Skip to content

Commit a83b646

Browse files
feat(smb): add katelyn to smb list and migrate to sops setup
1 parent 6d9b0e5 commit a83b646

5 files changed

Lines changed: 119 additions & 86 deletions

File tree

configurations/nixos/lab/services/samba/settings.nix

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@
2828
# Backups
2929
tm_share = {
3030
"path" = "/zshare/backup/tm_share";
31-
"valid users" = "justinhoang";
31+
"valid users" = "justinhoang katelynjascha";
3232
"public" = "no";
3333
"writeable" = "yes";
3434
"force group" = "samba";
@@ -75,7 +75,7 @@
7575
# Temp!
7676
tmp = {
7777
"path" = "/ztmp/tmp";
78-
"valid users" = "justinhoang";
78+
"valid users" = "justinhoang katelynjascha";
7979
"browseable" = "yes";
8080
"public" = "no";
8181
"read only" = "no";
Lines changed: 48 additions & 33 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1,57 @@
1-
{ pkgs, userConfigs, ... }:
1+
{
2+
config,
3+
inputs,
4+
pkgs,
5+
...
6+
}:
7+
let
8+
justinhoang_password = config.sops.secrets."passwords/justinhoang".path;
9+
katelyn_password = config.sops.secrets."passwords/katelynjascha".path;
10+
in
211
{
312
# Need to enable zsh before we can actually use it. Home manager configs it,
413
# but cannot set the login shell because that's root level operation
514
programs.zsh.enable = true;
615

7-
users.users =
8-
let
9-
helper =
10-
acc:
11-
{ username, initialHashedPassword, ... }:
12-
{
13-
${username} = {
14-
# If you do, you can skip setting a root password by passing
15-
# '--no-root-passwd' to nixos-install. Be sure to change it (using
16-
# passwd) after rebooting!
17-
inherit initialHashedPassword;
16+
sops.secrets = {
17+
"passwords/justinhoang" = {
18+
neededForUsers = true;
19+
sopsFile = "${inputs.self}/secrets/secrets.yaml";
20+
};
21+
"passwords/katelynjascha" = {
22+
neededForUsers = true;
23+
sopsFile = "${inputs.self}/secrets/secrets.yaml";
24+
};
25+
};
26+
27+
users.users = {
28+
justinhoang = {
29+
hashedPasswordFile = justinhoang_password;
1830

19-
isNormalUser = true;
20-
extraGroups = [
21-
"libvirtd"
22-
"minecraft"
23-
"samba"
24-
"syncthing"
25-
"wheel"
26-
];
27-
shell = pkgs.zsh;
31+
isNormalUser = true;
32+
extraGroups = [
33+
"libvirtd"
34+
"minecraft"
35+
"samba"
36+
"syncthing"
37+
"wheel"
38+
];
39+
shell = pkgs.zsh;
2840

29-
openssh.authorizedKeys.keys = [
30-
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA12qTb88TMH/x1T2xST2kEviP+RGGQkv+EJFWPboxuv justinhoang@iphone15"
31-
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBse2Ikd1n7K9MnQiXmC4kNdNOasAVBbgH01pozcsbm justinhoang@Justins-MacBook-Pro.local"
32-
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEUijrS7uoSrbIA/R1EmnvzU7xcv6h8u+RVYBU9Ruw31 justinhoang@ilmgf"
33-
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILBclQTbAA8JkwD5mV17zhuISaF5t6vliyOsEaRdMpsw justinhoang@fedora"
34-
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILSeaDq9Cb9lhnEPP6SHAJ8pJ2TPiF/y8hXpJtvsSCMk justinhoang@ipadProM2"
35-
];
36-
};
37-
}
38-
// acc;
39-
in
40-
builtins.foldl' helper { } userConfigs;
41+
openssh.authorizedKeys.keys = [
42+
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIA12qTb88TMH/x1T2xST2kEviP+RGGQkv+EJFWPboxuv justinhoang@iphone15"
43+
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIBBse2Ikd1n7K9MnQiXmC4kNdNOasAVBbgH01pozcsbm justinhoang@Justins-MacBook-Pro.local"
44+
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEUijrS7uoSrbIA/R1EmnvzU7xcv6h8u+RVYBU9Ruw31 justinhoang@ilmgf"
45+
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILBclQTbAA8JkwD5mV17zhuISaF5t6vliyOsEaRdMpsw justinhoang@fedora"
46+
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILSeaDq9Cb9lhnEPP6SHAJ8pJ2TPiF/y8hXpJtvsSCMk justinhoang@ipadProM2"
47+
];
48+
};
49+
katelynjascha = {
50+
hashedPasswordFile = katelyn_password;
4151

52+
isNormalUser = true;
53+
extraGroups = [ "samba" ];
54+
shell = pkgs.zsh;
55+
};
56+
};
4257
}

configurations/nixos/pi/system/users.nix

Lines changed: 17 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,26 @@
1-
{ pkgs, ... }:
1+
{
2+
config,
3+
inputs,
4+
pkgs,
5+
...
6+
}:
7+
let
8+
admin_password = config.sops.secrets."passwords/admin".path;
9+
in
210
{
311
# Need to enable zsh before we can actually use it. Home manager configs it,
412
# but cannot set the login shell because that's root level operation
513
programs.zsh.enable = true;
614

15+
sops.secrets = {
16+
"passwords/admin" = {
17+
neededForUsers = true;
18+
sopsFile = "${inputs.self}/secrets/secrets.yaml";
19+
};
20+
};
21+
722
users.users.admin = {
8-
# If you do, you can skip setting a root password by passing
9-
# '--no-root-passwd' to nixos-install. Be sure to change it (using
10-
# passwd) after rebooting!
11-
initialHashedPassword = "$y$j9T$sXZCGwjtugZIt/C2nU8bk/$D36OrIe3eyGSM7rPysbQI1OyT56TdtJZtcvnOne2Ge0";
23+
hashedPasswordFile = admin_password;
1224
isNormalUser = true;
1325
extraGroups = [ "wheel" ];
1426
shell = pkgs.zsh;

data/users.json

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,13 @@
11
{
22
"admin": {
3-
"username": "admin",
4-
"initialHashedPassword": "$y$j9T$sXZCGwjtugZIt/C2nU8bk/$D36OrIe3eyGSM7rPysbQI1OyT56TdtJZtcvnOne2Ge0"
3+
"username": "admin"
54
},
65
"justinhoang": {
76
"username": "justinhoang",
8-
"email": "justinhoang@sua.dev",
9-
"initialHashedPassword": "$y$j9T$sXZCGwjtugZIt/C2nU8bk/$D36OrIe3eyGSM7rPysbQI1OyT56TdtJZtcvnOne2Ge0"
7+
"email": "justinhoang@sua.dev"
8+
},
9+
"katelynjascha": {
10+
"username": "katelynjacsha",
11+
"email": "katelynjascha@gmail.com"
1012
}
1113
}

secrets/secrets.yaml

Lines changed: 46 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -3,54 +3,58 @@
33
#ENC[AES256_GCM,data:u++VXxZKR61TJnVwfeN7cjAQuhPSTILnWupUEqj7vz5xPTg3ZtFdZHI=,iv:vx7ZiVyDMWkpDJ1oWIT2TVETPRF+wGq6Kt19rgUMuh0=,tag:GELwcfBxtJeq8i1pO77r2Q==,type:comment]
44
#ENC[AES256_GCM,data:5NyDog==,iv:iYTi4X38ASQhxtcv6qLJu1JC8+baMYNhEOC77JYMne8=,tag:nlASUQAMMvnqPVF6uXXGhw==,type:comment]
55
acme:
6-
namecheap_api: ENC[AES256_GCM,data:7NtaXfRKg5Kk9eSif4p+8vKD6WpbUwJOafRtD3buHkrXcDAB5Zw8r3CppT8wMg3ujPHEFt0LcmddAlq8++kAGTLSAcKHo2/AL7R8CA1aErerDrzLFvs=,iv:1jPP/hdJWB1xd2nyiJkFDA8y5lIhpYwr/hMqAW5UD3Y=,tag:uzxIRaun5LWPkeGnGCG+Lw==,type:str]
6+
namecheap_api: ENC[AES256_GCM,data:7NtaXfRKg5Kk9eSif4p+8vKD6WpbUwJOafRtD3buHkrXcDAB5Zw8r3CppT8wMg3ujPHEFt0LcmddAlq8++kAGTLSAcKHo2/AL7R8CA1aErerDrzLFvs=,iv:1jPP/hdJWB1xd2nyiJkFDA8y5lIhpYwr/hMqAW5UD3Y=,tag:uzxIRaun5LWPkeGnGCG+Lw==,type:str]
77
duckdns:
8-
domains: ENC[AES256_GCM,data:hvLInxXeneO2MC9tzpon+Yt9lwk=,iv:1Qd8Mg7UGWPr8JFpPf1hOT+NKGjZGQpRObXiqU4x40A=,tag:24jc13ZLRIbHxTg4YvdMJA==,type:str]
9-
token: ENC[AES256_GCM,data:rPYYV8/SL32LbLvQmI7rwlkzrBKvBDUukg7XIHpRG1y0MsrL,iv:ipknOkw5581PJlAd2tSF2H5dIeWBSjhzuKyiZyaBpB0=,tag:TbcUa8oLMZK+1qg3btYQfA==,type:str]
8+
domains: ENC[AES256_GCM,data:hvLInxXeneO2MC9tzpon+Yt9lwk=,iv:1Qd8Mg7UGWPr8JFpPf1hOT+NKGjZGQpRObXiqU4x40A=,tag:24jc13ZLRIbHxTg4YvdMJA==,type:str]
9+
token: ENC[AES256_GCM,data:rPYYV8/SL32LbLvQmI7rwlkzrBKvBDUukg7XIHpRG1y0MsrL,iv:ipknOkw5581PJlAd2tSF2H5dIeWBSjhzuKyiZyaBpB0=,tag:TbcUa8oLMZK+1qg3btYQfA==,type:str]
1010
firefox-syncserver:
11-
token: ENC[AES256_GCM,data:L9qZhoVakKp6g7USRUTg1rdCiYRRkRlT/6fduS6CRp4J0pqhV5+XpwJj2XwtEdTOGxy2S+3LbMa6AvjpwT9NVOVG4mJ/ffiRsaUB6FBTjJPxE8Iv,iv:QrUnw9cqoYoNWSY0ouGFB7I1/fsabuXO3rLID4o0AfQ=,tag:Xv8E3toSLPPGBWVBiJCf3A==,type:str]
11+
token: ENC[AES256_GCM,data:L9qZhoVakKp6g7USRUTg1rdCiYRRkRlT/6fduS6CRp4J0pqhV5+XpwJj2XwtEdTOGxy2S+3LbMa6AvjpwT9NVOVG4mJ/ffiRsaUB6FBTjJPxE8Iv,iv:QrUnw9cqoYoNWSY0ouGFB7I1/fsabuXO3rLID4o0AfQ=,tag:Xv8E3toSLPPGBWVBiJCf3A==,type:str]
1212
gitea:
13-
token: ENC[AES256_GCM,data:ZJcq9/KyadLkrCp9A199u7fXKyy3g/DZNkm21UTVMjqcutXWOp0iXYsTi+rI5yI=,iv:ebssZ/lDJO0CC50Li/Lmxu99GlX3Ce6qxUdy7XJ4vb0=,tag:mydWi+3oQgb8jvULVRggqg==,type:str]
13+
token: ENC[AES256_GCM,data:ZJcq9/KyadLkrCp9A199u7fXKyy3g/DZNkm21UTVMjqcutXWOp0iXYsTi+rI5yI=,iv:ebssZ/lDJO0CC50Li/Lmxu99GlX3Ce6qxUdy7XJ4vb0=,tag:mydWi+3oQgb8jvULVRggqg==,type:str]
1414
miniflux:
15-
credentials: ENC[AES256_GCM,data:znLPLqcf15VJQBf5hdpOKDaVGmwLxw1akZmHUu5uwqqaQxSOGJ8JQMi/T7BnlQuUY+ofJyEGjiYtvWUv,iv:sCEM1kbHBQz7zdDLXOLn9SxXflR0J0gadxdaWhjD3q4=,tag:j0aCYp1v5C3DeThV88yDrQ==,type:str]
15+
credentials: ENC[AES256_GCM,data:znLPLqcf15VJQBf5hdpOKDaVGmwLxw1akZmHUu5uwqqaQxSOGJ8JQMi/T7BnlQuUY+ofJyEGjiYtvWUv,iv:sCEM1kbHBQz7zdDLXOLn9SxXflR0J0gadxdaWhjD3q4=,tag:j0aCYp1v5C3DeThV88yDrQ==,type:str]
1616
navidrome:
17-
environment: ENC[AES256_GCM,data:FJJhP4N7WJTb7JBZisXlyxpVaB5ORthXNTry1nhDBkNnuthFdw8qcRBDNpqI0I2iT6cycHeIYadkecRzcExUgw5LjDdTMM52tgRxt/M/D0JlHKH8q+kYy+3StJ5nLGGjWxSosg==,iv:D1sGkWk68S0b3wouPE9S8m4Lv+23s6NLsNhS8Lzeu9o=,tag:ieMiAm8OO5BPdfPGyx8/BA==,type:str]
17+
environment: ENC[AES256_GCM,data:FJJhP4N7WJTb7JBZisXlyxpVaB5ORthXNTry1nhDBkNnuthFdw8qcRBDNpqI0I2iT6cycHeIYadkecRzcExUgw5LjDdTMM52tgRxt/M/D0JlHKH8q+kYy+3StJ5nLGGjWxSosg==,iv:D1sGkWk68S0b3wouPE9S8m4Lv+23s6NLsNhS8Lzeu9o=,tag:ieMiAm8OO5BPdfPGyx8/BA==,type:str]
1818
searxng:
19-
environmentFile: ENC[AES256_GCM,data:j3qqxt4uVKaCn2eUzjdZk6WYCg2loYduHrDh6Iudp9sX6A8dlIYUVuOtG74kpaerEvQkOg3z5N/TIfwQ1dhSBl0xXMy92qall7oi2dJrF9Y=,iv:FV6b/CPA1pjVgJhtDoqwwh4XrTKG9C7ODBJkbnyg6x4=,tag:fFqtbe24/txdmEO28DbdXA==,type:str]
19+
environmentFile: ENC[AES256_GCM,data:j3qqxt4uVKaCn2eUzjdZk6WYCg2loYduHrDh6Iudp9sX6A8dlIYUVuOtG74kpaerEvQkOg3z5N/TIfwQ1dhSBl0xXMy92qall7oi2dJrF9Y=,iv:FV6b/CPA1pjVgJhtDoqwwh4XrTKG9C7ODBJkbnyg6x4=,tag:fFqtbe24/txdmEO28DbdXA==,type:str]
2020
vaultwarden:
21-
environmentFile: ENC[AES256_GCM,data:0u0SAGtCGTiH0ui9umrUm+Jl5w/enTNc2lavWKOHjkFYm2hECNONhhdQWniS1ByZRXu2AQRAMVun5hOQXF1JkRV7tLIJ4s9Oe11g5Ww=,iv:G7Cs+Lwuq6zbSR6AEnzqvnD9QOExuAnSPl3OdFDnT1o=,tag:DX3Nyz7Dmt/I5EjihO3NnA==,type:str]
21+
environmentFile: ENC[AES256_GCM,data:0u0SAGtCGTiH0ui9umrUm+Jl5w/enTNc2lavWKOHjkFYm2hECNONhhdQWniS1ByZRXu2AQRAMVun5hOQXF1JkRV7tLIJ4s9Oe11g5Ww=,iv:G7Cs+Lwuq6zbSR6AEnzqvnD9QOExuAnSPl3OdFDnT1o=,tag:DX3Nyz7Dmt/I5EjihO3NnA==,type:str]
2222
linkwarden:
23-
environmentFile: ENC[AES256_GCM,data:FoRQA4SsPzlhHs4FCsaM/T6neR8vDqE4fBkShvHn1eNkeE6A9hF5wtvB2Qqjz1PK5os7ltiikxQoTWBiNnaX6+w3QC/ql+Y0ZI0KzwL52L8pCFDw0Fw4UjAjZV3bpvD8uiA/4W16ratnVjV4Y1hJ7FDy9XuQZxorpcHcDkaASGmzmr5za0fSEC9Wmz6sA5DpAOlcbjP+eudtYeEGZlenGgPM0to=,iv:tE3seG2VmJNKZU//pG7yfsdTSmZXSpnyKxQJm7gnIGs=,tag:6x4w70/qA1AQDuhfxHKBTA==,type:str]
23+
environmentFile: ENC[AES256_GCM,data:FoRQA4SsPzlhHs4FCsaM/T6neR8vDqE4fBkShvHn1eNkeE6A9hF5wtvB2Qqjz1PK5os7ltiikxQoTWBiNnaX6+w3QC/ql+Y0ZI0KzwL52L8pCFDw0Fw4UjAjZV3bpvD8uiA/4W16ratnVjV4Y1hJ7FDy9XuQZxorpcHcDkaASGmzmr5za0fSEC9Wmz6sA5DpAOlcbjP+eudtYeEGZlenGgPM0to=,iv:tE3seG2VmJNKZU//pG7yfsdTSmZXSpnyKxQJm7gnIGs=,tag:6x4w70/qA1AQDuhfxHKBTA==,type:str]
24+
passwords:
25+
admin: ENC[AES256_GCM,data:HC6g4Rhlv/kGjZ58zzbR9Frgg+quSGKOnmKAGJEgANeE7l+CeD9Jc6G23F6PKu0qUrTlLrmmBkRmBF0xBBQKTae9wXABgWFJpg==,iv:+vyvcX5MSUammgK2RblGVmQ9LofGaeNT6Dqa0ekhHho=,tag:OiGY9PN/Q1D+Sn3dxDRVcg==,type:str]
26+
justinhoang: ENC[AES256_GCM,data:0PRHfAakrhaqjlxfy2OmlvriuL/G4i8wuWGvDDTFn1Qh2q/4hT3/7eUSae/32QUEOrR1dLcXSCyESEq9bGXcyKgzf2Zdw8YBww==,iv:2o7D7KvfOMwz7xK4IubofztPkjTSYfXSxF38Dy5Xtn8=,tag:ZKVbrGW9cGHSrm9OiowiRQ==,type:str]
27+
katelynjascha: ENC[AES256_GCM,data:Jkb9J+1TeBO4XhLA0bUfr7QpvNL7m/pY9degb+fptETqzdNCxhm6aavKQVGt8MlBqJK4DawolSKTsCuQjzq0T4CF8GCGkiV5sw==,iv:VK9N8I6GVG8rH6VGiKyCO3om5xSKcLnbREPCNUEFuHY=,tag:FFe917o/I22v5rTLGZJ/sA==,type:str]
2428
sops:
25-
age:
26-
- recipient: age1z873m77wql5652lewr95323ejpvl85fchwq22xg8yd6x4kperejqg9wlph
27-
enc: |
28-
-----BEGIN AGE ENCRYPTED FILE-----
29-
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBwN2IrSlgvSnlnZ0hpVGYx
30-
UlorQmJmSUJaTTcwaHorYkFmOEo1UzZwL21rCjR3ZFZseXA0VlNxcitlQWxUUnRp
31-
Vis3WmhzUlg3eWR6cGIwc0hSTWlkaTgKLS0tIFk3TmMydmQ0QjVVWjhaWUR3MjUr
32-
aTlKcGhVN3RNMHIzamE5Y0xHcktRQ1EK3tHkkfR1+lWY2N7L5b688RLWyt94mm5u
33-
3dYDI9E6stIHaTZ8cXl8CuCNSaxSNjr/AmsHWS7JkiChvOARetQeEQ==
34-
-----END AGE ENCRYPTED FILE-----
35-
- recipient: age1gg9hr3cxa28ztx75gnaqam99l3mmp2799nsvntf5dvu0kjxf5feqqwwnqu
36-
enc: |
37-
-----BEGIN AGE ENCRYPTED FILE-----
38-
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBkeGJLaU95RnhGc0gyVTZL
39-
d3Q3UTV5TlBZNTZkNTJDZ3VyZTA2VnZHN1h3CkdVV2tvT3NXK1BObjNjMi82NmRU
40-
ZHpmZnRoWS9BTnRkVTlQYWR4K0tadkEKLS0tIFN5NENvNys2OHAxa2cyUTBWUkJh
41-
NThIdExzRnM5SGN3dnR5djNjbFNncFkKH1ESmrHflWMVTQr6336GzEqgjhV38XXB
42-
6Gc9TEncg6u8d1ACLenczotPfrjVIV1Vb5cQ0ceeeej1/6rnqcTf4g==
43-
-----END AGE ENCRYPTED FILE-----
44-
- recipient: age1ed2wgryukz5xq6t8w6nhjvldwgvw5lj2aq37n7q23et2ycqwtueqaaw4fj
45-
enc: |
46-
-----BEGIN AGE ENCRYPTED FILE-----
47-
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBWLzQxV1FqWUttbzhPR2gz
48-
dnB6YW9ZbWFkSEFlWjV5UUtRQWdRNWE4MUM0CnR0VVlHQ0lzWGVERERJZ1p3Z3lR
49-
OXBCaWg3VXhzUllpcDhFYitic1Y2VHMKLS0tIHduQ1owVkdNTkNCc3NJUjNFN09G
50-
REovaGpGNFZBUzluVUZJRFNhRTFXOEkKKwtSdn6tLejehnSWH4ya/+FAidwI1/zS
51-
6D1nnlIOToi2SdULI7ZQp4EbCMLjeTKh9BWXJdya1oFGSSmQlm4MIg==
52-
-----END AGE ENCRYPTED FILE-----
53-
lastmodified: "2026-01-17T15:04:55Z"
54-
mac: ENC[AES256_GCM,data:1iNOa4jsBO5w+z1sa+D9+lI/v5gBh05/q9bcTD/ySz3279DKEYh7q6JMIwvPq4FjBa15/dTk0NwEgHrddEF6bZXvkok8WiAYm524N+QDDeB0VyLQqtqllPlV7DJ0YFK0Wq1kaxiXlMuJeyUDAD0+rN/Lp+IHV7fd4RBxQZ9h8T0=,iv:YHmBUngbw1F+6J51CIjyZjfOGuyIbUxhUGzyatw0Xwo=,tag:7RH6E3KHq7QiyRaMiSiemg==,type:str]
55-
unencrypted_suffix: _unencrypted
56-
version: 3.11.0
29+
age:
30+
- recipient: age1z873m77wql5652lewr95323ejpvl85fchwq22xg8yd6x4kperejqg9wlph
31+
enc: |
32+
-----BEGIN AGE ENCRYPTED FILE-----
33+
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBwN2IrSlgvSnlnZ0hpVGYx
34+
UlorQmJmSUJaTTcwaHorYkFmOEo1UzZwL21rCjR3ZFZseXA0VlNxcitlQWxUUnRp
35+
Vis3WmhzUlg3eWR6cGIwc0hSTWlkaTgKLS0tIFk3TmMydmQ0QjVVWjhaWUR3MjUr
36+
aTlKcGhVN3RNMHIzamE5Y0xHcktRQ1EK3tHkkfR1+lWY2N7L5b688RLWyt94mm5u
37+
3dYDI9E6stIHaTZ8cXl8CuCNSaxSNjr/AmsHWS7JkiChvOARetQeEQ==
38+
-----END AGE ENCRYPTED FILE-----
39+
- recipient: age1gg9hr3cxa28ztx75gnaqam99l3mmp2799nsvntf5dvu0kjxf5feqqwwnqu
40+
enc: |
41+
-----BEGIN AGE ENCRYPTED FILE-----
42+
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBkeGJLaU95RnhGc0gyVTZL
43+
d3Q3UTV5TlBZNTZkNTJDZ3VyZTA2VnZHN1h3CkdVV2tvT3NXK1BObjNjMi82NmRU
44+
ZHpmZnRoWS9BTnRkVTlQYWR4K0tadkEKLS0tIFN5NENvNys2OHAxa2cyUTBWUkJh
45+
NThIdExzRnM5SGN3dnR5djNjbFNncFkKH1ESmrHflWMVTQr6336GzEqgjhV38XXB
46+
6Gc9TEncg6u8d1ACLenczotPfrjVIV1Vb5cQ0ceeeej1/6rnqcTf4g==
47+
-----END AGE ENCRYPTED FILE-----
48+
- recipient: age1ed2wgryukz5xq6t8w6nhjvldwgvw5lj2aq37n7q23et2ycqwtueqaaw4fj
49+
enc: |
50+
-----BEGIN AGE ENCRYPTED FILE-----
51+
YWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBWLzQxV1FqWUttbzhPR2gz
52+
dnB6YW9ZbWFkSEFlWjV5UUtRQWdRNWE4MUM0CnR0VVlHQ0lzWGVERERJZ1p3Z3lR
53+
OXBCaWg3VXhzUllpcDhFYitic1Y2VHMKLS0tIHduQ1owVkdNTkNCc3NJUjNFN09G
54+
REovaGpGNFZBUzluVUZJRFNhRTFXOEkKKwtSdn6tLejehnSWH4ya/+FAidwI1/zS
55+
6D1nnlIOToi2SdULI7ZQp4EbCMLjeTKh9BWXJdya1oFGSSmQlm4MIg==
56+
-----END AGE ENCRYPTED FILE-----
57+
lastmodified: "2026-04-03T20:46:38Z"
58+
mac: ENC[AES256_GCM,data:4yx+I04JSoOGw7ADAYoy/Z7FaZWlfpm54NyZAIdGboLt1Oio3NeVVr+R9WK0m6GqKRpdsfn6KPYoWrLRHZvCC+txtXBz8UPKshT0lhTveLhzhUA35aGvD+DZ2EnQ4G8TIcwM7uBGPWsmYH8A/khtsBsMUDf0OT8O2FXQrsHiHtE=,iv:UgQ0C86jZ0KQSM/C3urrCv5HNR2pkyhIXawhpF4NAj0=,tag:66aBndajIolVPu9celhw9Q==,type:str]
59+
unencrypted_suffix: _unencrypted
60+
version: 3.12.1

0 commit comments

Comments
 (0)