mirror of
https://github.com/sstent/vmimages.git
synced 2025-12-06 06:01:51 +00:00
sync
This commit is contained in:
5
README.md
Normal file
5
README.md
Normal file
@@ -0,0 +1,5 @@
|
||||
|
||||
|
||||
|
||||
|
||||
for file in secrets/user_dotfiles/sstent@StuPC/keybase/*; do sops -e --input-type binary -i $file; done
|
||||
33
flake.nix
33
flake.nix
@@ -28,7 +28,14 @@
|
||||
vscode-server.url = "github:msteen/nixos-vscode-server";
|
||||
|
||||
# homeage = {url = "github:jordanisaacs/homeage"; inputs.nixpkgs.follows = "nixpkgs";};
|
||||
|
||||
# Nix Library Functions
|
||||
# library = {
|
||||
# type = "github";
|
||||
# owner = "nix-community";
|
||||
# repo = "nixpkgs.lib";
|
||||
# ref = "master";
|
||||
# rev = "af5239f892ae6e1c8bb560b11ed874cebbd10696";
|
||||
# };
|
||||
|
||||
};
|
||||
|
||||
@@ -44,23 +51,31 @@
|
||||
overlays = import ./overlays { inherit inputs; };
|
||||
nixosModules = import ./modules/nixos;
|
||||
homeManagerModules = import ./modules/home-manager;
|
||||
# util = import ./lib/map.nix;
|
||||
|
||||
# NixOS configuration entrypoint
|
||||
# Available through 'nixos-rebuild --flake .#your-hostname'
|
||||
nixosConfigurations = {
|
||||
nixos = nixpkgs.lib.nixosSystem {
|
||||
Go3 = nixpkgs.lib.nixosSystem {
|
||||
specialArgs = { inherit inputs outputs; };
|
||||
modules = [
|
||||
./hosts/wsl2
|
||||
./hosts/WSL/Go3
|
||||
];
|
||||
};
|
||||
StuPC = nixpkgs.lib.nixosSystem {
|
||||
specialArgs = { inherit inputs outputs; };
|
||||
modules = [
|
||||
./hosts/WSL/StuPC
|
||||
];
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
# Standalone home-manager configuration entrypoint
|
||||
# Available through 'home-manager --flake .#your-username@your-hostname'
|
||||
homeConfigurations = {
|
||||
# FIXME replace with your username@hostname
|
||||
"sstent@nixos" = home-manager.lib.homeManagerConfiguration {
|
||||
"sstent@Go3" = home-manager.lib.homeManagerConfiguration {
|
||||
pkgs = nixpkgs.legacyPackages.x86_64-linux; # Home-manager requires 'pkgs' instance
|
||||
extraSpecialArgs = { inherit inputs outputs; };
|
||||
modules = [
|
||||
@@ -69,6 +84,16 @@
|
||||
inputs.sops-nix.homeManagerModules.sops
|
||||
];
|
||||
};
|
||||
"sstent@StuPC" = home-manager.lib.homeManagerConfiguration {
|
||||
pkgs = nixpkgs.legacyPackages.x86_64-linux; # Home-manager requires 'pkgs' instance
|
||||
extraSpecialArgs = { inherit inputs outputs; hostName = "StuPC";};
|
||||
modules = [
|
||||
# > Our main home-manager configuration file <
|
||||
./home-manager/users/sstent
|
||||
inputs.sops-nix.homeManagerModules.sops
|
||||
];
|
||||
};
|
||||
};
|
||||
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,39 +0,0 @@
|
||||
|
||||
[projects/ansible-home]
|
||||
name = ansible-home
|
||||
checkout = git clone 'keybase://private/sstent/ansible-home' 'ansible-home'
|
||||
fixups =
|
||||
if ! git config remote.keybase.url > /dev/null; then
|
||||
echo "NO KeyBase"…
|
||||
fi
|
||||
|
||||
[projects/nomad]
|
||||
name = nomad
|
||||
checkout = git clone 'keybase://private/sstent/nomad' 'nomad'
|
||||
|
||||
|
||||
[projects/containers]
|
||||
name = containers
|
||||
checkout = git clone 'git@github.com:sstent/containers.git' "$MR_REPO"
|
||||
post_checkout = cd "$MR_REPO" && git remote add keybase keybase://private/sstent/containers
|
||||
fixups =
|
||||
if ! git config remote.keybase.url > /dev/null; then
|
||||
echo "No KeyBase"
|
||||
fi
|
||||
|
||||
|
||||
[.config/nixpkgs]
|
||||
name = nixpkgs
|
||||
checkout = git clone 'git@github.com:sstent/nixpkgs.git' 'nixpkgs'
|
||||
fixups =
|
||||
if ! git config remote.keybase.url > /dev/null; then
|
||||
echo "No KeyBase"
|
||||
git remote add keybase keybase://private/sstent/nixpkgs
|
||||
fi
|
||||
|
||||
[projects/gocast]
|
||||
name = gocast
|
||||
checkout = git clone 'git@github.com:sstent/gocast.git' 'gocast'
|
||||
|
||||
[projects/code]
|
||||
checkout = git clone 'keybase://private/sstent/code' 'code'
|
||||
@@ -1,245 +0,0 @@
|
||||
[server]
|
||||
login = shapechecker
|
||||
passw = 6EbCdhRR7yUdN5ImeY9S
|
||||
server = ('server.slsknet.org', 2242)
|
||||
interface =
|
||||
ctcpmsgs = False
|
||||
autosearch = []
|
||||
autoreply =
|
||||
portrange = (2234, 2239)
|
||||
upnp = True
|
||||
upnp_interval = 4
|
||||
auto_connect_startup = True
|
||||
userlist = []
|
||||
banlist = []
|
||||
ignorelist = []
|
||||
ipignorelist = {}
|
||||
ipblocklist = {}
|
||||
autojoin = ['nicotine']
|
||||
autoaway = 15
|
||||
away = False
|
||||
private_chatrooms = False
|
||||
command_aliases = {}
|
||||
|
||||
[transfers]
|
||||
incompletedir = /home/sstent/.local/share/nicotine/incomplete
|
||||
downloaddir = /home/sstent/.local/share/nicotine/downloads
|
||||
uploaddir = /home/sstent/.local/share/nicotine/received
|
||||
usernamesubfolders = False
|
||||
shared = []
|
||||
buddyshared = []
|
||||
uploadbandwidth = 50
|
||||
uselimit = False
|
||||
usealtlimits = False
|
||||
uploadlimit = 1000
|
||||
uploadlimitalt = 100
|
||||
downloadlimit = 0
|
||||
downloadlimitalt = 100
|
||||
preferfriends = False
|
||||
useupslots = False
|
||||
uploadslots = 2
|
||||
afterfinish =
|
||||
afterfolder =
|
||||
lock = True
|
||||
reverseorder = False
|
||||
fifoqueue = False
|
||||
usecustomban = False
|
||||
limitby = True
|
||||
customban = Banned, don't bother retrying
|
||||
usecustomgeoblock = False
|
||||
customgeoblock = Sorry, your country is blocked
|
||||
queuelimit = 10000
|
||||
filelimit = 100
|
||||
buddysharestrustedonly = False
|
||||
friendsnolimits = False
|
||||
groupdownloads = folder_grouping
|
||||
groupuploads = folder_grouping
|
||||
geoblock = False
|
||||
geoblockcc = ['']
|
||||
remotedownloads = True
|
||||
uploadallowed = 2
|
||||
autoclear_downloads = False
|
||||
autoclear_uploads = False
|
||||
uploadsinsubdirs = True
|
||||
rescanonstartup = True
|
||||
enablefilters = False
|
||||
downloadregexp = (\\(.*\.url|albumart(_{........-....-....-....-............}_)?(_?(large|small))?\.jpg|desktop\.ini|folder\.jpg|thumbs\.db)$)
|
||||
downloadfilters = [['desktop.ini', 1], ['folder.jpg', 1], ['*.url', 1], ['thumbs.db', 1], ['albumart(_{........-....-....-....-............}_)?(_?(large|small))?\\.jpg', 0]]
|
||||
download_doubleclick = 2
|
||||
upload_doubleclick = 2
|
||||
downloadsexpanded = True
|
||||
uploadsexpanded = True
|
||||
|
||||
[userinfo]
|
||||
descr = ''
|
||||
pic =
|
||||
|
||||
[userbrowse]
|
||||
expand_folders = True
|
||||
|
||||
[words]
|
||||
censored = []
|
||||
autoreplaced = {'teh ': 'the ', 'taht ': 'that ', 'tihng': 'thing', 'youre': "you're", 'jsut': 'just', 'thier': 'their', 'tihs': 'this'}
|
||||
censorfill = *
|
||||
censorwords = False
|
||||
replacewords = False
|
||||
tab = True
|
||||
cycle = False
|
||||
dropdown = False
|
||||
characters = 3
|
||||
roomnames = False
|
||||
buddies = True
|
||||
roomusers = True
|
||||
commands = True
|
||||
aliases = True
|
||||
onematch = False
|
||||
|
||||
[logging]
|
||||
debug = False
|
||||
debugmodes = []
|
||||
debuglogsdir = /home/sstent/.local/share/nicotine/logs/debug
|
||||
logcollapsed = True
|
||||
transferslogsdir = /home/sstent/.local/share/nicotine/logs/transfers
|
||||
rooms_timestamp = %H:%M:%S
|
||||
private_timestamp = %Y-%m-%d %H:%M:%S
|
||||
log_timestamp = %Y-%m-%d %H:%M:%S
|
||||
privatechat = True
|
||||
chatrooms = True
|
||||
transfers = False
|
||||
debug_file_output = False
|
||||
roomlogsdir = /home/sstent/.local/share/nicotine/logs/rooms
|
||||
privatelogsdir = /home/sstent/.local/share/nicotine/logs/private
|
||||
readroomlogs = True
|
||||
readroomlines = 15
|
||||
readprivatelines = 15
|
||||
rooms = ['nicotine']
|
||||
|
||||
[privatechat]
|
||||
store = True
|
||||
users = []
|
||||
|
||||
[columns]
|
||||
file_search = {}
|
||||
download = {}
|
||||
upload = {}
|
||||
user_browse = {}
|
||||
buddy_list = {}
|
||||
chat_room = {'nicotine': {}}
|
||||
|
||||
[searches]
|
||||
expand_searches = True
|
||||
group_searches = folder_grouping
|
||||
maxresults = 150
|
||||
enable_history = True
|
||||
history = []
|
||||
enablefilters = False
|
||||
filters_visible = False
|
||||
defilter = ['', '', '', '', False, '', '']
|
||||
filtercc = []
|
||||
filterin = []
|
||||
filterout = []
|
||||
filtersize = []
|
||||
filterbr = []
|
||||
filtertype = []
|
||||
search_results = True
|
||||
max_displayed_results = 1500
|
||||
min_search_chars = 3
|
||||
remove_special_chars = True
|
||||
private_search_results = True
|
||||
|
||||
[ui]
|
||||
dark_mode = False
|
||||
header_bar = True
|
||||
icontheme =
|
||||
chatme = #908e8b
|
||||
chatremote =
|
||||
chatlocal =
|
||||
chathilite = #5288ce
|
||||
urlcolor = #5288ce
|
||||
useronline = #16bb5c
|
||||
useraway = #c9ae13
|
||||
useroffline = #e04f5e
|
||||
usernamehotspots = True
|
||||
usernamestyle = bold
|
||||
textbg =
|
||||
search =
|
||||
searchq = GREY
|
||||
inputcolor =
|
||||
spellcheck = True
|
||||
exitdialog = 1
|
||||
tab_default =
|
||||
tab_hilite = #497ec2
|
||||
tab_changed = #497ec2
|
||||
tab_select_previous = True
|
||||
tabmain = Top
|
||||
tabrooms = Top
|
||||
tabprivate = Top
|
||||
tabinfo = Top
|
||||
tabbrowse = Top
|
||||
tabsearch = Top
|
||||
tab_status_icons = True
|
||||
globalfont = Normal
|
||||
chatfont = Normal
|
||||
tabclosers = True
|
||||
searchfont = Normal
|
||||
listfont = Normal
|
||||
browserfont = Normal
|
||||
transfersfont = Normal
|
||||
last_tab_id =
|
||||
modes_visible = {'search': True, 'downloads': True, 'uploads': True, 'userbrowse': True, 'userinfo': True, 'private': True, 'userlist': True, 'chatrooms': True, 'interests': True}
|
||||
modes_order = ['search', 'downloads', 'uploads', 'userbrowse', 'userinfo', 'private', 'userlist', 'chatrooms', 'interests']
|
||||
buddylistinchatrooms = tab
|
||||
trayicon = True
|
||||
startup_hidden = False
|
||||
filemanager =
|
||||
speechenabled = False
|
||||
speechprivate = User %(user)s told you: %(message)s
|
||||
speechrooms = In room %(room)s, user %(user)s said: %(message)s
|
||||
speechcommand = flite -t $
|
||||
width = 800
|
||||
height = 600
|
||||
xposition = -1
|
||||
yposition = -1
|
||||
maximized = True
|
||||
urgencyhint = True
|
||||
file_path_tooltips = True
|
||||
reverse_file_paths = True
|
||||
|
||||
[private_rooms]
|
||||
rooms = {}
|
||||
|
||||
[urls]
|
||||
protocols = {}
|
||||
|
||||
[interests]
|
||||
likes = []
|
||||
dislikes = []
|
||||
|
||||
[players]
|
||||
default =
|
||||
npothercommand =
|
||||
npplayer = mpris
|
||||
npformatlist = []
|
||||
npformat =
|
||||
|
||||
[notifications]
|
||||
notification_window_title = True
|
||||
notification_tab_colors = False
|
||||
notification_popup_sound = False
|
||||
notification_popup_file = True
|
||||
notification_popup_folder = True
|
||||
notification_popup_private_message = True
|
||||
notification_popup_chatroom = False
|
||||
notification_popup_chatroom_mention = True
|
||||
|
||||
[plugins]
|
||||
enable = True
|
||||
enabled = []
|
||||
|
||||
[statistics]
|
||||
started_downloads = 0
|
||||
completed_downloads = 0
|
||||
downloaded_size = 0
|
||||
started_uploads = 0
|
||||
completed_uploads = 0
|
||||
uploaded_size = 0
|
||||
@@ -3,6 +3,7 @@
|
||||
|
||||
imports = [
|
||||
./beets.nix
|
||||
./keybase.nix
|
||||
"${inputs.vscode-server}/modules/vscode-server/home.nix"
|
||||
] ++ (builtins.attrValues outputs.homeManagerModules);
|
||||
|
||||
|
||||
77
home-manager/global/keybase.nix
Normal file
77
home-manager/global/keybase.nix
Normal file
@@ -0,0 +1,77 @@
|
||||
{ config, pkgs, inputs, lib, hostName, util, ... }:
|
||||
with lib;
|
||||
|
||||
let
|
||||
# inherit
|
||||
# (builtins)
|
||||
# attrNames
|
||||
# attrValues
|
||||
# foldl'
|
||||
# isPath
|
||||
# pathExists
|
||||
# readDir
|
||||
# toString
|
||||
# ;
|
||||
|
||||
# inherit
|
||||
# (lib)
|
||||
# flatten
|
||||
# filterAttrs
|
||||
# forEach
|
||||
# getAttrFromPath
|
||||
# hasPrefix
|
||||
# hasSuffix
|
||||
# id
|
||||
# mapAttrs'
|
||||
# mapAttrsToList
|
||||
# mkIf
|
||||
# nameValuePair
|
||||
# removeSuffix
|
||||
# ;
|
||||
cfg = config.custom.keybase;
|
||||
username = config.home.username;
|
||||
secretstore = config._secretstore;
|
||||
util = import "${inputs.self}/lib";
|
||||
|
||||
# # 'sops' Encrypted Secrets
|
||||
# hm_secrets = dir: out_dir:
|
||||
# filter (name: type: type != null && !(hasPrefix "_" name)) (name: type:
|
||||
# if type == "regular"
|
||||
# then
|
||||
# nameValuePair name {
|
||||
# sopsFile = dir + "/${name}";
|
||||
# format = "binary";
|
||||
# path = out_dir + "/${name}";
|
||||
|
||||
# }
|
||||
# else nameValuePair "" null) (readDir dir);
|
||||
|
||||
# filter = name: func: attrs: filterAttrs name (mapAttrs' func attrs);
|
||||
|
||||
|
||||
in {
|
||||
# imports = [
|
||||
# "${inputs.self}/libs/map.nix"
|
||||
# ];
|
||||
|
||||
options.custom.keybase = {
|
||||
enable = mkOption {
|
||||
type = types.bool;
|
||||
default = false;
|
||||
description = "Enable KeyBase";
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
services.keybase.enable = true;
|
||||
services.kbfs.enable = true;
|
||||
systemd.user.services.keybase.Unit.After = [ "sops-nix.service" ];
|
||||
systemd.user.services.kbfs.Unit.After = [ "sops-nix.service" ];
|
||||
|
||||
sops = {
|
||||
secrets = util.map.hm_secrets "${secretstore}/user_dotfiles/${username}@${hostName}/keybase/" "${config.xdg.configHome}/keybase/";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
||||
@@ -1,9 +1,10 @@
|
||||
# This is your home-manager configuration file
|
||||
# Use this to configure your home environment (it replaces ~/.config/nixpkgs/home.nix)
|
||||
|
||||
{ inputs, outputs, lib, config, pkgs, ... }:
|
||||
# let getEnv_name = builtins.getEnv name;
|
||||
|
||||
{ inputs, outputs, lib, config, pkgs, hostName, ... }:
|
||||
# let
|
||||
# getEnv_name = builtins.getEnv "name";
|
||||
# hostname = builtins.getEnv "hostname";
|
||||
# in
|
||||
{
|
||||
imports = [
|
||||
@@ -53,16 +54,17 @@
|
||||
# qemu_kvm
|
||||
# nixos-generators
|
||||
nixfmt
|
||||
nixpkgs-fmt
|
||||
# deploy-rs
|
||||
];
|
||||
|
||||
custom = {
|
||||
ssh-proxy.enable = true;
|
||||
beets.enable = true;
|
||||
keybase.enable = true;
|
||||
|
||||
|
||||
};
|
||||
services.keybase.enable = true;
|
||||
services.kbfs.enable = true;
|
||||
|
||||
# home.file.".mrconfig".source = config.lib.file.mkOutOfStoreSymlink "${config._secrets}/mrconfig";
|
||||
programs = {
|
||||
|
||||
@@ -1,14 +1,15 @@
|
||||
{ lib, pkgs, config, inputs, ... }: {
|
||||
|
||||
imports = [
|
||||
../common
|
||||
../common/mnt-public.nix
|
||||
../common/user-sstent.nix
|
||||
../../common
|
||||
../../common/mnt-public.nix
|
||||
../../common/user-sstent.nix
|
||||
inputs.nixos-wsl.nixosModules.wsl
|
||||
];
|
||||
|
||||
# system.stateVersion = "22.11";
|
||||
nixpkgs.hostPlatform.system = "x86_64-linux";
|
||||
networking.hostName = "Go3";
|
||||
|
||||
wsl = {
|
||||
enable = true;
|
||||
51
hosts/WSL/StuPC/default.nix
Normal file
51
hosts/WSL/StuPC/default.nix
Normal file
@@ -0,0 +1,51 @@
|
||||
{ lib, pkgs, config, inputs, ... }: {
|
||||
|
||||
imports = [
|
||||
../../common
|
||||
../../common/mnt-public.nix
|
||||
../../common/user-sstent.nix
|
||||
inputs.nixos-wsl.nixosModules.wsl
|
||||
];
|
||||
|
||||
# system.stateVersion = "22.11";
|
||||
nixpkgs.hostPlatform.system = "x86_64-linux";
|
||||
networking.hostName = "StuPC";
|
||||
|
||||
wsl = {
|
||||
enable = true;
|
||||
wslConf.automount.root = "/mnt";
|
||||
defaultUser = "sstent";
|
||||
startMenuLaunchers = true;
|
||||
interop.preserveArgvZero = true;
|
||||
nativeSystemd = true;
|
||||
# Enable native Docker support
|
||||
docker-native.enable = true;
|
||||
# Enable integration with Docker Desktop (needs to be installed)
|
||||
# docker-desktop.enable = true;
|
||||
};
|
||||
|
||||
systemd.services.nixs-wsl-systemd-fix = {
|
||||
description = "Fix the /dev/shm symlink to be a mount";
|
||||
unitConfig = {
|
||||
DefaultDependencies = "no";
|
||||
Before = [
|
||||
"sysinit.target"
|
||||
"systemd-tmpfiles-setup-dev.service"
|
||||
"systemd-tmpfiles-setup.service"
|
||||
"systemd-sysctl.service"
|
||||
];
|
||||
ConditionPathExists = "/dev/shm";
|
||||
ConditionPathIsSymbolicLink = "/dev/shm";
|
||||
ConditionPathIsMountPoint = "/run/shm";
|
||||
};
|
||||
serviceConfig = {
|
||||
Type = "oneshot";
|
||||
ExecStart = [
|
||||
"${pkgs.coreutils-full}/bin/rm /dev/shm"
|
||||
"/run/wrappers/bin/mount --bind -o X-mount.mkdir /run/shm /dev/shm"
|
||||
];
|
||||
};
|
||||
wantedBy = [ "sysinit.target" ];
|
||||
};
|
||||
|
||||
}
|
||||
11
lib/default.nix
Normal file
11
lib/default.nix
Normal file
@@ -0,0 +1,11 @@
|
||||
{
|
||||
self,
|
||||
platforms,
|
||||
lib,
|
||||
} @ args:
|
||||
with {inherit (lib) makeExtensible attrValues foldr;};
|
||||
(makeExtensible (final:
|
||||
with final;
|
||||
(import ./map.nix args).modules ./. (file: import file args)))
|
||||
.extend
|
||||
(final: prev: foldr (x: y: x // y) {} (attrValues prev))
|
||||
123
lib/map.nix
Normal file
123
lib/map.nix
Normal file
@@ -0,0 +1,123 @@
|
||||
{lib, ...}: let
|
||||
inherit
|
||||
(builtins)
|
||||
attrNames
|
||||
attrValues
|
||||
foldl'
|
||||
isPath
|
||||
pathExists
|
||||
readDir
|
||||
toString
|
||||
;
|
||||
|
||||
inherit
|
||||
(lib)
|
||||
flatten
|
||||
filterAttrs
|
||||
forEach
|
||||
getAttrFromPath
|
||||
hasPrefix
|
||||
hasSuffix
|
||||
id
|
||||
mapAttrs'
|
||||
mapAttrsToList
|
||||
mkIf
|
||||
nameValuePair
|
||||
removeSuffix
|
||||
;
|
||||
in rec {
|
||||
## Mapping Functions ##
|
||||
array = list: func: forEach list (name: getAttrFromPath [name] func);
|
||||
filter = name: func: attrs: filterAttrs name (mapAttrs' func attrs);
|
||||
list = func: foldl' (x: y: x + y + " ") "" (attrNames func);
|
||||
|
||||
## Files Map
|
||||
# Top Level
|
||||
files = dir: func: extension:
|
||||
filter (name: type: type != null && !(hasPrefix "_" name)) (name: type: let
|
||||
path = "${toString dir}/${name}";
|
||||
in
|
||||
if
|
||||
(type == "directory" || type == "symlink")
|
||||
&& (
|
||||
if (extension == ".nix")
|
||||
then pathExists "${path}/default.nix"
|
||||
else true
|
||||
)
|
||||
then nameValuePair name (func path)
|
||||
else if
|
||||
type
|
||||
== "regular"
|
||||
&& (
|
||||
if (extension == ".nix")
|
||||
then name != "default.nix"
|
||||
else true
|
||||
)
|
||||
&& hasSuffix extension name
|
||||
then nameValuePair (removeSuffix extension name) (func path)
|
||||
else nameValuePair "" null) (readDir dir);
|
||||
|
||||
# Recursive
|
||||
files' = dir: func: extension:
|
||||
filter (name: type: type != null && !(hasPrefix "_" name)) (name: type: let
|
||||
path = "${toString dir}/${name}";
|
||||
in
|
||||
if (type == "directory" || type == "symlink")
|
||||
then nameValuePair name (files' path func)
|
||||
else if
|
||||
type
|
||||
== "regular"
|
||||
&& (
|
||||
if (extension == ".nix")
|
||||
then name != "default.nix"
|
||||
else true
|
||||
)
|
||||
&& hasSuffix extension name
|
||||
then nameValuePair (removeSuffix extension name) (func path)
|
||||
else nameValuePair "" null) (readDir dir);
|
||||
|
||||
# Package Patches
|
||||
patches = patch:
|
||||
if isPath patch
|
||||
then
|
||||
flatten (mapAttrsToList (name: type:
|
||||
if
|
||||
type
|
||||
== "regular"
|
||||
&& (hasSuffix ".diff" name || hasSuffix ".patch" name)
|
||||
then patch + "/${name}"
|
||||
else null) (readDir patch))
|
||||
else patch;
|
||||
|
||||
# Module Imports
|
||||
module = dir: attrValues (modules dir id);
|
||||
module' = dir: attrNames (modules dir id);
|
||||
modules = dir: func: files dir func ".nix";
|
||||
modules' = dir: func: files' dir func ".nix";
|
||||
|
||||
# 'sops' Encrypted Secrets
|
||||
secrets = dir: neededForUsers:
|
||||
filter (name: type: type != null && !(hasPrefix "_" name)) (name: type:
|
||||
if type == "regular" && hasSuffix ".secret" name
|
||||
then
|
||||
nameValuePair name {
|
||||
sopsFile = dir + "/${name}";
|
||||
format = "binary";
|
||||
inherit neededForUsers;
|
||||
}
|
||||
else nameValuePair "" null) (readDir dir);
|
||||
|
||||
|
||||
# 'sops' Encrypted Secrets
|
||||
hm_secrets = dir: out_dir:
|
||||
filter (name: type: type != null && !(hasPrefix "_" name)) (name: type:
|
||||
if type == "regular" && hasSuffix ".age" name
|
||||
then
|
||||
nameValuePair name {
|
||||
sopsFile = dir + "/${name}";
|
||||
format = "binary";
|
||||
path = out_dir + "/${name}";
|
||||
|
||||
}
|
||||
else nameValuePair "" null) (readDir dir);
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
This file is created the first time Keybase starts, along with
|
||||
~/.config/autostart/keybase_autostart.desktop. As long as this
|
||||
file exists, the autostart file won't be automatically recreated.
|
||||
@@ -1,13 +0,0 @@
|
||||
{
|
||||
"current_user": "sstent",
|
||||
"mountdir": "/run/user/1000/keybase/kbfs",
|
||||
"mountdirdefault": "/run/user/1000/keybase/kbfs",
|
||||
"users": {
|
||||
"sstent": {
|
||||
"device": "f4620ec4bacdda95c21f3c2eef1bd218",
|
||||
"id": "22e21408af3410de4407ac3dd37de519",
|
||||
"name": "sstent",
|
||||
"salt": "72a2c02b18af5396032bdcbd6809d8b3"
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1,12 +0,0 @@
|
||||
{
|
||||
"": {
|
||||
"clones": 1,
|
||||
"prior": "00000000000000000000000000000000",
|
||||
"stage": "65ef0d9e36355c365b40aab148263a32"
|
||||
},
|
||||
"f4620ec4bacdda95c21f3c2eef1bd218": {
|
||||
"clones": 1,
|
||||
"prior": "af194d8db8334d111acdefafec2e0989",
|
||||
"stage": ""
|
||||
}
|
||||
}
|
||||
@@ -1,3 +0,0 @@
|
||||
{
|
||||
"gui": true
|
||||
}
|
||||
@@ -1 +0,0 @@
|
||||
koSkYm9keYOkcHJpdoOkZGF0YcRo5oIaFkbex9owpJIAl9hSQSsu/+xBFHG6KFqX4d4Hwzpb9nnUvhoG4YP+Zg3zjrDf1GFkvTZvDi7LD0RlRJskxOF3qfqdCBADZHEIk7Sj7F5vu8goYjNPLrvWF6YrC95Nh/8tC8SfgT2qZW5jcnlwdGlvbmS1cGFzc3BocmFzZV9nZW5lcmF0aW9uAaNwdWLEIwEgeGhKS2TjWGd/ql67TDfv53jWRtDYVHo0v41Na3VgjtIKpHR5cGUgpGhhc2iCpHR5cGUIpXZhbHVlxCCrV/G1jj/NmEtvSnufVIyllGqv+wZLEAGl8H2eGqXkuaN0YWfNAgGndmVyc2lvbgGEpGJvZHmDpHByaXaDpGRhdGHESHc8z+fqvdncmY+StxE+r2kpNF+oGmvmy7Y0b5ItZ8+Hdst06n51Qk95gX0EcwUPFYIuB0uzAvPW/pBHnL1yyM5OABLo4zgm1KplbmNyeXB0aW9uZLVwYXNzcGhyYXNlX2dlbmVyYXRpb24Bo3B1YsQjASGDEZu3Z1Wa0ZD6e2HLIdqfzX6KkClhEMvbsP3cIRXUWQqkdHlwZSGkaGFzaIKkdHlwZQildmFsdWXEICWy2gHCbgCc1IIztlWuej/qn1jMwKJK0rOD+2/Jokl/o3RhZ80CAad2ZXJzaW9uAQ==
|
||||
24
secrets/user_dotfiles/nicotine
Normal file
24
secrets/user_dotfiles/nicotine
Normal file
File diff suppressed because one or more lines are too long
24
secrets/user_dotfiles/sstent@StuPC/keybase/autostart_created
Normal file
24
secrets/user_dotfiles/sstent@StuPC/keybase/autostart_created
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"data": "ENC[AES256_GCM,data:iFghNfqBtqI8KIjO7dVyEGoT4mIbG7zGwNIfCOAWpmRlR9eDxROMpG+wAyFTg+fn+UVK1P/+bW1UtnaD+PYJGBjA7ONXQ0hKvjAy3ESskz4siM4AisVzbOsZc1enOPzzG/MX6IEE2aHbdOTkf6rnezbojLvcUun8M8vTUK/8ievjtesW/JMY/XviuVEmBhVQZ+PTQrHLZCu+V1HLe9YFKcrPjxjvrij5Bd786xUsxB2gR7xE2BWtzaRhhbWWrgvD,iv:Ze0pdvlR4uG9PHsG/cONoVaBXnsrLjcaVJYstz/G0F0=,tag:Jno57JLI+xLH9YkqSflH8w==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSArWTRoaWMweGxQQmYrUTlD\nNUxhZ01DNVRoVnZtdUJwd0JKZGt5K3hoRkJRCmJ6d0cwUU95czVXeGpaV3p3QjdM\nV0x5alVaTkZ3VDNyRTQvTGN4NmVpYVUKLS0tIC9JMjB2Ni9ZVGlMRmV0ZzBzQU1x\nYURXYzk4R3Z6OVZFZ05FTjgrQ3pocUEKNH6ylTZ5CYcXx18xo+nLYA3Nh2avVGMb\ncGDWzi0DXgRjd/xf8kOi0koKKDvXHsK5TRc5VSvExdtpN4zDyoxowQ==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
},
|
||||
{
|
||||
"recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB4YUxrbWtMNHA1cVk3R2ly\nZ2xELytwL3AxT0ZQQXdQVmRNWHRIc3pZbUNNCjFPTlUrQ0owa2VvTGkyeW04d1lo\ndWdnM0UwUzZjSTlvajV6Zk1la1pVdUkKLS0tIDRERDA1bXNkcjRycjRyMllwVmw2\nQlpsVHphelpadEQ1ckEzeGJ5L0owRXcKUpEC1LVcZ/w3wTz40sRzIcAd3Jsn67w1\nqos5t1iNJJkOJ23pCWzjfCR6ijRNb6n17X1ditjcgWptT2CSVzJ+kg==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2023-02-27T15:57:55Z",
|
||||
"mac": "ENC[AES256_GCM,data:ggxj/gEcMA+F+NXq0h4W+TTVKvD3JKvyxqxBfjlpelFBSn9dmIrhhiu6uHbdIds9tMTqaJds8Cfd3fVOYuS55IsVFA+iWWMN8DaEnylltri2tqaOLTPu42JWLQABIC1L3Il72s1gY2fpqcSdJfBv4CFIcIGg42cEZ3/pFjIiCYA=,iv:GBOIzLfACQI5oBuUnO+q1yOL0cCZxCKCFhqorFP46NM=,tag:LfM8M9eedNlU/yaI1II/kA==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.7.3"
|
||||
}
|
||||
}
|
||||
24
secrets/user_dotfiles/sstent@StuPC/keybase/config.json
Normal file
24
secrets/user_dotfiles/sstent@StuPC/keybase/config.json
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"data": "ENC[AES256_GCM,data:LzVLs/GE2RkhS4039pzAiJAZCTG73rgMljFyrEsV6P9lzHcuNxEvcl/5UP9o0VhFi9yussAUTfaKfR/2hJiu+31KoggUBvFgfpUpZrQcTsb3yL66+wUITG9JTuw4JVulZhuFVzgpncwlAbmwIV8CcsFRyC22OZKt4mmxgBWnQ+MsvpgG0r22778lNVVNUaoMUSV3AgtFbaMifkmHS+ymtJskI2FUYT3LZfSTUkclazD/P1SZEdjehJAhUOJQl/0JVyFPSYPTWCC4WfM0LmBhVELjz8vRdv3Wxyi/PrCIV6RJPu3vib+b3x9jjcv/WKLiNzbyRmfpIgCa+yscG2cTfLDTkjdGUEIWv6Xqq0Kftoa2orQvDaqEK30UhW+W1LqkAi9DY6WwDxY4awK7L5R+9FGOK0Wr3cJCXD9xr/NT3jx2IbkFeRaj46mgf5Esp259hVPiGo/JWdrUgwEFTCNOZXMpDYGbcLwgD7ALQuMp0P74nw5FLPXDVDVSR6PW1A==,iv:OWrOxVOKctgNJZObjQnfTzP5c6YSAOF8UlbIQHZEYvE=,tag:VfMjS5U02FuDaMpxJ/vOBg==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB1dUlIUFpNWVlxOWZ3SjJt\nWnBHR0hJdlFBaHpaY1habEdKa3JXYmRJM1E4CitJbjc2QWNVNWlCOEliazIzQ2x3\nbzFLK1p2MGY4Tnhwd21yMDFLTHdHazgKLS0tIDBMVnRQRDIwd3JpYWM1emwyY3hv\nQ0FvRVlpbVRlSUhUUXFIbExSaGd2VU0KmO1zpvpVXtR5aTeWXMYE+8AXodNdoNHJ\nZJq9V2AXj9mxnXK7+4nWfypWmmzbiLqS1Gg3HbbKN+OU2wwTcCbVtg==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
},
|
||||
{
|
||||
"recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB5d05Rd1AxR0xnbzY2am9p\ndHdLdEk1UGdoeUd1ckt3SC9nOWxaSjB5em5zCmp0eG43NStBaEJ1bHlKVmdpc21R\neHFXVVlqSkV3RzNsZ2JGQ1pwbzZrQ2sKLS0tIEMyeGk3bHhYVzNpZnpKQW55b0dl\nM09GM3NCZ0xHUGxDanpIT25FcXFQbHMK1IOppUN2dJ3qfgN+2Z4M9ug1WPTSHXaw\ntkvABiUxqS0mO1IxWvpSbGokmxKnqeO7em2PAnXvIGfuUJmsn0AiVA==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2023-02-27T15:57:55Z",
|
||||
"mac": "ENC[AES256_GCM,data:CgL4kPkWzmgbxULhTBMrY3OIoHisifAbt4mvKHKXbrEoX5JIjkk2mBo0yYeNxoWuX2qG0jrftVnvNWjtK5pvPBAFyAXSjmhZpSVDZRkFeuXAi1tskjFPqjfwAKkBT6UEcjVmVg4B8E5qpRfNOnTpfmy5hmo/8oHSqTRPsFs72D0=,iv:cL7P9QddbUppi2sUDfzfBzRed6YrcnfwQQdet727yTI=,tag:h9S/9OMMxAhkDTsPUpGl9w==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.7.3"
|
||||
}
|
||||
}
|
||||
24
secrets/user_dotfiles/sstent@StuPC/keybase/device_clone.json
Normal file
24
secrets/user_dotfiles/sstent@StuPC/keybase/device_clone.json
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"data": "ENC[AES256_GCM,data:9xA2/Lp2bQj3GO3xGhJ7PtLUpaFpVwAHU4aIhMgKP6BL/pi8muDZf12o0Uh4JfMMAMvOClnA6w1LFI9bXTek81KQ9f9kHEefm3+YO8dXe2DH/q3yuXp1KtlRbPRhaa6oM5G937Ba81eNKn/rT9uo15VTBqRSH8cGfm375YcF7xCI9/RYCpAND2m9V/ksvta3NymHZv+GmJAAEoH+b9EzSeBdSek95GZTlUJ6G9Dkv4DszH8ohIxXONQEWr55bVOfNygIRaW4STj3n9wHkQ+Hjv7NAlA/li3X8UJUilkvF0+LItNZ6alr8OuqI6BRx7c4y8IH+wanpgYngEUU8XO4+KTLprfvzxmriepQlJcLWLf8VXp9bcctJNNwBzzjL4u6,iv:XElDXD7j1SsDcXty4nRovKLHF6+CCrZrJDvoroPTCUc=,tag:Bdp+Qown2TQ5jMivx+WsqQ==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSA3WE4zVjRFaHdFekpYUW1j\nS0lXZ0laOEZCdE94RVdoZmNCTDdRREdyaWpNCk9ESVRCb0NtNXNESzNmdjJaZzlM\nNFYrUUoxRkpEQnVMVnFPVE56bnYxS3MKLS0tIGd6Z1prRzRJdjFxMW9uMlEvMHlT\nVVBvalVKQm5QSGRNT0Y5d0NLR1Fudk0KRj/RLh8lKHITUdKDjA5aw3gDrajUJ6t6\n78vNJLAkusskJA/SdZumU3zpMiIfsZLF3/CKYrlhz0ReVn9ZgpxGVA==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
},
|
||||
{
|
||||
"recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBzRVl0V2xoT3Ryb0NrSVE4\nNXdSRWU3MGFpekQwdzgzREZaM0FOV0VzL0E4CjlzaC9GWWtSNWU5WDBVWnZRVHdu\ncnRrSENvOFBOdnFTbytnVW9YYXc2eE0KLS0tIGgwbWJhY0s3cWNjT3VSZFpKcld3\nWWZKRFY4cjN6aGw3dmpzT1cxOVFtOUUKF8/NzyNGt2oZrh/0Ar8Yk8LDQxdqCFQv\n7Ue5rPuc0gB0Y3/XE0nPFWajDF4lSfYOVbqWGazsGT172zWUYpfE6w==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2023-02-27T15:57:56Z",
|
||||
"mac": "ENC[AES256_GCM,data:3FCeSi6RIuMbtiYbZSfNRQOzqlwEYQrg9ujhAuJ0mSccUJXhSuaH22nLte6NdTEAQ5lO9REkVD63X4C/z2uEGUHTeWLnB9nZEt2hrm/InoW/8ewjR3L1+u04O1D3s0uNfKnZB3nkfDpafhxsVDXr4+jhbILNwxv4tlWKYKDz5e4=,iv:GZfW1ewGDjN2GRWjxCyJV2MLNNrbnUjkPLdudgGJ2jo=,tag:7New0lrINNLdnWBVmdm/aw==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.7.3"
|
||||
}
|
||||
}
|
||||
24
secrets/user_dotfiles/sstent@StuPC/keybase/gui_config.json
Normal file
24
secrets/user_dotfiles/sstent@StuPC/keybase/gui_config.json
Normal file
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"data": "ENC[AES256_GCM,data:hlWdQpbMhFn9TnZdUqQSSTzeTQ==,iv:+r1KNvTDkvZfC+GkwMjvabITypmByR1aNEtNGt6vKwQ=,tag:J+XX/FOxLwSZoUpoXm4vdQ==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBPYnV5cUptTG1aS1JnTUxY\nTDJ3NHhleHFUaEtsS29oNEJSNzRWNlA0NWtFCjhkU29ZOVZlQU4vSDZqdWE5NXB0\nSDkwS1lQbUpQR0kvOUlpYm9pRVRJRTAKLS0tIGtTK0VTSkpYUE5vSFU3OW1Qb0NO\nbWJlS2dsaUNzdjZkUVA4YTJaRHc3b2MKA8lqe2iiV0DSLC/nCMzFsjaLy6/JWJ9A\n0M0+oqeerddGUDXv3BRIul39kXrujw1eBH4byzin8dzYQg2xJjcbPg==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
},
|
||||
{
|
||||
"recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBQMWM0MVdCNWt6V3RnRXA4\nY3cxQ0pQejU3UGo0ZCtycGIxQU5SVGFSUUFNCnplRkpzZzFQb0Y3VFFGdmJ0VkVR\nQUFodjNoY0svVitjS2dCRkdkMExDOU0KLS0tIElIK3M1QlpBYlBLN0x0MkdEUS9B\nVndMenI0UzUreXBqbytKUXMwS2dxQWMKczqqun9FIWmR/rc/USGnl5PGq2IB9yzX\nJUfF34sNWkiKwScHD6ZUKB0ZJ8PuaIlrQQWPZKDY6nkoQUHc3a7vlA==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2023-02-27T15:57:56Z",
|
||||
"mac": "ENC[AES256_GCM,data:VsbrnRM4qQhwNg+NcmB6p11vkxxwkXo4OSmT+/OR3qjeAseMXnFv5axC/85XVkLuL6u5RJb7lV5h8eH0YSHy7OkZoVfia2D6UBBxvDbrKQ2OhrSG4NFK4pyaHa40p/9ma/kexkxbEFAqyO3RPC5Fmeu6wlBWeZB3lit3PTov4zM=,iv:r0rgG4J0NudfGC/97imvUsybUPKzRr1nbmuH5XSulVo=,tag:sr6YOFw/Fg6MLE73wFhpnA==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.7.3"
|
||||
}
|
||||
}
|
||||
@@ -0,0 +1,24 @@
|
||||
{
|
||||
"data": "ENC[AES256_GCM,data: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,iv:6il86bZc6AxZnVdHJZSxK42mSZQeh8n5PtIOVMQQMhU=,tag:piFQXfn0nnLkYXjE6gC1Pw==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": [
|
||||
{
|
||||
"recipient": "age1jvqe2j70h97844nkz34z9k4epx3uahx50cx75ss8mty2dnxlrf7qqv9a0g",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSAyUDlmTFhheVI5NExvMmxN\nMzYxTWZLRUVxQmRiZCt2dVovdXpYODFQSmlVCjh1REUrSlJ0SWtjcSthWjlGbGZz\nT0tGZklMdW10bnhDSVJJUUVHaGxsWGsKLS0tIHVlQ1dwOW00RjVqbVpiN0lHbXRj\ndUZOTGRxcTIrL2NGeFRuMDVzNXlBeUUKpirT/JkHtIgxni5xG2bKPhr0Cg7qVfy1\n17cGOuh26SfTOAPNebkawj0XPrUnMVwUqnto9JHtALM819Y8fvPtpQ==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
},
|
||||
{
|
||||
"recipient": "age1r86w07gy3nm2ltkqx7wcv94wzneeqmqvcm88nzw4g902kdgwgvdqvjumrj",
|
||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSB2ZXNOcG1wL3hML0I2U3dO\nQ251UHhjaFF6NW5sZXpya1FiS0s4VmVYNGdFCnFJODQzcmxiNG80cGU5ZTR1SG9w\nOUkvSzZZb3JhR2pUN3V0VDdWMDRjeFkKLS0tIEdoTXlUOHdzSjF5aDFBVk5zTG1D\nODNhWm9sUENBMXY2OWhFQ1poVHpDNDgKsOsHBFc0J37Ejn7IccIcN8NgegTF/m8Z\nRXXdVQNXY4K+Ckqp4CnXHgHzhEdYvICxf/xJThARvSCm7i1mtsrM7Q==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||
}
|
||||
],
|
||||
"lastmodified": "2023-02-27T15:57:56Z",
|
||||
"mac": "ENC[AES256_GCM,data:I3T6Fi3h6CjkApaQBTjPAlEbz32murgjhtoI6KriazLRcXXNqwrc0BIDCWsNHlRO0vCP+W7s5Ll7A1aafC+njI5n6FE6rC1v6dEyoPT6s53iMX8qD85ztLtaUwrU02cgXhJrwekNFSGWBWh5cE7r7tMeja6okc4XijTw/OxgvJs=,iv:O0t4jkUEH9YyBcClfqfs19skYB7cVIK4AkxZEAyWaBE=,tag:jB2M+gqdvH7TdKiu2qFXAA==,type:str]",
|
||||
"pgp": null,
|
||||
"unencrypted_suffix": "_unencrypted",
|
||||
"version": "3.7.3"
|
||||
}
|
||||
}
|
||||
Reference in New Issue
Block a user