diff --git a/flake.lock b/flake.lock index 23c861e..9874e4a 100644 --- a/flake.lock +++ b/flake.lock @@ -126,16 +126,16 @@ ] }, "locked": { - "lastModified": 1720042825, - "narHash": "sha256-A0vrUB6x82/jvf17qPCpxaM+ulJnD8YZwH9Ci0BsAzE=", + "lastModified": 1744743431, + "narHash": "sha256-iyn/WBYDc7OtjSawbegINDe/gIkok888kQxk3aVnkgg=", "owner": "nix-community", "repo": "home-manager", - "rev": "e1391fb22e18a36f57e6999c7a9f966dc80ac073", + "rev": "c61bfe3ae692f42ce688b5865fac9e0de58e1387", "type": "github" }, "original": { "owner": "nix-community", - "ref": "release-24.05", + "ref": "release-24.11", "repo": "home-manager", "type": "github" } @@ -238,16 +238,16 @@ }, "nixpkgs": { "locked": { - "lastModified": 1725021745, - "narHash": "sha256-HAxYdsgJUDGMv4yGwPcsYSKBZV34+8GbKU+y6EM67J4=", + "lastModified": 1745186762, + "narHash": "sha256-vn1ixtFWtellgcZpdIoxCVu9agdK3647hi7lcc/58eQ=", "owner": "nixos", "repo": "nixpkgs", - "rev": "9db4f92627fe77165cf6dbb1fbad1c869db93023", + "rev": "c16961fda203155a314b0c75c13961c29e9ea7b0", "type": "github" }, "original": { "owner": "nixos", - "ref": "release-24.05", + "ref": "release-24.11", "repo": "nixpkgs", "type": "github" } diff --git a/flake.nix b/flake.nix index 765f2b4..87aca5b 100644 --- a/flake.nix +++ b/flake.nix @@ -3,14 +3,14 @@ inputs = { # Nixpkgs - nixpkgs.url = "github:nixos/nixpkgs/release-24.05"; + nixpkgs.url = "github:nixos/nixpkgs/release-24.11"; # You can access packages and modules from different nixpkgs revs # at the same time. Here's an working example: nixpkgs-unstable.url = "github:nixos/nixpkgs/nixos-unstable"; # Also see the 'unstable-packages' overlay at 'overlays/default.nix'. # Home manager - home-manager.url = "github:nix-community/home-manager/release-24.05"; + home-manager.url = "github:nix-community/home-manager/release-24.11"; home-manager.inputs.nixpkgs.follows = "nixpkgs"; # TODO: Add any other flake you might need @@ -131,6 +131,16 @@ ./hosts/go3-wsl ]; }; + StuMini-WSL = nixpkgs.lib.nixosSystem { + pkgs = pkgs; + specialArgs = { + inherit inputs outputs lib; + hostName = "StuMini-WSL"; + }; + modules = [ + ./hosts/StuMini-WSL + ]; + }; StuPC-WSL = nixpkgs.lib.nixosSystem { pkgs = pkgs; specialArgs = { @@ -160,6 +170,19 @@ inputs.sops-nix.homeManagerModules.sops ]; }; + "sstent@StuMini-WSL" = home-manager.lib.homeManagerConfiguration { + # pkgs = nixpkgs.legacyPackages.x86_64-linux; # Home-manager requires 'pkgs' instance + pkgs = pkgs; + extraSpecialArgs = { + inherit inputs outputs lib; + hostName = "StuMini-WSL"; + }; + modules = [ + # > Our main home-manager configuration file < + ./home-manager/users/sstent + inputs.sops-nix.homeManagerModules.sops + ]; + }; "sstent@StuPC-WSL" = home-manager.lib.homeManagerConfiguration { # pkgs = nixpkgs.legacyPackages.x86_64-linux; # Home-manager requires 'pkgs' instance pkgs = pkgs; diff --git a/home-manager/global.nix b/home-manager/global.nix index f857d98..cdf0cbe 100644 --- a/home-manager/global.nix +++ b/home-manager/global.nix @@ -47,7 +47,7 @@ nix = { package = lib.mkDefault pkgs.nix; settings = { - experimental-features = ["nix-command" "flakes" "repl-flake"]; + experimental-features = ["nix-command" "flakes"]; warn-dirty = false; }; }; diff --git a/home-manager/users/sstent/default.nix b/home-manager/users/sstent/default.nix index 53aaad2..96c95cc 100644 --- a/home-manager/users/sstent/default.nix +++ b/home-manager/users/sstent/default.nix @@ -44,7 +44,7 @@ pyinfra sshpass nmap - nomad_1_6 + nomad_1_9 consul terraform wget diff --git a/hosts/StuMini-WSL/default.nix b/hosts/StuMini-WSL/default.nix new file mode 100644 index 0000000..fb8aba5 --- /dev/null +++ b/hosts/StuMini-WSL/default.nix @@ -0,0 +1,24 @@ +{ + lib, + pkgs, + config, + inputs, + ... +}: { + imports = [ + ../common.nix + ../user-sstent.nix + inputs.nixos-wsl.nixosModules.wsl + ]; + + # system.stateVersion = "22.11"; + nixpkgs.hostPlatform.system = "x86_64-linux"; + networking.hostName = "StuMini-WSL"; + services.openssh.enable = true; + custom = { + mullvad.enable = true; + mnt_public.enable = false; + syncthing.enable = true; + wsl.enable = true; + }; +} diff --git a/hosts/common.nix b/hosts/common.nix index ef24c15..82d2248 100644 --- a/hosts/common.nix +++ b/hosts/common.nix @@ -56,7 +56,7 @@ virtualisation.docker.enable = true; # Enable nix flakes - nix.package = pkgs.nixFlakes; + nix.package = pkgs.nixVersions.stable; nix.extraOptions = '' experimental-features = nix-command flakes ''; diff --git a/pkgs/beets-bpmanalyser/default.nix b/pkgs/beets-bpmanalyser/default.nix index ee6cd60..e3373a1 100644 --- a/pkgs/beets-bpmanalyser/default.nix +++ b/pkgs/beets-bpmanalyser/default.nix @@ -23,7 +23,9 @@ with python3Packages; # hash = "sha256-iWXSELGRHI4ak1MTWCSdRiyPz618fyBSzKw/FeJigZ4="; hash = "sha256-oBpIDUhlAe2YgQnruXcy15WBIz3x6NTb1BnUmrNsXYc="; }; - + preBuild = '' + export HOME=$(mktemp -d) + ''; nativeBuildInputs = [ beets diff --git a/pkgs/beets-originquery/default.nix b/pkgs/beets-originquery/default.nix index 86b1e98..ef74872 100644 --- a/pkgs/beets-originquery/default.nix +++ b/pkgs/beets-originquery/default.nix @@ -15,7 +15,9 @@ with python3Packages; rev = "c353e2b68804cb4dabca0f0f177cee1137888ca4"; hash = "sha256-vNROKZgCoWtoou9B8hpJwl4Yf6TzQU0TbKJUd94v7vk="; }; - + preBuild = '' + export HOME=$(mktemp -d) + ''; nativeBuildInputs = [ beets setuptools-scm diff --git a/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/autostart_created b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/autostart_created new file mode 100644 index 0000000..bbe41b8 --- /dev/null +++ b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/autostart_created @@ -0,0 +1,24 @@ +{ + "data": "ENC[AES256_GCM,data:iFghNfqBtqI8KIjO7dVyEGoT4mIbG7zGwNIfCOAWpmRlR9eDxROMpG+wAyFTg+fn+UVK1P/+bW1UtnaD+PYJGBjA7ONXQ0hKvjAy3ESskz4siM4AisVzbOsZc1enOPzzG/MX6IEE2aHbdOTkf6rnezbojLvcUun8M8vTUK/8ievjtesW/JMY/XviuVEmBhVQZ+PTQrHLZCu+V1HLe9YFKcrPjxjvrij5Bd786xUsxB2gR7xE2BWtzaRhhbWWrgvD,iv:Ze0pdvlR4uG9PHsG/cONoVaBXnsrLjcaVJYstz/G0F0=,tag:Jno57JLI+xLH9YkqSflH8w==,type:str]", + "sops": { + "kms": null, + "gcp_kms": null, + "azure_kv": null, + "hc_vault": null, + "age": [ + { + "recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSArWTRoaWMweGxQQmYrUTlD\nNUxhZ01DNVRoVnZtdUJwd0JKZGt5K3hoRkJRCmJ6d0cwUU95czVXeGpaV3p3QjdM\nV0x5alVaTkZ3VDNyRTQvTGN4NmVpYVUKLS0tIC9JMjB2Ni9ZVGlMRmV0ZzBzQU1x\nYURXYzk4R3Z6OVZFZ05FTjgrQ3pocUEKNH6ylTZ5CYcXx18xo+nLYA3Nh2avVGMb\ncGDWzi0DXgRjd/xf8kOi0koKKDvXHsK5TRc5VSvExdtpN4zDyoxowQ==\n-----END AGE ENCRYPTED FILE-----\n" + }, + { + "recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB4YUxrbWtMNHA1cVk3R2ly\nZ2xELytwL3AxT0ZQQXdQVmRNWHRIc3pZbUNNCjFPTlUrQ0owa2VvTGkyeW04d1lo\ndWdnM0UwUzZjSTlvajV6Zk1la1pVdUkKLS0tIDRERDA1bXNkcjRycjRyMllwVmw2\nQlpsVHphelpadEQ1ckEzeGJ5L0owRXcKUpEC1LVcZ/w3wTz40sRzIcAd3Jsn67w1\nqos5t1iNJJkOJ23pCWzjfCR6ijRNb6n17X1ditjcgWptT2CSVzJ+kg==\n-----END AGE ENCRYPTED FILE-----\n" + } + ], + "lastmodified": "2023-02-27T15:57:55Z", + "mac": "ENC[AES256_GCM,data:ggxj/gEcMA+F+NXq0h4W+TTVKvD3JKvyxqxBfjlpelFBSn9dmIrhhiu6uHbdIds9tMTqaJds8Cfd3fVOYuS55IsVFA+iWWMN8DaEnylltri2tqaOLTPu42JWLQABIC1L3Il72s1gY2fpqcSdJfBv4CFIcIGg42cEZ3/pFjIiCYA=,iv:GBOIzLfACQI5oBuUnO+q1yOL0cCZxCKCFhqorFP46NM=,tag:LfM8M9eedNlU/yaI1II/kA==,type:str]", + "pgp": null, + "unencrypted_suffix": "_unencrypted", + "version": "3.7.3" + } +} \ No newline at end of file diff --git a/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/config.json b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/config.json new file mode 100644 index 0000000..39f4f7c --- /dev/null +++ b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/config.json @@ -0,0 +1,24 @@ +{ + "data": "ENC[AES256_GCM,data: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,iv:OWrOxVOKctgNJZObjQnfTzP5c6YSAOF8UlbIQHZEYvE=,tag:VfMjS5U02FuDaMpxJ/vOBg==,type:str]", + "sops": { + "kms": null, + "gcp_kms": null, + "azure_kv": null, + "hc_vault": null, + "age": [ + { + "recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB1dUlIUFpNWVlxOWZ3SjJt\nWnBHR0hJdlFBaHpaY1habEdKa3JXYmRJM1E4CitJbjc2QWNVNWlCOEliazIzQ2x3\nbzFLK1p2MGY4Tnhwd21yMDFLTHdHazgKLS0tIDBMVnRQRDIwd3JpYWM1emwyY3hv\nQ0FvRVlpbVRlSUhUUXFIbExSaGd2VU0KmO1zpvpVXtR5aTeWXMYE+8AXodNdoNHJ\nZJq9V2AXj9mxnXK7+4nWfypWmmzbiLqS1Gg3HbbKN+OU2wwTcCbVtg==\n-----END AGE ENCRYPTED FILE-----\n" + }, + { + "recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB5d05Rd1AxR0xnbzY2am9p\ndHdLdEk1UGdoeUd1ckt3SC9nOWxaSjB5em5zCmp0eG43NStBaEJ1bHlKVmdpc21R\neHFXVVlqSkV3RzNsZ2JGQ1pwbzZrQ2sKLS0tIEMyeGk3bHhYVzNpZnpKQW55b0dl\nM09GM3NCZ0xHUGxDanpIT25FcXFQbHMK1IOppUN2dJ3qfgN+2Z4M9ug1WPTSHXaw\ntkvABiUxqS0mO1IxWvpSbGokmxKnqeO7em2PAnXvIGfuUJmsn0AiVA==\n-----END AGE ENCRYPTED FILE-----\n" + } + ], + "lastmodified": "2023-02-27T15:57:55Z", + "mac": "ENC[AES256_GCM,data:CgL4kPkWzmgbxULhTBMrY3OIoHisifAbt4mvKHKXbrEoX5JIjkk2mBo0yYeNxoWuX2qG0jrftVnvNWjtK5pvPBAFyAXSjmhZpSVDZRkFeuXAi1tskjFPqjfwAKkBT6UEcjVmVg4B8E5qpRfNOnTpfmy5hmo/8oHSqTRPsFs72D0=,iv:cL7P9QddbUppi2sUDfzfBzRed6YrcnfwQQdet727yTI=,tag:h9S/9OMMxAhkDTsPUpGl9w==,type:str]", + "pgp": null, + "unencrypted_suffix": "_unencrypted", + "version": "3.7.3" + } +} \ No newline at end of file diff --git a/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/device_clone.json b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/device_clone.json new file mode 100644 index 0000000..c25f0c0 --- /dev/null +++ b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/device_clone.json @@ -0,0 +1,24 @@ +{ + "data": "ENC[AES256_GCM,data:9xA2/Lp2bQj3GO3xGhJ7PtLUpaFpVwAHU4aIhMgKP6BL/pi8muDZf12o0Uh4JfMMAMvOClnA6w1LFI9bXTek81KQ9f9kHEefm3+YO8dXe2DH/q3yuXp1KtlRbPRhaa6oM5G937Ba81eNKn/rT9uo15VTBqRSH8cGfm375YcF7xCI9/RYCpAND2m9V/ksvta3NymHZv+GmJAAEoH+b9EzSeBdSek95GZTlUJ6G9Dkv4DszH8ohIxXONQEWr55bVOfNygIRaW4STj3n9wHkQ+Hjv7NAlA/li3X8UJUilkvF0+LItNZ6alr8OuqI6BRx7c4y8IH+wanpgYngEUU8XO4+KTLprfvzxmriepQlJcLWLf8VXp9bcctJNNwBzzjL4u6,iv:XElDXD7j1SsDcXty4nRovKLHF6+CCrZrJDvoroPTCUc=,tag:Bdp+Qown2TQ5jMivx+WsqQ==,type:str]", + "sops": { + "kms": null, + "gcp_kms": null, + "azure_kv": null, + "hc_vault": null, + "age": [ + { + "recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA3WE4zVjRFaHdFekpYUW1j\nS0lXZ0laOEZCdE94RVdoZmNCTDdRREdyaWpNCk9ESVRCb0NtNXNESzNmdjJaZzlM\nNFYrUUoxRkpEQnVMVnFPVE56bnYxS3MKLS0tIGd6Z1prRzRJdjFxMW9uMlEvMHlT\nVVBvalVKQm5QSGRNT0Y5d0NLR1Fudk0KRj/RLh8lKHITUdKDjA5aw3gDrajUJ6t6\n78vNJLAkusskJA/SdZumU3zpMiIfsZLF3/CKYrlhz0ReVn9ZgpxGVA==\n-----END AGE ENCRYPTED FILE-----\n" + }, + { + "recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBzRVl0V2xoT3Ryb0NrSVE4\nNXdSRWU3MGFpekQwdzgzREZaM0FOV0VzL0E4CjlzaC9GWWtSNWU5WDBVWnZRVHdu\ncnRrSENvOFBOdnFTbytnVW9YYXc2eE0KLS0tIGgwbWJhY0s3cWNjT3VSZFpKcld3\nWWZKRFY4cjN6aGw3dmpzT1cxOVFtOUUKF8/NzyNGt2oZrh/0Ar8Yk8LDQxdqCFQv\n7Ue5rPuc0gB0Y3/XE0nPFWajDF4lSfYOVbqWGazsGT172zWUYpfE6w==\n-----END AGE ENCRYPTED FILE-----\n" + } + ], + "lastmodified": "2023-02-27T15:57:56Z", + "mac": "ENC[AES256_GCM,data:3FCeSi6RIuMbtiYbZSfNRQOzqlwEYQrg9ujhAuJ0mSccUJXhSuaH22nLte6NdTEAQ5lO9REkVD63X4C/z2uEGUHTeWLnB9nZEt2hrm/InoW/8ewjR3L1+u04O1D3s0uNfKnZB3nkfDpafhxsVDXr4+jhbILNwxv4tlWKYKDz5e4=,iv:GZfW1ewGDjN2GRWjxCyJV2MLNNrbnUjkPLdudgGJ2jo=,tag:7New0lrINNLdnWBVmdm/aw==,type:str]", + "pgp": null, + "unencrypted_suffix": "_unencrypted", + "version": "3.7.3" + } +} \ No newline at end of file diff --git a/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/gui_config.json b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/gui_config.json new file mode 100644 index 0000000..904ce8f --- /dev/null +++ b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/gui_config.json @@ -0,0 +1,24 @@ +{ + "data": "ENC[AES256_GCM,data:hlWdQpbMhFn9TnZdUqQSSTzeTQ==,iv:+r1KNvTDkvZfC+GkwMjvabITypmByR1aNEtNGt6vKwQ=,tag:J+XX/FOxLwSZoUpoXm4vdQ==,type:str]", + "sops": { + "kms": null, + "gcp_kms": null, + "azure_kv": null, + "hc_vault": null, + "age": [ + { + "recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPYnV5cUptTG1aS1JnTUxY\nTDJ3NHhleHFUaEtsS29oNEJSNzRWNlA0NWtFCjhkU29ZOVZlQU4vSDZqdWE5NXB0\nSDkwS1lQbUpQR0kvOUlpYm9pRVRJRTAKLS0tIGtTK0VTSkpYUE5vSFU3OW1Qb0NO\nbWJlS2dsaUNzdjZkUVA4YTJaRHc3b2MKA8lqe2iiV0DSLC/nCMzFsjaLy6/JWJ9A\n0M0+oqeerddGUDXv3BRIul39kXrujw1eBH4byzin8dzYQg2xJjcbPg==\n-----END AGE ENCRYPTED FILE-----\n" + }, + { + "recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBQMWM0MVdCNWt6V3RnRXA4\nY3cxQ0pQejU3UGo0ZCtycGIxQU5SVGFSUUFNCnplRkpzZzFQb0Y3VFFGdmJ0VkVR\nQUFodjNoY0svVitjS2dCRkdkMExDOU0KLS0tIElIK3M1QlpBYlBLN0x0MkdEUS9B\nVndMenI0UzUreXBqbytKUXMwS2dxQWMKczqqun9FIWmR/rc/USGnl5PGq2IB9yzX\nJUfF34sNWkiKwScHD6ZUKB0ZJ8PuaIlrQQWPZKDY6nkoQUHc3a7vlA==\n-----END AGE ENCRYPTED FILE-----\n" + } + ], + "lastmodified": "2023-02-27T15:57:56Z", + "mac": "ENC[AES256_GCM,data:VsbrnRM4qQhwNg+NcmB6p11vkxxwkXo4OSmT+/OR3qjeAseMXnFv5axC/85XVkLuL6u5RJb7lV5h8eH0YSHy7OkZoVfia2D6UBBxvDbrKQ2OhrSG4NFK4pyaHa40p/9ma/kexkxbEFAqyO3RPC5Fmeu6wlBWeZB3lit3PTov4zM=,iv:r0rgG4J0NudfGC/97imvUsybUPKzRr1nbmuH5XSulVo=,tag:sr6YOFw/Fg6MLE73wFhpnA==,type:str]", + "pgp": null, + "unencrypted_suffix": "_unencrypted", + "version": "3.7.3" + } +} \ No newline at end of file diff --git a/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/secretkeys.sstent.mpack b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/secretkeys.sstent.mpack new file mode 100644 index 0000000..86e1a22 --- /dev/null +++ b/secrets/user_dotfiles/sstent@StuMini-WSL/keybase/secretkeys.sstent.mpack @@ -0,0 +1,24 @@ +{ + "data": "ENC[AES256_GCM,data:W6WiHez2OPlcvWcz9SIAwNhsx+aLGK935xfoxubvfzcRE8HW/wyBrHzmLslxRF36z5A4KhOF5L8Q3SQQetcfHxc71CClViTrT86Iwo7yiBNWSHkctnSMqjIdsPdW4lda9jmSy8KK4gEdGES/Tqe6GsGe4H5OPvr8lQrtxkKqatOhMKvhcCrytpdYGWhRH/wiMSkF02kI2J8nu0et0lNAENK2SHlgGCLiOzfso/ROUlCR0LhRo0KbFH66qa1ogUr8kQcol+9xn2zvxrzqyqOYJ8xmwvHvchbTfRP50SE81lju7e4VOIIVUJAeqa1JWpQWAzGVTmpHw67FKgQ7HgsSRS+dtNyPgyIqnCGcq23vhGLehCrypofV6ebsaJeWYqFYQ30lPU2tYUpqm3QuolIP78jZZEfQIHEyDp0ao1/+QzMKJn4zGsaWeFsn6cWQ238U6zgE3naKI/RfCa7tfgnSI5zvU1KHGcQI/c4dn3CIdCUaRelQ9UKQT2SoVXT4yAY/49l/4OpBMAHTAt97VEteqJcBrHmNa/EbzoXMjY69emsjiWv9EULod2lTZG3su6VB+WHv8ai0KYCEIEeQSy33d6yN8jTiCaje6RLVTzhsHjR1FxDDhc6KLa+RXzgtLVKWsoZqaZQkXAqRS8Tg3MEWieQm05SY6/uoabhRvu0VuMiwuI1abhjS5kV4eQKEVjcnYXATYUjoZ0mlYfQgB5Z2k3H5o6G0ubNJJiQjPknsVQZXMLXNNN3g3feYKMllv7CtrUlvo0K1snytPvg6EpBm/ou7/5kUsz//TinVgjW27tWzQCtbAc9hFCO+zdvmPyh+ug6U2BojEGRh7nIIo9vhp7SjUlMr/TIEoLRxp7ANnxDZPtmR5Dhw+nlhF9EqwQq/FaV8MVSyFzkAmfC8jz3lKiOXeuI=,iv:6il86bZc6AxZnVdHJZSxK42mSZQeh8n5PtIOVMQQMhU=,tag:piFQXfn0nnLkYXjE6gC1Pw==,type:str]", + "sops": { + "kms": null, + "gcp_kms": null, + "azure_kv": null, + "hc_vault": null, + "age": [ + { + "recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAyUDlmTFhheVI5NExvMmxN\nMzYxTWZLRUVxQmRiZCt2dVovdXpYODFQSmlVCjh1REUrSlJ0SWtjcSthWjlGbGZz\nT0tGZklMdW10bnhDSVJJUUVHaGxsWGsKLS0tIHVlQ1dwOW00RjVqbVpiN0lHbXRj\ndUZOTGRxcTIrL2NGeFRuMDVzNXlBeUUKpirT/JkHtIgxni5xG2bKPhr0Cg7qVfy1\n17cGOuh26SfTOAPNebkawj0XPrUnMVwUqnto9JHtALM819Y8fvPtpQ==\n-----END AGE ENCRYPTED FILE-----\n" + }, + { + "recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj", + "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB2ZXNOcG1wL3hML0I2U3dO\nQ251UHhjaFF6NW5sZXpya1FiS0s4VmVYNGdFCnFJODQzcmxiNG80cGU5ZTR1SG9w\nOUkvSzZZb3JhR2pUN3V0VDdWMDRjeFkKLS0tIEdoTXlUOHdzSjF5aDFBVk5zTG1D\nODNhWm9sUENBMXY2OWhFQ1poVHpDNDgKsOsHBFc0J37Ejn7IccIcN8NgegTF/m8Z\nRXXdVQNXY4K+Ckqp4CnXHgHzhEdYvICxf/xJThARvSCm7i1mtsrM7Q==\n-----END AGE ENCRYPTED FILE-----\n" + } + ], + "lastmodified": "2023-02-27T15:57:56Z", + "mac": "ENC[AES256_GCM,data:I3T6Fi3h6CjkApaQBTjPAlEbz32murgjhtoI6KriazLRcXXNqwrc0BIDCWsNHlRO0vCP+W7s5Ll7A1aafC+njI5n6FE6rC1v6dEyoPT6s53iMX8qD85ztLtaUwrU02cgXhJrwekNFSGWBWh5cE7r7tMeja6okc4XijTw/OxgvJs=,iv:O0t4jkUEH9YyBcClfqfs19skYB7cVIK4AkxZEAyWaBE=,tag:jB2M+gqdvH7TdKiu2qFXAA==,type:str]", + "pgp": null, + "unencrypted_suffix": "_unencrypted", + "version": "3.7.3" + } +} \ No newline at end of file