From 8b3841a87f9033ff1c2f5825a179acf95ec2d5e1 Mon Sep 17 00:00:00 2001 From: Romain Paquet Date: Fri, 18 Jul 2025 00:10:29 +0200 Subject: [PATCH] remove agenix and migrate secrets to clan vars squash this --- devShells/flake-module.nix | 1 - flake.lock | 102 ++---------------- flake.nix | 3 - machines/crocus/radicle.nix | 10 +- machines/genepi/acme.nix | 12 ++- machines/genepi/configuration.nix | 1 - machines/genepi/freshrss.nix | 17 +-- machines/haze/configuration.nix | 2 - machines/haze/secrets/secrets.nix | 13 --- machines/haze/secrets/syncthing-cert.pem.age | Bin 1006 -> 0 bytes machines/haze/secrets/syncthing-key.pem.age | 8 -- machines/haze/syncthing.nix | 27 +++-- modules/gandi.nix | 15 +++ secrets/freshrss.age | 12 +-- secrets/gandi.age | 13 ++- secrets/radicle-private-key.age | Bin 733 -> 733 bytes secrets/restic-genepi-storagebox-key.age | 13 +-- secrets/restic-genepi-storagebox-password.age | 12 +-- 18 files changed, 96 insertions(+), 165 deletions(-) delete mode 100644 machines/haze/secrets/secrets.nix delete mode 100644 machines/haze/secrets/syncthing-cert.pem.age delete mode 100644 machines/haze/secrets/syncthing-key.pem.age create mode 100644 modules/gandi.nix diff --git a/devShells/flake-module.nix b/devShells/flake-module.nix index 69acae0..d3bc2e5 100644 --- a/devShells/flake-module.nix +++ b/devShells/flake-module.nix @@ -8,7 +8,6 @@ { devShells.default = pkgs.mkShellNoCC { packages = [ - inputs'.agenix.packages.default inputs'.clan-core.packages.clan-cli pkgs.garage pkgs.nil # Nix language server diff --git a/flake.lock b/flake.lock index 7d80166..51b2780 100644 --- a/flake.lock +++ b/flake.lock @@ -1,28 +1,5 @@ { "nodes": { - "agenix": { - "inputs": { - "darwin": "darwin", - "home-manager": "home-manager", - "nixpkgs": [ - "nixpkgs" - ], - "systems": "systems" - }, - "locked": { - "lastModified": 1750173260, - "narHash": "sha256-9P1FziAwl5+3edkfFcr5HeGtQUtrSdk/MksX39GieoA=", - "owner": "ryantm", - "repo": "agenix", - "rev": "531beac616433bac6f9e2a19feb8e99a22a66baf", - "type": "github" - }, - "original": { - "owner": "ryantm", - "repo": "agenix", - "type": "github" - } - }, "clan-core": { "inputs": { "data-mesher": "data-mesher", @@ -37,7 +14,7 @@ "nixpkgs" ], "sops-nix": "sops-nix", - "systems": "systems_2", + "systems": "systems", "treefmt-nix": "treefmt-nix" }, "locked": { @@ -54,28 +31,6 @@ "url": "https://git.clan.lol/clan/clan-core" } }, - "darwin": { - "inputs": { - "nixpkgs": [ - "agenix", - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1744478979, - "narHash": "sha256-dyN+teG9G82G+m+PX/aSAagkC+vUv0SgUw3XkPhQodQ=", - "owner": "lnl7", - "repo": "nix-darwin", - "rev": "43975d782b418ebf4969e9ccba82466728c2851b", - "type": "github" - }, - "original": { - "owner": "lnl7", - "ref": "master", - "repo": "nix-darwin", - "type": "github" - } - }, "data-mesher": { "inputs": { "flake-parts": [ @@ -228,7 +183,7 @@ }, "flake-utils_2": { "inputs": { - "systems": "systems_5" + "systems": "systems_4" }, "locked": { "lastModified": 1726560853, @@ -283,27 +238,6 @@ } }, "home-manager": { - "inputs": { - "nixpkgs": [ - "agenix", - "nixpkgs" - ] - }, - "locked": { - "lastModified": 1745494811, - "narHash": "sha256-YZCh2o9Ua1n9uCvrvi5pRxtuVNml8X2a03qIFfRKpFs=", - "owner": "nix-community", - "repo": "home-manager", - "rev": "abfad3d2958c9e6300a883bd443512c55dfeb1be", - "type": "github" - }, - "original": { - "owner": "nix-community", - "repo": "home-manager", - "type": "github" - } - }, - "home-manager_2": { "inputs": { "nixpkgs": [ "nixpkgs" @@ -330,7 +264,7 @@ "nixpkgs": [ "nixpkgs" ], - "systems": "systems_3" + "systems": "systems_2" }, "locked": { "lastModified": 1751905641, @@ -366,7 +300,7 @@ "nixpkgs": [ "nixpkgs" ], - "systems": "systems_4" + "systems": "systems_3" }, "locked": { "lastModified": 1745334376, @@ -565,11 +499,10 @@ }, "root": { "inputs": { - "agenix": "agenix", "clan-core": "clan-core", "disko": "disko_2", "flake-parts": "flake-parts", - "home-manager": "home-manager_2", + "home-manager": "home-manager", "ignis": "ignis", "impermanence": "impermanence", "matugen": "matugen", @@ -617,16 +550,16 @@ }, "systems_2": { "locked": { - "lastModified": 1681028828, - "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", + "lastModified": 1689347949, + "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=", "owner": "nix-systems", - "repo": "default", - "rev": "da67096a3b9bf56a91d16901293e51ba5b49a27e", + "repo": "default-linux", + "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68", "type": "github" }, "original": { "owner": "nix-systems", - "repo": "default", + "repo": "default-linux", "type": "github" } }, @@ -646,21 +579,6 @@ } }, "systems_4": { - "locked": { - "lastModified": 1689347949, - "narHash": "sha256-12tWmuL2zgBgZkdoB6qXZsgJEH9LR3oUgpaQq2RbI80=", - "owner": "nix-systems", - "repo": "default-linux", - "rev": "31732fcf5e8fea42e59c2488ad31a0e651500f68", - "type": "github" - }, - "original": { - "owner": "nix-systems", - "repo": "default-linux", - "type": "github" - } - }, - "systems_5": { "locked": { "lastModified": 1681028828, "narHash": "sha256-Vy1rq5AaRuLzOxct8nz4T6wlgyUR7zLU309k9mBC768=", diff --git a/flake.nix b/flake.nix index 7c34515..5e46000 100644 --- a/flake.nix +++ b/flake.nix @@ -75,9 +75,6 @@ nixos-generators.url = "github:nix-community/nixos-generators"; - agenix.url = "github:ryantm/agenix"; - agenix.inputs.nixpkgs.follows = "nixpkgs"; - clan-core.url = "git+https://git.clan.lol/clan/clan-core"; clan-core.inputs.nixpkgs.follows = "nixpkgs"; clan-core.inputs.flake-parts.follows = "flake-parts"; diff --git a/machines/crocus/radicle.nix b/machines/crocus/radicle.nix index d7f60b5..d6e3816 100644 --- a/machines/crocus/radicle.nix +++ b/machines/crocus/radicle.nix @@ -2,7 +2,7 @@ { services.radicle = { enable = true; - privateKeyFile = config.age.secrets.radicle-private-key.path; + privateKeyFile = config.clan.core.vars.generators.radicle.files.radicle-private-key.path; publicKey = keys.services.radicle; node = { openFirewall = true; @@ -17,5 +17,11 @@ }; }; - age.secrets.radicle-private-key.file = ../../secrets/radicle-private-key.age; + clan.core.vars.generators.radicle = { + prompts.radicle-private-key = { + description = "radicle node private key"; + type = "hidden"; + persist = true; + }; + }; } diff --git a/machines/genepi/acme.nix b/machines/genepi/acme.nix index d9c784d..4e319a2 100644 --- a/machines/genepi/acme.nix +++ b/machines/genepi/acme.nix @@ -1,21 +1,25 @@ { config, ... }: { + imports = [ + ../../modules/gandi.nix + ]; + security.acme = { acceptTerms = true; defaults.email = "admin@rpqt.fr"; }; - age.secrets.gandi.file = ../../secrets/gandi.age; - security.acme = { certs."home.rpqt.fr" = { group = config.services.nginx.group; - domain = "home.rpqt.fr"; extraDomainNames = [ "*.home.rpqt.fr" ]; dnsProvider = "gandiv5"; dnsPropagationCheck = true; - environmentFile = config.age.secrets.gandi.path; + environmentFile = config.clan.core.vars.generators.gandi.files.gandi-env.path; + email = "admin@rpqt.fr"; }; }; + + clan.core.vars.generators.gandi.files.gandi-env.owner = "acme"; } diff --git a/machines/genepi/configuration.nix b/machines/genepi/configuration.nix index 58c57c7..34c5a05 100644 --- a/machines/genepi/configuration.nix +++ b/machines/genepi/configuration.nix @@ -4,7 +4,6 @@ }: { imports = [ - self.inputs.agenix.nixosModules.default ./acme.nix ./boot.nix ./builder.nix diff --git a/machines/genepi/freshrss.nix b/machines/genepi/freshrss.nix index 9797ece..8222566 100644 --- a/machines/genepi/freshrss.nix +++ b/machines/genepi/freshrss.nix @@ -4,23 +4,26 @@ let subdomain = "rss.${domain}"; in { - age.secrets.freshrss = { - file = ../../secrets/freshrss.age; - mode = "700"; - owner = config.services.freshrss.user; - }; - services.freshrss = { enable = true; baseUrl = "https://${subdomain}"; virtualHost = "${subdomain}"; defaultUser = "rpqt"; - passwordFile = config.age.secrets.freshrss.path; + passwordFile = config.clan.core.vars.generators.freshrss.files.freshrss-password.path; }; services.nginx.virtualHosts.${config.services.freshrss.virtualHost} = { forceSSL = true; useACMEHost = "${domain}"; }; + + clan.core.vars.generators.freshrss = { + prompts.freshrss-password = { + description = "freshrss default user password"; + type = "hidden"; + persist = true; + }; + files.freshrss-password.owner = config.services.freshrss.user; + }; } diff --git a/machines/haze/configuration.nix b/machines/haze/configuration.nix index e2a0b34..90d2d0a 100644 --- a/machines/haze/configuration.nix +++ b/machines/haze/configuration.nix @@ -4,8 +4,6 @@ }: { imports = [ - # inputs.disko.nixosModules.disko - self.inputs.agenix.nixosModules.default ./boot.nix ./chat.nix ./firefox.nix diff --git a/machines/haze/secrets/secrets.nix b/machines/haze/secrets/secrets.nix deleted file mode 100644 index 1f012b4..0000000 --- a/machines/haze/secrets/secrets.nix +++ /dev/null @@ -1,13 +0,0 @@ -let - keys = import ../../../parts/keys.nix; -in -{ - "syncthing-key.pem.age".publicKeys = [ - keys.hosts.haze - keys.rpqt.haze - ]; - "syncthing-cert.pem.age".publicKeys = [ - keys.hosts.haze - keys.rpqt.haze - ]; -} diff --git a/machines/haze/secrets/syncthing-cert.pem.age b/machines/haze/secrets/syncthing-cert.pem.age deleted file mode 100644 index b5dabca52ec2fc3c9ecf5b423f8b35a042d2992a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 1006 zcmYdHPt{G$OD?J`D9Oyv)5|YP*Do{V(zR14F3!+RO))YxHMCR+FitB@OjjuK@%2ur zGI7o~$}_i23HH#AGIVl}@GDQw$TBVU%uX??DDls#a7~L0Pv**TOZSY-_w@2HiS+X@ zjY{!1E;5MB@-Yp|OLTX43b!yc4$}5ZG&U>t2<6h%)m6wbO>;{2&d@J$E%P@o&&e@$ zv&hRc$tVgd)elcDG0ic{iwZN&&MR>&apf{}uZf!moX^gX8YQ5ubK#4GmkL*>lu(O18yt&e!e}1_-bE>fz|F22S7j;-0 z4n54d=@s z_OlvP7Y55TsB22hl=(lUPpR#MZp^C-EH{te*?-YK`198d)L2lV#RN798Ua zY1DsyuA5D(TuE)Ei@L%sZoQ+s?lBup>JQ?Rc>TR5;Q#m4`EO27ab6i>l2dWO)MaD! zKeMmhTUZjmYOYv$^a88VQrk||Nx8c$Nnp1)6Gq1y{zE^S%D#?8P zK8Gzqfn(y$;QHc=-#4?Gwq3p3;#fQD(_A(NO}oew72iuA+bjN&ztDESX3F27r$I@} zMJ#rIsI_vJRIW3>`$2yuR=yQKr^|TLi1Xc>BXiF`BrWOm-M}heee97v?S=&=I=VIA5;YR?0y;a|3llu SU0fTF@D&GVFTektcL@M4g4lHc diff --git a/machines/haze/secrets/syncthing-key.pem.age b/machines/haze/secrets/syncthing-key.pem.age deleted file mode 100644 index c3349ea..0000000 --- a/machines/haze/secrets/syncthing-key.pem.age +++ /dev/null @@ -1,8 +0,0 @@ -age-encryption.org/v1 --> ssh-ed25519 P3fsag cm2nekzBIMCAb/yXzY4L6jIH/Sa+rSMznT88WJNkP30 -DMnRf0An69vywpHLD3RGHwE0dkaa6JIEahhQo14EEDc ---- f/kI+HBhWTQlXoWvCJaLJM70EsOkH4G8/5g9Eeu8uNc - -T!\Β6 -TrϵKr9w̞8E,R.i _'2;iń8d&Dݫqxd -3exng~/)݇aWG~BNVia{uەR=MO)$HSff<c?~*T)Wtʁ&8iz:5[sc"& U9'_{xkEؼY@fU+Bu=Y4e3UQLSl5 Uqښ!hW@}OW \ No newline at end of file diff --git a/machines/haze/syncthing.nix b/machines/haze/syncthing.nix index 00806c4..c463b15 100644 --- a/machines/haze/syncthing.nix +++ b/machines/haze/syncthing.nix @@ -7,24 +7,21 @@ let home = config.users.users.${user}.home; in { - # age.secrets.syncthing-key.file = ./secrets/syncthing-key.pem.age; - # age.secrets.syncthing-cert.file = ./secrets/syncthing-cert.pem.age; - services.syncthing = { - enable = false; + enable = true; user = user; group = "users"; dataDir = home; configDir = "${home}/.config/syncthing"; - key = config.age.secrets.syncthing-key.path; - cert = config.age.secrets.syncthing-cert.path; + key = config.clan.core.vars.generators.syncthing.files."key".path; + cert = config.clan.core.vars.generators.syncthing.files."cert".path; openDefaultPorts = true; overrideDevices = true; overrideFolders = true; settings = { devices = { "genepi" = { - id = "EA7DC7O-IHB47EQ-AWT2QBJ-AWPDF5S-W4EM66A-KQPCTHI-UX53WKM-QTSAHQ4"; + id = "TNP3M2Z-2AJ3CJE-4LLYHME-3KWCLN4-XQWBIDJ-PTDRANE-RRBYQWQ-KXJFTQU"; }; "pixel-7a" = { id = "IZE7B4Z-LKTJY6Q-77NN4JG-ADYRC77-TYPZTXE-Q35BWV2-AEO7Q3R-ZE63IAU"; @@ -60,4 +57,20 @@ in }; }; }; + + clan.core.vars.generators.syncthing = { + prompts.key = { + description = "syncthing private key"; + type = "hidden"; + persist = true; + }; + files.key.owner = config.services.syncthing.user; + + prompts.cert = { + description = "syncthing cert"; + type = "hidden"; + persist = true; + }; + files.cert.owner = config.services.syncthing.user; + }; } diff --git a/modules/gandi.nix b/modules/gandi.nix new file mode 100644 index 0000000..9a97757 --- /dev/null +++ b/modules/gandi.nix @@ -0,0 +1,15 @@ +{ + clan.core.vars.generators.gandi = { + prompts.gandi-token = { + description = "gandi access token"; + type = "hidden"; + }; + files.gandi-env = { + secret = true; + }; + script = '' + printf %s "GANDIV5_PERSONAL_ACCESS_TOKEN=" >> $out/gandi-env + cat $prompts/gandi-token >> $out/gandi-env + ''; + }; +} diff --git a/secrets/freshrss.age b/secrets/freshrss.age index b4a3d8a..9d9a4e2 100644 --- a/secrets/freshrss.age +++ b/secrets/freshrss.age @@ -1,7 +1,7 @@ age-encryption.org/v1 --> ssh-ed25519 JzHbnw jpMQTBWxbVVfpRmNC4lyDKCcrpz01Qx7LbkmSnieyHA -RWh0M0kj8BGn3u7e1A2Tki1soeMUQCHk5xTXyBF5dRA --> ssh-ed25519 8TpKTA qAvhyZSeKUYdZMhwPxd/eh4FNg1DAM1F2Stc6zvmV2A -pEP1XxQZaC/acpjMpX0NN/Hnq3vZzfeHYlNUt2bwNzY ---- F/XBgHsBJAJIlfuT0DA4DcAS+3Ci8PI6XIkKbndI898 -n s…$}IĘgᐺK,\c)4$0dyi o/^g{dɼ̅B \ No newline at end of file +-> ssh-ed25519 JzHbnw JQOFdZFRMy3CUajSKR2pbUXw06LEGJoUCilV3QrlhAg +nc9+a/wm+oTESW/f91UIBHyodXYpAwkp7iiBARsQqs8 +-> ssh-ed25519 8TpKTA bSzgxGzN9/cdSlb1PH3fYDa2bRSJC0vE6z1i5Me6wR4 +OqQXlelajxJNZ5RC7ooBvoUc03g5RELGQSX8BwEm428 +--- 68+PLIpazLNfF1NVo9dMFBiUrEIinXhYUufOiF+5Ic0 +oBi=&oe.N`"r=:+nI}c9y \ No newline at end of file diff --git a/secrets/gandi.age b/secrets/gandi.age index 9c8f2b8..b66b8d9 100644 --- a/secrets/gandi.age +++ b/secrets/gandi.age @@ -1,8 +1,7 @@ age-encryption.org/v1 --> ssh-ed25519 JzHbnw eURiwsZGmazGksGekjCeLJah8T5YKJNZHy1LMTh+fDw -7LBu9JjwrZ+ad0rOrRARRLj2ydho3y5PFUJFvaaXOao --> ssh-ed25519 8TpKTA SVqAdtOxogTlJJEHm1Ohe7WQ3XfV8lWCPHAn0cj/D0Q -Fd/E7QUFqirSJsMp9h81R/9V9kRlG8nvF/EoZMynLGE ---- 4dMwgCHnuTMpxeKktAlx4aYwcRwWqBFIFEqUFlY+Avg -W+Bn\N?|^ -A+)UD $|Ȕ.k\*OL1s7ѵV9=K>Efߝ}$x0Ć150>yp \ No newline at end of file +-> ssh-ed25519 JzHbnw T31pRlZxX8+uEmZzer9n0L6zuNX0wk4dhqzJGUnJ5BY +wLPjZofbVL6ujdMz0DCnEa/6aPiQxxO6Lfwfdy4SS+k +-> ssh-ed25519 8TpKTA IBv4smbKRnRjZ1dnOBTkX/rLO+viU8Bk4ztx4KFkw3I +Mcl0iIXi6C6tmTXeccnQfSv1QRWVaA4alGcus35b4TQ +--- hzcS/phyG9Q8F66INJJS4D4ODIpwH+jjPko7PmWBEcA +8B>@^Hdxbhkt3Yٗ6'9b] xUo>&K٧5!zm֙xQjz3oYIǟ[Vtv| \ No newline at end of file diff --git a/secrets/radicle-private-key.age b/secrets/radicle-private-key.age index 864ab4435f4ccb8a7929fcefb9aa9a4febb2209a..67e0469e66a3199c38acdb33351794035e253bd6 100644 GIT binary patch delta 701 zcmcc1dY5&APQ8g)MWM5+VR*TIiHmu%Uubb~VsJoCh=;4YzeQP~enyBvv35wVXGXG% z0as~aZn3swqKTn?l76|bkB4uzt9HIclC!0;S!qOhh>^c(ibbkhAXrg=PxRH}vmyvA$bexyLKa>Q;dLvKblcCyTFGw`r2@ z2etE^Z&;>_>ZIF;`pjH$TtiOuR^%%U%hHB33%MtF8dr2Ly(>Ghit$l=scqWEg^g!A zdURr=ti)S5CFbhRQT^TaXm#ah8Los4Vc!h@oLQlAqK-MR{&nh{@4c39Ln_N$6KUM!WFw3*jnvFobO0*AV{-ZS^J)?1Zlp|;}AK_SDg z*|HZ{B-!5H*ndc?@7qGQ4c)I49~|16>t6Kc=|nHqqK6{irwVU+?)Tl!DfQzQuPW`G z3+JWrxC<-|WBfHkRV<)>H@jW&&ky%`pDuRV+2-_eJKJIw&%a0Z>55J{7;Aq)F!AB8 zOSisVNvqo2qbwNH+w@JvAvV%M4~mZ4{k+IAt!wo*`E?e5Gv!4Ci_BL2e$xG@ zHpr#a``;p^={uyZ?)Bn)@Z9eFjoEGYH|?4|%XiP40@DKDO%=bA-m`lB+4+mq<&b5fxC~Rwux6%ns;bUn7&t1ib1(iIhU@TLUD11 zZfc5=si~o*f<;JycZj2cUs6$;QHFt6M3#PVWS&=YPQ7!sdt`u{MOs;wqkecylM}(PAXqvfmS%|S?M3i~4lSNs1s&7?=OS-pdl$UXpfvZ8DcTP?| zm#(g^LPe&3XsDxeXnA>*pTDoEce1IAWoAUSNkB??Qh-;9iF=fHo@Zc*SE*Y%SK|vi z?)|welJ$0z*q#1xYHHS1lqVihow1PL`Ffm&>XDGtUyp6XA8ns_XT_(_&G&eZJ>ZV} zCfXizeSNr;O4!NYPdW@s?@fI3_vW?6Pg@%fE;JKu`Q{m78S&|O-@QBB?Q_4r);yPd zz>K}~bvaXLve&_Df>H0*tyyyIb;8=`A67QCDnDAtevfrmalK<(?V~$ULd=HFQJbG< ztXZAd-~ClCTRNwBB5Q!rs@UH=T<)?FhNZ{e-N=$qosn^&zt`!vtpC=q-m3zOOO7`# zERt)8DfUY3+4@X-li;2n!D$9*N|_!jul`cwx%$dv&aNBGn$w%dCFDz@?%J$>tm*pl!vxOct z1-;31YDtu=nfuItpQwC)lP4#()+&N_Pai>Y>k;;_uen= zPiHv3YSK)W^9elk_0|D@KaC|a?q>-L+*_9^_P_j3-<91RiW|4TzO+gh E05AVB3IG5A diff --git a/secrets/restic-genepi-storagebox-key.age b/secrets/restic-genepi-storagebox-key.age index 65dad4e..01dd9a4 100644 --- a/secrets/restic-genepi-storagebox-key.age +++ b/secrets/restic-genepi-storagebox-key.age @@ -1,7 +1,8 @@ age-encryption.org/v1 --> ssh-ed25519 JzHbnw FL+4gD29OjqU5cFEHUBsYbweEOVvQ3q7v6X7Zbkghx8 -tmK+CgVUcLJpP7SxLdakqfQ6q4+ZIW+bOKmsQ7h5z7I --> ssh-ed25519 8TpKTA it+shCL614xDviBsDOidOHQ/mIGD0a4flmMeAL7ilAA -mRSTRcqloI+ojmEK4gQ3KO+nMlobdain8hmWkH/kX+w ---- /RZZE995XzGRj793ENRV2pRZOzz9fXg1LjXTRaojl8E - r6#gaƶ0tf7P1Yh!8kILOR[t(oSQjX6׷7fP \ No newline at end of file +-> ssh-ed25519 JzHbnw jcLmvaUel10bjSo1m+vL5929Ev6Qtq36d9avIxZ2uDg +MZ+R18igyow8lCI5qCH2Jl5tNy19KYdJEZkSimMsd24 +-> ssh-ed25519 8TpKTA /RgGofvCDFINYdk6hHkfv48SZCocMWFvO3cznQVB3Bs +jJy65KCMIUEyb63cpdBD/MjCEq6Du7KoWBsMHCKZpok +--- yxtOdFqzs1OQIko6OIlZPofBckezYd5fJkbyM1wb6AU +:" !h"|Cy) sag?t؂Ja ԥ_!kTX.ˮ6cPC,Kгo)|Zl:I +ɄL5v \ No newline at end of file diff --git a/secrets/restic-genepi-storagebox-password.age b/secrets/restic-genepi-storagebox-password.age index 42e028f..bdd5443 100644 --- a/secrets/restic-genepi-storagebox-password.age +++ b/secrets/restic-genepi-storagebox-password.age @@ -1,7 +1,7 @@ age-encryption.org/v1 --> ssh-ed25519 JzHbnw 03K1eF97VQ1Gt3LoIVYk6RTJ2wuOoOFpx5Msh1qzb10 -o5qJMOa+AzF7czu1xtx2/aJ+tJqVv14J58pgvGcq4hI --> ssh-ed25519 8TpKTA AcBv+loPwmanCwbVoQtj2ZD3ZRJ27SJqg0oklQMy7Ec -uT2oIf9AENKn4SzAbKqT8igUJ6TsoE26iLgs/Ds/Bag ---- JuOE19Ap5gs+hw5sJnrfYFi8G9cesSj626cgxaWV6QY -Y;WFHmՙ@"bc;g oj> \ No newline at end of file +-> ssh-ed25519 JzHbnw aEdPsShqoC1O4YVmeRnuky+elRay3fAipvIDhgSP02Q +Gvh/ER7d6VaCXQ/cA2puOrhwz0PQDO7sNfi06X6yw5M +-> ssh-ed25519 8TpKTA YKagwotojOY57tuvf+lkHh5+1M8NoV3slITN8X/1yD8 +fNf1DBeW5KJMjq1dzi6KR7SR+fw7aFA2CRemRwdE6/M +--- 5Gfha3Txw0O0a7v0AmJov3shlxihBp4EONcBFPU0NT8 +6Vkѕkp|U~\+f <(}qQߧ9 \ No newline at end of file