHMmAAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB/6OVahOkLwrIp3JAtSAq2vttXMlLweAoMwhdzsHMmA
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDrs4Vbxgu0bWzlOxZDukGmE1GPsd/VXZ3MTfwGdU4BBAAAAJBug7Q3boO0
|
|
||||||
NwAAAAtzc2gtZWQyNTUxOQAAACDrs4Vbxgu0bWzlOxZDukGmE1GPsd/VXZ3MTfwGdU4BBA
|
|
||||||
AAAEDNrbC3QiRCpZPhXXnva2FeSPOv9wcLSlEA6EAHCQ0EjeuzhVvGC7RtbOU7FkO6QaYT
|
|
||||||
UY+x39VdncxN/AZ1TgEEAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOuzhVvGC7RtbOU7FkO6QaYTUY+x39VdncxN/AZ1TgEE
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCQZTe1DtMsXpseQKXHiLPoA/YyWPi0GA5o5dBPuHyhWgAAAJB10c/YddHP
|
|
||||||
2AAAAAtzc2gtZWQyNTUxOQAAACCQZTe1DtMsXpseQKXHiLPoA/YyWPi0GA5o5dBPuHyhWg
|
|
||||||
AAAEB1QyVs3kTY6k5GoPbX6nJJW2fMzPvrXi1MqLGRzX79OZBlN7UO0yxemx5ApceIs+gD
|
|
||||||
9jJY+LQYDmjl0E+4fKFaAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJBlN7UO0yxemx5ApceIs+gD9jJY+LQYDmjl0E+4fKFa
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCZNT4CQuQlGZqAF2IK8yh3iyW5WLAQ067/c95p3YeTlgAAAJCyC0BysgtA
|
|
||||||
cgAAAAtzc2gtZWQyNTUxOQAAACCZNT4CQuQlGZqAF2IK8yh3iyW5WLAQ067/c95p3YeTlg
|
|
||||||
AAAEBADSrMn2eGdljsg96uxQzDhn9rimrABOBY5HuDvsNb5Zk1PgJC5CUZmoAXYgrzKHeL
|
|
||||||
JblYsBDTrv9z3mndh5OWAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJk1PgJC5CUZmoAXYgrzKHeLJblYsBDTrv9z3mndh5OW
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBpmb5FSsRWb0gz344lGP7JByNoPPhrGCo+ml3PBX1ctAAAAJBP2N2BT9jd
|
|
||||||
gQAAAAtzc2gtZWQyNTUxOQAAACBpmb5FSsRWb0gz344lGP7JByNoPPhrGCo+ml3PBX1ctA
|
|
||||||
AAAECI5cOILimwJP07ufLW9DGtQ57uencbspqDrSu06a0yeWmZvkVKxFZvSDPfjiUY/skH
|
|
||||||
I2g8+GsYKj6aXc8FfVy0AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGmZvkVKxFZvSDPfjiUY/skHI2g8+GsYKj6aXc8FfVy0
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACA5q6vLiy/HsEJAKgW8A6uVrJtUHrsZaWTmNAaoNBiWPgAAAJDZsKlN2bCp
|
|
||||||
TQAAAAtzc2gtZWQyNTUxOQAAACA5q6vLiy/HsEJAKgW8A6uVrJtUHrsZaWTmNAaoNBiWPg
|
|
||||||
AAAECAWAldJQnm4VTXaANpwIOEtTvuLh+rGpRMjmxDZDLUWzmrq8uLL8ewQkAqBbwDq5Ws
|
|
||||||
m1QeuxlpZOY0Bqg0GJY+AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDmrq8uLL8ewQkAqBbwDq5Wsm1QeuxlpZOY0Bqg0GJY+
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACD5rw87xRY8vYRH8rZ9gwnk1G0u86Ij8AI3oABpATv20QAAAJAh50J9IedC
|
|
||||||
fQAAAAtzc2gtZWQyNTUxOQAAACD5rw87xRY8vYRH8rZ9gwnk1G0u86Ij8AI3oABpATv20Q
|
|
||||||
AAAECknxgBlwJbqtcrZBKUVP9nGHIoAWayWWNgvI0kICg/lPmvDzvFFjy9hEfytn2DCeTU
|
|
||||||
bS7zoiPwAjegAGkBO/bRAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPmvDzvFFjy9hEfytn2DCeTUbS7zoiPwAjegAGkBO/bR
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDp+jq8qjUA5xbkVZZleWMnvx7lrrb4Zq9VffLtAIgQJgAAAJBG+A9GRvgP
|
|
||||||
RgAAAAtzc2gtZWQyNTUxOQAAACDp+jq8qjUA5xbkVZZleWMnvx7lrrb4Zq9VffLtAIgQJg
|
|
||||||
AAAEANmCDRclbYOd0pYY/EV+jV/b6qOpk+5/h+zUYy8aTUGen6OryqNQDnFuRVlmV5Yye/
|
|
||||||
HuWutvhmr1V98u0AiBAmAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOn6OryqNQDnFuRVlmV5Yye/HuWutvhmr1V98u0AiBAm
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBKQ+R3MxOXboXg1oDgyfSnaEhIio6eSqSrDrvwsL9WqQAAAJCTyrsUk8q7
|
|
||||||
FAAAAAtzc2gtZWQyNTUxOQAAACBKQ+R3MxOXboXg1oDgyfSnaEhIio6eSqSrDrvwsL9WqQ
|
|
||||||
AAAEAdFVWZm22dm+vl9ACbkwaJ6KYLshOS211WF/+f0M8960pD5HczE5duheDWgODJ9Kdo
|
|
||||||
SEiKjp5KpKsOu/Cwv1apAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEpD5HczE5duheDWgODJ9KdoSEiKjp5KpKsOu/Cwv1ap
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBxym5d4yW16fq54EbcuHQAKn1YTw04y+L51pxYuwXviQAAAJAMDZIgDA2S
|
|
||||||
IAAAAAtzc2gtZWQyNTUxOQAAACBxym5d4yW16fq54EbcuHQAKn1YTw04y+L51pxYuwXviQ
|
|
||||||
AAAECqK8yUrQRBDHkf+66cApvZDOzPAytlJ6HyHj/+cUqSO3HKbl3jJbXp+rngRty4dAAq
|
|
||||||
fVhPDTjL4vnWnFi7Be+JAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHHKbl3jJbXp+rngRty4dAAqfVhPDTjL4vnWnFi7Be+J
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACC8U0urWQNoQNKhWjgEcPpFMI64NKNj64AbQ7UjATgV6gAAAJDIrP6eyKz+
|
|
||||||
ngAAAAtzc2gtZWQyNTUxOQAAACC8U0urWQNoQNKhWjgEcPpFMI64NKNj64AbQ7UjATgV6g
|
|
||||||
AAAEBngj45M4dqtKWt+lTopQpO1kjwij71cy3LxvngjE8usbxTS6tZA2hA0qFaOARw+kUw
|
|
||||||
jrg0o2PrgBtDtSMBOBXqAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILxTS6tZA2hA0qFaOARw+kUwjrg0o2PrgBtDtSMBOBXq
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBfHVL5we0QTdUcIQnU0kl7NhJV1Qn8o70kzEQYYuLRlgAAAJCUr6hwlK+o
|
|
||||||
cAAAAAtzc2gtZWQyNTUxOQAAACBfHVL5we0QTdUcIQnU0kl7NhJV1Qn8o70kzEQYYuLRlg
|
|
||||||
AAAEADh5Di3ulPLcYritoUcgZU2KsUEC+Lc9fcVsGasmlp2V8dUvnB7RBN1RwhCdTSSXs2
|
|
||||||
ElXVCfyjvSTMRBhi4tGWAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF8dUvnB7RBN1RwhCdTSSXs2ElXVCfyjvSTMRBhi4tGW
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCRQKk6D0WN4ATc7ZiunlWzLl/uyKH9WA9rqyk6yxTCYAAAAJDQAuHO0ALh
|
|
||||||
zgAAAAtzc2gtZWQyNTUxOQAAACCRQKk6D0WN4ATc7ZiunlWzLl/uyKH9WA9rqyk6yxTCYA
|
|
||||||
AAAEAXX5Rk06Ripx65e4eMXJzwaj+n+/ol5iV2sd02R89GJpFAqToPRY3gBNztmK6eVbMu
|
|
||||||
X+7Iof1YD2urKTrLFMJgAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJFAqToPRY3gBNztmK6eVbMuX+7Iof1YD2urKTrLFMJg
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACA8Me6goQqhtIGS1rxymmQFpWHnPR9S6Ic8twWWZBl1kgAAAJCgGWRooBlk
|
|
||||||
aAAAAAtzc2gtZWQyNTUxOQAAACA8Me6goQqhtIGS1rxymmQFpWHnPR9S6Ic8twWWZBl1kg
|
|
||||||
AAAEA06YUPnH3uPAwNBuytKfSW/uC5i6LuzjMeMF8NVdDNXjwx7qChCqG0gZLWvHKaZAWl
|
|
||||||
Yec9H1Lohzy3BZZkGXWSAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDwx7qChCqG0gZLWvHKaZAWlYec9H1Lohzy3BZZkGXWS
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAc6F21iRrbcW3sEnPnB5bxXdA8IuJCyGaOkS/0KyJMCwAAAJBHcnAyR3Jw
|
|
||||||
MgAAAAtzc2gtZWQyNTUxOQAAACAc6F21iRrbcW3sEnPnB5bxXdA8IuJCyGaOkS/0KyJMCw
|
|
||||||
AAAED+xMp+4b7aOJFEwQrZJHu6kfd8OGC/Yl5OqjUob6gHiRzoXbWJGttxbewSc+cHlvFd
|
|
||||||
0Dwi4kLIZo6RL/QrIkwLAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBzoXbWJGttxbewSc+cHlvFd0Dwi4kLIZo6RL/QrIkwL
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAgBH3vN7Xrz3UzxDx6tdCINRXnMhkD1znQVWE7VEemfAAAAJBWm6X+Vpul
|
|
||||||
/gAAAAtzc2gtZWQyNTUxOQAAACAgBH3vN7Xrz3UzxDx6tdCINRXnMhkD1znQVWE7VEemfA
|
|
||||||
AAAEAPAPXDtmtRO10RmTmNB6o+O7xCKUXQZ4gIW9gVW2SODSAEfe83tevPdTPEPHq10Ig1
|
|
||||||
FecyGQPXOdBVYTtUR6Z8AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICAEfe83tevPdTPEPHq10Ig1FecyGQPXOdBVYTtUR6Z8
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDKogw3kREjQ738ZQwptw7QaE6s8+WkTVwRgs2vMfAMSgAAAJDU4COC1OAj
|
|
||||||
ggAAAAtzc2gtZWQyNTUxOQAAACDKogw3kREjQ738ZQwptw7QaE6s8+WkTVwRgs2vMfAMSg
|
|
||||||
AAAEBoXMnjjfODeG0FcQGljQQ5jg40C5IPlJCybUMzl3C8ZcqiDDeRESNDvfxlDCm3DtBo
|
|
||||||
Tqzz5aRNXBGCza8x8AxKAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMqiDDeRESNDvfxlDCm3DtBoTqzz5aRNXBGCza8x8AxK
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAfxiYsVPKSNhwNcfMSi1vVh1Ols5hD8mWFEJCCuCnXtgAAAJCBeXlPgXl5
|
|
||||||
TwAAAAtzc2gtZWQyNTUxOQAAACAfxiYsVPKSNhwNcfMSi1vVh1Ols5hD8mWFEJCCuCnXtg
|
|
||||||
AAAEB8VCLi0Y6w4Emv5kbr6VLrjyFh9vfmDHE/dqOUTmC30h/GJixU8pI2HA1x8xKLW9WH
|
|
||||||
U6WzmEPyZYUQkIK4Kde2AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIB/GJixU8pI2HA1x8xKLW9WHU6WzmEPyZYUQkIK4Kde2
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDgKzSoUFd8FS+bALSzWTkfLgGHo3ao/5/feq7mHwCelAAAAJAOLOIlDizi
|
|
||||||
JQAAAAtzc2gtZWQyNTUxOQAAACDgKzSoUFd8FS+bALSzWTkfLgGHo3ao/5/feq7mHwCelA
|
|
||||||
AAAECNbMdwEMUeLK9RIH++lJen5u6PAmv3BxIDEpOPC46TMOArNKhQV3wVL5sAtLNZOR8u
|
|
||||||
AYejdqj/n996ruYfAJ6UAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOArNKhQV3wVL5sAtLNZOR8uAYejdqj/n996ruYfAJ6U
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCOQoW9zWKHLA6WD1RYetOEqgoV+r6t1Kp56OzFxNBhswAAAJDxdb4B8XW+
|
|
||||||
AQAAAAtzc2gtZWQyNTUxOQAAACCOQoW9zWKHLA6WD1RYetOEqgoV+r6t1Kp56OzFxNBhsw
|
|
||||||
AAAECaWJ9AyOzJB54PpEKRjW0GrDT7jaIP2vSHaIslw/frrY5Chb3NYocsDpYPVFh604Sq
|
|
||||||
ChX6vq3Uqnno7MXE0GGzAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII5Chb3NYocsDpYPVFh604SqChX6vq3Uqnno7MXE0GGz
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACD45Ko0BOCmCv4oREtLwjAu/Bgw4TdOukgPnZ4xMcaSSwAAAJBPorvqT6K7
|
|
||||||
6gAAAAtzc2gtZWQyNTUxOQAAACD45Ko0BOCmCv4oREtLwjAu/Bgw4TdOukgPnZ4xMcaSSw
|
|
||||||
AAAEDCdxdml0nEgwTrs0Kv6JwwFP1S3vwUYOOf5BWoMlPSFPjkqjQE4KYK/ihES0vCMC78
|
|
||||||
GDDhN066SA+dnjExxpJLAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPjkqjQE4KYK/ihES0vCMC78GDDhN066SA+dnjExxpJL
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDnv01WZ40S2q9rnGmDbtdZN8YrZ7wx67ShHH3GgD1R4QAAAJDoOKbi6Dim
|
|
||||||
4gAAAAtzc2gtZWQyNTUxOQAAACDnv01WZ40S2q9rnGmDbtdZN8YrZ7wx67ShHH3GgD1R4Q
|
|
||||||
AAAEBPnsW8JezfGqH3mtvQI/Xg3yGeric9uRdvhJS6tUAkPOe/TVZnjRLar2ucaYNu11k3
|
|
||||||
xitnvDHrtKEcfcaAPVHhAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOe/TVZnjRLar2ucaYNu11k3xitnvDHrtKEcfcaAPVHh
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCv7NYNnxWkID2wNLlAFb5BrPa51+qVhSI6J2a+Z5WCPwAAAJDtHTG97R0x
|
|
||||||
vQAAAAtzc2gtZWQyNTUxOQAAACCv7NYNnxWkID2wNLlAFb5BrPa51+qVhSI6J2a+Z5WCPw
|
|
||||||
AAAEAt2jlOp8Css08as9uMomhLBR80nUOVR0cdTRxAj44t7a/s1g2fFaQgPbA0uUAVvkGs
|
|
||||||
9rnX6pWFIjonZr5nlYI/AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIK/s1g2fFaQgPbA0uUAVvkGs9rnX6pWFIjonZr5nlYI/
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBwIsqgWRZWCMVusVVRecW1xsy7ms+LwlAipPQHsomfrgAAAJAdrb04Ha29
|
|
||||||
OAAAAAtzc2gtZWQyNTUxOQAAACBwIsqgWRZWCMVusVVRecW1xsy7ms+LwlAipPQHsomfrg
|
|
||||||
AAAEBSYcsP78qGxdjywl7zL04HFdXkChVee3NWnasiHZTbrXAiyqBZFlYIxW6xVVF5xbXG
|
|
||||||
zLuaz4vCUCKk9AeyiZ+uAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHAiyqBZFlYIxW6xVVF5xbXGzLuaz4vCUCKk9AeyiZ+u
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAxaBrw2EI0QXIB7uSHcxap3ErfwyGDUDecXCiPbeBEcAAAAJCCnEK7gpxC
|
|
||||||
uwAAAAtzc2gtZWQyNTUxOQAAACAxaBrw2EI0QXIB7uSHcxap3ErfwyGDUDecXCiPbeBEcA
|
|
||||||
AAAEAV7QGBc93c1rc4E0sYUjfxJtAhyzoL6UFIqHt0K75pzzFoGvDYQjRBcgHu5IdzFqnc
|
|
||||||
St/DIYNQN5xcKI9t4ERwAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFoGvDYQjRBcgHu5IdzFqncSt/DIYNQN5xcKI9t4ERw
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBJ/lnL3rDxbf5N34/6b8YUdeQcLW/sQC9FDQv8QuNa6wAAAJCklauipJWr
|
|
||||||
ogAAAAtzc2gtZWQyNTUxOQAAACBJ/lnL3rDxbf5N34/6b8YUdeQcLW/sQC9FDQv8QuNa6w
|
|
||||||
AAAEBcKfl8S8aL6ExO1SyIhRRusqbQypCrcL+uocVPp3x9AUn+WcvesPFt/k3fj/pvxhR1
|
|
||||||
5Bwtb+xAL0UNC/xC41rrAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEn+WcvesPFt/k3fj/pvxhR15Bwtb+xAL0UNC/xC41rr
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACC+ug+Dla7opU6Ue0bq6JEZTkJZKbXO8aYGLQTpIQMWZgAAAJAETQk+BE0J
|
|
||||||
PgAAAAtzc2gtZWQyNTUxOQAAACC+ug+Dla7opU6Ue0bq6JEZTkJZKbXO8aYGLQTpIQMWZg
|
|
||||||
AAAEAKQq/gnXeahGzkiJDFR3Ug1wDKa1CV/TDHYefjErci2766D4OVruilTpR7RurokRlO
|
|
||||||
Qlkptc7xpgYtBOkhAxZmAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIL66D4OVruilTpR7RurokRlOQlkptc7xpgYtBOkhAxZm
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBMHZyOfIhajDaBUOJTPybYRnTTGtcC2bcqSyacu9Ju2wAAAJCnFHu7pxR7
|
|
||||||
uwAAAAtzc2gtZWQyNTUxOQAAACBMHZyOfIhajDaBUOJTPybYRnTTGtcC2bcqSyacu9Ju2w
|
|
||||||
AAAEAvr7TAM0LHpPKKiOAARt5pbuf2kTGrtj2cxZkH23SRuUwdnI58iFqMNoFQ4lM/JthG
|
|
||||||
dNMa1wLZtypLJpy70m7bAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEwdnI58iFqMNoFQ4lM/JthGdNMa1wLZtypLJpy70m7b
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACB2HMbN37ecERq9rxd1fEFio1oX579wTpjeBB2BLTWxHAAAAJCSUGNbklBj
|
|
||||||
WwAAAAtzc2gtZWQyNTUxOQAAACB2HMbN37ecERq9rxd1fEFio1oX579wTpjeBB2BLTWxHA
|
|
||||||
AAAEBtqBObWL5UjOEYHAD6PdIpCg1sfxoIDFjWIzI1lMVY7XYcxs3ft5wRGr2vF3V8QWKj
|
|
||||||
Whfnv3BOmN4EHYEtNbEcAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHYcxs3ft5wRGr2vF3V8QWKjWhfnv3BOmN4EHYEtNbEc
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACB1K5Z4GZri9gSIf0xJV2zALEKtOx/TceYZAug1b4l05wAAAJAyOjGfMjox
|
|
||||||
nwAAAAtzc2gtZWQyNTUxOQAAACB1K5Z4GZri9gSIf0xJV2zALEKtOx/TceYZAug1b4l05w
|
|
||||||
AAAEAQ/O8UxvSeIFzIwnBSgG+pBrksVTE0JSm3PT0iU5XTvHUrlngZmuL2BIh/TElXbMAs
|
|
||||||
Qq07H9Nx5hkC6DVviXTnAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHUrlngZmuL2BIh/TElXbMAsQq07H9Nx5hkC6DVviXTn
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAJCrBv4Lq4KwZ+Av3CPNQOsqzdHWd5UngQtEJOq85ZVwAAAJBPDt0MTw7d
|
|
||||||
DAAAAAtzc2gtZWQyNTUxOQAAACAJCrBv4Lq4KwZ+Av3CPNQOsqzdHWd5UngQtEJOq85ZVw
|
|
||||||
AAAEBYgWZinCGgunfYguB7CMzfm9WLAFtDsuBbBRkE2z5fvgkKsG/gurgrBn4C/cI81A6y
|
|
||||||
rN0dZ3lSeBC0Qk6rzllXAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAkKsG/gurgrBn4C/cI81A6yrN0dZ3lSeBC0Qk6rzllX
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACB3ecBPvfcGLAIhLHrSIljw/lt2bcZPtl+Yp/N/Aa0rUgAAAJARHASZERwE
|
|
||||||
mQAAAAtzc2gtZWQyNTUxOQAAACB3ecBPvfcGLAIhLHrSIljw/lt2bcZPtl+Yp/N/Aa0rUg
|
|
||||||
AAAEDX7ojEpL5DSplVcbH3Z3WvMHXh+gzNO7267e7qphyMEHd5wE+99wYsAiEsetIiWPD+
|
|
||||||
W3Ztxk+2X5in838BrStSAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIHd5wE+99wYsAiEsetIiWPD+W3Ztxk+2X5in838BrStS
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBmLotihWzSOf2vNHa2rvvA1RvUvBcOY7wJj52TLT+BjgAAAJBcanvTXGp7
|
|
||||||
0wAAAAtzc2gtZWQyNTUxOQAAACBmLotihWzSOf2vNHa2rvvA1RvUvBcOY7wJj52TLT+Bjg
|
|
||||||
AAAEAauwO5GVREzvC/wVYeCkGPMWSUpTR9p1/xef32KaGNg2Yui2KFbNI5/a80drau+8DV
|
|
||||||
G9S8Fw5jvAmPnZMtP4GOAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGYui2KFbNI5/a80drau+8DVG9S8Fw5jvAmPnZMtP4GO
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAP94Hk6SFNl+VtgmXcFJj6rjNIof/w+Y7BgRQaOUGOFgAAAJDq5tjl6ubY
|
|
||||||
5QAAAAtzc2gtZWQyNTUxOQAAACAP94Hk6SFNl+VtgmXcFJj6rjNIof/w+Y7BgRQaOUGOFg
|
|
||||||
AAAEDcKRzAHSri73wKDSm/s93ztazPueJNe4v1SOYGYZr8RA/3geTpIU2X5W2CZdwUmPqu
|
|
||||||
M0ih//D5jsGBFBo5QY4WAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA/3geTpIU2X5W2CZdwUmPquM0ih//D5jsGBFBo5QY4W
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCFD/2GH7xvF4KyaCp4AN2hqBQ0faVLKr6rk4QIvkVoGQAAAJAZdE/OGXRP
|
|
||||||
zgAAAAtzc2gtZWQyNTUxOQAAACCFD/2GH7xvF4KyaCp4AN2hqBQ0faVLKr6rk4QIvkVoGQ
|
|
||||||
AAAEDUjwPdEyxwd09zUSSLnFQRuk4eEaTI/eVKBU8v3fWPA4UP/YYfvG8XgrJoKngA3aGo
|
|
||||||
FDR9pUsqvquThAi+RWgZAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIUP/YYfvG8XgrJoKngA3aGoFDR9pUsqvquThAi+RWgZ
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBBBu9z47BDj6gXGDMR57o5cBBjTmJufFtgIfM38qjtOgAAAJD2j1v39o9b
|
|
||||||
9wAAAAtzc2gtZWQyNTUxOQAAACBBBu9z47BDj6gXGDMR57o5cBBjTmJufFtgIfM38qjtOg
|
|
||||||
AAAEAS8KjOkX39TxzpQoWYu5C3tZ0OeefhjtrY21N/X3fqskEG73PjsEOPqBcYMxHnujlw
|
|
||||||
EGNOYm58W2Ah8zfyqO06AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEEG73PjsEOPqBcYMxHnujlwEGNOYm58W2Ah8zfyqO06
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBUOb5u2aKPWpTDOjL/DcJ0FXB15Wm2q1wT08iDLTf1gAAAAJAGxvX0Bsb1
|
|
||||||
9AAAAAtzc2gtZWQyNTUxOQAAACBUOb5u2aKPWpTDOjL/DcJ0FXB15Wm2q1wT08iDLTf1gA
|
|
||||||
AAAEABXpBtLmNBMVR1D5wLx6Gr2awJURTSjDDWzsAbw6TFsVQ5vm7Zoo9alMM6Mv8NwnQV
|
|
||||||
cHXlabarXBPTyIMtN/WAAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIFQ5vm7Zoo9alMM6Mv8NwnQVcHXlabarXBPTyIMtN/WA
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACA7T1VFec7iACylwPXZcuZa1HK4VorMpcQOGmgdKsyhOwAAAJA3aRYZN2kW
|
|
||||||
GQAAAAtzc2gtZWQyNTUxOQAAACA7T1VFec7iACylwPXZcuZa1HK4VorMpcQOGmgdKsyhOw
|
|
||||||
AAAEB3h5u2u44QKM9OfpySUI7aRWKMDUxBGZuFhIWplWQlJDtPVUV5zuIALKXA9dly5lrU
|
|
||||||
crhWisylxA4aaB0qzKE7AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDtPVUV5zuIALKXA9dly5lrUcrhWisylxA4aaB0qzKE7
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDK2PgDUTMkaIj9fyAwFTxzSWGTt3jDJGBUv2VV8OazjwAAAJCS9S3kkvUt
|
|
||||||
5AAAAAtzc2gtZWQyNTUxOQAAACDK2PgDUTMkaIj9fyAwFTxzSWGTt3jDJGBUv2VV8Oazjw
|
|
||||||
AAAEDwOc5THuOMvWUR+W9IxzL7EGvkY1bVH3sGN0c4hHFlCsrY+ANRMyRoiP1/IDAVPHNJ
|
|
||||||
YZO3eMMkYFS/ZVXw5rOPAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMrY+ANRMyRoiP1/IDAVPHNJYZO3eMMkYFS/ZVXw5rOP
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACA51rLaVTmnnZrKO0mLASDhsDp3kGRTDQ6ZSx3695A7TQAAAJB71xNoe9cT
|
|
||||||
aAAAAAtzc2gtZWQyNTUxOQAAACA51rLaVTmnnZrKO0mLASDhsDp3kGRTDQ6ZSx3695A7TQ
|
|
||||||
AAAEBeQwYs0H3fHdmy8m8Q2RI+MqQ8x3Ja+AL7pgv0i45sjDnWstpVOaedmso7SYsBIOGw
|
|
||||||
OneQZFMNDplLHfr3kDtNAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDnWstpVOaedmso7SYsBIOGwOneQZFMNDplLHfr3kDtN
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDe/oog8ha7+lrhoHBc9wPw2S0Agqq5T8JqF/ADNO6oJgAAAJAiuQ7FIrkO
|
|
||||||
xQAAAAtzc2gtZWQyNTUxOQAAACDe/oog8ha7+lrhoHBc9wPw2S0Agqq5T8JqF/ADNO6oJg
|
|
||||||
AAAEAhPbDjv7o0FY7IsMjuzcMtX0aQPV/GvSckfdjbefw1t97+iiDyFrv6WuGgcFz3A/DZ
|
|
||||||
LQCCqrlPwmoX8AM07qgmAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIN7+iiDyFrv6WuGgcFz3A/DZLQCCqrlPwmoX8AM07qgm
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCV9Md7o43wddOYfpgVBgFARtICxXC4UyX0D7wWVqUpNwAAAJCJCDFgiQgx
|
|
||||||
YAAAAAtzc2gtZWQyNTUxOQAAACCV9Md7o43wddOYfpgVBgFARtICxXC4UyX0D7wWVqUpNw
|
|
||||||
AAAECoVFmNu9FUfYS+SXfaQPC5vjGSqElDUhMjMLSiao1r6JX0x3ujjfB105h+mBUGAUBG
|
|
||||||
0gLFcLhTJfQPvBZWpSk3AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJX0x3ujjfB105h+mBUGAUBG0gLFcLhTJfQPvBZWpSk3
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDswYoWW2FGDoJ1yWVOLYHvuXGwx0p8lcG77tnd64kkrgAAAJC1DLhJtQy4
|
|
||||||
SQAAAAtzc2gtZWQyNTUxOQAAACDswYoWW2FGDoJ1yWVOLYHvuXGwx0p8lcG77tnd64kkrg
|
|
||||||
AAAEDzmEg782N+cOfNux1Q6yHrY1sLW3c4DMWjzcaW3W1ErOzBihZbYUYOgnXJZU4tge+5
|
|
||||||
cbDHSnyVwbvu2d3riSSuAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOzBihZbYUYOgnXJZU4tge+5cbDHSnyVwbvu2d3riSSu
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBPZXNPw73GxSPfCJcVGAjN0v28ZSsHCzm5pRCny1WAvQAAAJCWJk8ZliZP
|
|
||||||
GQAAAAtzc2gtZWQyNTUxOQAAACBPZXNPw73GxSPfCJcVGAjN0v28ZSsHCzm5pRCny1WAvQ
|
|
||||||
AAAEDqvYZKAespBeZuSTxq3WReeEpDJF7WmoI9W99lrxxCE09lc0/DvcbFI98IlxUYCM3S
|
|
||||||
/bxlKwcLObmlEKfLVYC9AAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE9lc0/DvcbFI98IlxUYCM3S/bxlKwcLObmlEKfLVYC9
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACCcLL+W0xkHqaqSXSVF1VhLHB01zB0KvffaW/sERI3KmwAAAJA7mafNO5mn
|
|
||||||
zQAAAAtzc2gtZWQyNTUxOQAAACCcLL+W0xkHqaqSXSVF1VhLHB01zB0KvffaW/sERI3Kmw
|
|
||||||
AAAEDy704ZWpHkYHDbh60XwqHgzlWLIJ5PNKz49/Irxm0aTJwsv5bTGQepqpJdJUXVWEsc
|
|
||||||
HTXMHQq999pb+wREjcqbAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJwsv5bTGQepqpJdJUXVWEscHTXMHQq999pb+wREjcqb
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACBlaMsaa+ZWsg1cJU4KM2RfwVWoNLh9cD1i2yAK0474VwAAAJD2vFW69rxV
|
|
||||||
ugAAAAtzc2gtZWQyNTUxOQAAACBlaMsaa+ZWsg1cJU4KM2RfwVWoNLh9cD1i2yAK0474Vw
|
|
||||||
AAAEA7XqyvAlL1HjHrDjCHquvcUNiEAHiHpZ8kY8C7dKRqaGVoyxpr5layDVwlTgozZF/B
|
|
||||||
Vag0uH1wPWLbIArTjvhXAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIGVoyxpr5layDVwlTgozZF/BVag0uH1wPWLbIArTjvhX
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACDqfAuIZUBy6ye4/ShSOiOQCbxTzyt3U1LkqjCLNSaRFAAAAJA2IaY5NiGm
|
|
||||||
OQAAAAtzc2gtZWQyNTUxOQAAACDqfAuIZUBy6ye4/ShSOiOQCbxTzyt3U1LkqjCLNSaRFA
|
|
||||||
AAAEAwV5D48v6Zk8AwvNsM4ZIVWIoX3j1XMmVlXCpGqH9T8ep8C4hlQHLrJ7j9KFI6I5AJ
|
|
||||||
vFPPK3dTUuSqMIs1JpEUAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
|
@ -1 +0,0 @@
|
||||||
ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOp8C4hlQHLrJ7j9KFI6I5AJvFPPK3dTUuSqMIs1JpEU
|
|
|
@ -1,7 +0,0 @@
|
||||||
-----BEGIN OPENSSH PRIVATE KEY-----
|
|
||||||
b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAAAMwAAAAtzc2gtZW
|
|
||||||
QyNTUxOQAAACAx7lKfFQeH62p52oPfyiNGyq8GU3z/Vt6bGB1Qpx0Q3QAAAJBqU751alO+
|
|
||||||
dQAAAAtzc2gtZWQyNTUxOQAAACAx7lKfFQeH62p52oPfyiNGyq8GU3z/Vt6bGB1Qpx0Q3Q
|
|
||||||
AAAECliczj8uG8GqZwsL2EaPcw6vIUxGum7XbDdoNb8UEqyDHuUp8VB4frannag9/KI0bK
|
|
||||||
rwZTfP9W3psYHVCnHRDdAAAADW5pb2xzQHdhbGxhY2U=
|
|
||||||
-----END OPENSSH PRIVATE KEY-----
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue