diff options
author | Gregor Kleen <gkleen@yggdrasil.li> | 2023-01-30 12:20:23 +0100 |
---|---|---|
committer | Gregor Kleen <gkleen@yggdrasil.li> | 2023-01-30 12:20:23 +0100 |
commit | cfc871cce6aefaa0ff64619780a807cba761c6b2 (patch) | |
tree | 965e8276ed36f11698b6c7d6eadab9f88d5f97c5 /system-profiles/rebuild-machines/ssh/vidhar/private | |
parent | aa54fe89b98d354d21141c589332ce7950ef2e59 (diff) | |
download | nixos-cfc871cce6aefaa0ff64619780a807cba761c6b2.tar nixos-cfc871cce6aefaa0ff64619780a807cba761c6b2.tar.gz nixos-cfc871cce6aefaa0ff64619780a807cba761c6b2.tar.bz2 nixos-cfc871cce6aefaa0ff64619780a807cba761c6b2.tar.xz nixos-cfc871cce6aefaa0ff64619780a807cba761c6b2.zip |
...
Diffstat (limited to 'system-profiles/rebuild-machines/ssh/vidhar/private')
-rw-r--r-- | system-profiles/rebuild-machines/ssh/vidhar/private | 16 |
1 files changed, 8 insertions, 8 deletions
diff --git a/system-profiles/rebuild-machines/ssh/vidhar/private b/system-profiles/rebuild-machines/ssh/vidhar/private index b45a1172..10de68e6 100644 --- a/system-profiles/rebuild-machines/ssh/vidhar/private +++ b/system-profiles/rebuild-machines/ssh/vidhar/private | |||
@@ -5,19 +5,19 @@ | |||
5 | "gcp_kms": null, | 5 | "gcp_kms": null, |
6 | "azure_kv": null, | 6 | "azure_kv": null, |
7 | "hc_vault": null, | 7 | "hc_vault": null, |
8 | "age": null, | 8 | "age": [ |
9 | { | ||
10 | "recipient": "age1qffdqvy9arld9zd5a5cylt0n98xhcns5shxhrhwjq5g4qa844ejselaa4l", | ||
11 | "enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBhNi80YWo3UDdtRGFFZ1hw\nYTR0VTdaUzRsVzFtdGNSTDlTcG5oMk5pbFFnCm5UamRLb2RlVmhnVnJMbmRKNHRv\nWlMzZE15WTh1L3cyTVJEaitWMVB0MlEKLS0tIFA2dlRoK0dFY3Y3VkJLWmlGTWdY\nU0cyeUhSOUFPcDFUcklINlZVTk5BZlkKfbwlfqSqH3ilgIVNZOFDve7fK49kIT6C\naBi4iloIv7RXOyMhVDZVJDjNHzmYxWEnvboQ6KoQQ6b7z6Wk+JWeVA==\n-----END AGE ENCRYPTED FILE-----\n" | ||
12 | } | ||
13 | ], | ||
9 | "lastmodified": "2021-06-17T18:39:16Z", | 14 | "lastmodified": "2021-06-17T18:39:16Z", |
10 | "mac": "ENC[AES256_GCM,data:6E11CWkKpVxoPDw8jpg7Q1Jp+oIAS4W5PVTqzFJXeOOz2ZstVTlyhWdSRFJ/Xd09NuIRak+vAcOcU/t7v2d/mvNlogjCPdQE3ypRtm1HbawZUXwGgml9PRt0iMwS6MchMLWpze+eVu1j/hHvtAuqgRydMTCbT+T+qJOpax9olws=,iv:5VxHFHEFuTWYbKbwNIJAMYDDBoKkHOYLbe+l8amizhU=,tag:T7NBal0l4Nw8Pxm64CPDaA==,type:str]", | 15 | "mac": "ENC[AES256_GCM,data:6E11CWkKpVxoPDw8jpg7Q1Jp+oIAS4W5PVTqzFJXeOOz2ZstVTlyhWdSRFJ/Xd09NuIRak+vAcOcU/t7v2d/mvNlogjCPdQE3ypRtm1HbawZUXwGgml9PRt0iMwS6MchMLWpze+eVu1j/hHvtAuqgRydMTCbT+T+qJOpax9olws=,iv:5VxHFHEFuTWYbKbwNIJAMYDDBoKkHOYLbe+l8amizhU=,tag:T7NBal0l4Nw8Pxm64CPDaA==,type:str]", |
11 | "pgp": [ | 16 | "pgp": [ |
12 | { | 17 | { |
13 | "created_at": "2021-06-17T18:39:10Z", | 18 | "created_at": "2023-01-30T10:58:53Z", |
14 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DXxoViZlp6dISAQdAuCBzgHL7hYw9643MOm4Y3Zunz2N3cKg5c/RoPzm+D10w\neaMjK+pjFEUrGgptKyNEDRwaWnhtqXfHOvF/FCTKzr0yC2TRR1GRAEcz6vSJhL9f\n0l4BsshxfcB/ZUB5jE2F8No/MbD/beSKvUwgXlEMz8blOBbGUqkpp5zwjt91GXml\n2Fwrxzi5j3T2DgI8wH6XGpN9lNfFNk/JudFm0Y0yaXA4dFou1T+4hKWTb1mfTcTd\n=phfT\n-----END PGP MESSAGE-----\n", | 19 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DXxoViZlp6dISAQdAriP7hopf6z9zKWgURzDv1Bj4wR05udp4oX85/O64+xww\nrEs5BuLN1hB3nAb+biMUJUg7xlEvjXpWv0I/JxjRIJmVmnVAGiB90RejqFSoUYcU\n0l4BldpmYxeihoqFxE8awR8uKuKiGImJcPlECnHn5lIceF9CkCSndamt2CzSqZUS\nHhsIDG5kXSM+x1RIRj+S+fgeNCpnRGmZHKznucfYviuyjS9KmTghJCZWSnH6CNO2\n=tJda\n-----END PGP MESSAGE-----\n", |
15 | "fp": "30D3453B8CD02FE2A3E7C78C0FB536FB87AE8F51" | 20 | "fp": "30D3453B8CD02FE2A3E7C78C0FB536FB87AE8F51" |
16 | }, | ||
17 | { | ||
18 | "created_at": "2021-06-17T18:39:10Z", | ||
19 | "enc": "-----BEGIN PGP MESSAGE-----\n\nhF4DbYDvGI0HDr0SAQdAwkrIrbqgFCr75iDMH94Jv7rmJ87i6YUF+DUHOU6zF0Qw\nHXDlYeeEagxRch/WEkWiRM/g+5oZFLHDPIL86MenyTt0HbACekRNIqHxA6Q5uZLK\n0l4BzVzVxjusQolYvvWiwWxMmqVc19nrEqNHYDmxKAZqNiLUGBDO2KHNNA+6MAAP\nxAqmhmdWD/Kk7/X9WqOSiLvL6bsvHXOdmtnoqiXiuRDfPCJMZ3rma15WXjEe6EXq\n=3pEu\n-----END PGP MESSAGE-----\n", | ||
20 | "fp": "A1C7C95E6CAF0A965CB47277BCF50A89C1B1F362" | ||
21 | } | 21 | } |
22 | ], | 22 | ], |
23 | "unencrypted_suffix": "_unencrypted", | 23 | "unencrypted_suffix": "_unencrypted", |