mirror of
https://github.com/Swarsel/.dotfiles.git
synced 2025-12-06 09:07:21 +01:00
feat: improve emergency access
Some checks are pending
Flake check / Check flake (push) Waiting to run
Some checks are pending
Flake check / Check flake (push) Waiting to run
This commit is contained in:
parent
a921818915
commit
06ec1df09a
12 changed files with 142 additions and 49 deletions
|
|
@ -782,6 +782,7 @@ Lastly, in order make this actually available to my configurations, i use the =i
|
||||||
domains
|
domains
|
||||||
services
|
services
|
||||||
user
|
user
|
||||||
|
root
|
||||||
;
|
;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -3740,53 +3741,59 @@ in
|
||||||
inherit (lib)
|
inherit (lib)
|
||||||
mkOption
|
mkOption
|
||||||
types
|
types
|
||||||
;
|
;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
options = {
|
options = {
|
||||||
globals = mkOption {
|
globals = mkOption {
|
||||||
default = { };
|
default = { };
|
||||||
type = types.submodule {
|
type = types.submodule {
|
||||||
options = {
|
options = {
|
||||||
user = {
|
root = {
|
||||||
name = mkOption {
|
hashedPassword = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
};
|
|
||||||
work = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
user = {
|
||||||
|
name = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
};
|
||||||
|
work = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
|
||||||
services = mkOption {
|
services = mkOption {
|
||||||
type = types.attrsOf (
|
type = types.attrsOf (
|
||||||
types.submodule {
|
types.submodule {
|
||||||
options = {
|
options = {
|
||||||
domain = mkOption {
|
domain = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
};
|
||||||
);
|
}
|
||||||
};
|
);
|
||||||
|
};
|
||||||
|
|
||||||
domains = {
|
domains = {
|
||||||
main = mkOption {
|
main = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
_globalsDefs = mkOption {
|
|
||||||
type = types.unspecified;
|
|
||||||
default = options.globals.definitions;
|
|
||||||
readOnly = true;
|
|
||||||
internal = true;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
|
||||||
|
_globalsDefs = mkOption {
|
||||||
|
type = types.unspecified;
|
||||||
|
default = options.globals.definitions;
|
||||||
|
readOnly = true;
|
||||||
|
internal = true;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
#+end_src
|
#+end_src
|
||||||
|
|
||||||
**** Meta options (options only)
|
**** Meta options (options only)
|
||||||
|
|
@ -4065,7 +4072,7 @@ In case of using a fully setup system, this makes also sure that no further user
|
||||||
For that reason, make sure that =sops-nix= is properly working before finishing the minimal setup, otherwise we might lose user access. The bootstrapping script takes care of this.
|
For that reason, make sure that =sops-nix= is properly working before finishing the minimal setup, otherwise we might lose user access. The bootstrapping script takes care of this.
|
||||||
|
|
||||||
#+begin_src nix-ts :tangle modules/nixos/common/users.nix
|
#+begin_src nix-ts :tangle modules/nixos/common/users.nix
|
||||||
{ self, pkgs, config, lib, minimal, ... }:
|
{ self, pkgs, config, lib, globals, minimal, ... }:
|
||||||
let
|
let
|
||||||
sopsFile = self + /secrets/general/secrets.yaml;
|
sopsFile = self + /secrets/general/secrets.yaml;
|
||||||
in
|
in
|
||||||
|
|
@ -4076,13 +4083,19 @@ For that reason, make sure that =sops-nix= is properly working before finishing
|
||||||
|
|
||||||
users = {
|
users = {
|
||||||
mutableUsers = lib.mkIf (!minimal) false;
|
mutableUsers = lib.mkIf (!minimal) false;
|
||||||
users."${config.swarselsystems.mainUser}" = {
|
users = {
|
||||||
|
root = {
|
||||||
|
inherit (globals.root) hashedPassword;
|
||||||
|
shell = pkgs.zsh;
|
||||||
|
};
|
||||||
|
"${config.swarselsystems.mainUser}" = {
|
||||||
isNormalUser = true;
|
isNormalUser = true;
|
||||||
description = "Leon S";
|
description = "Leon S";
|
||||||
password = lib.mkIf (minimal || config.swarselsystems.isPublic) "setup";
|
password = lib.mkIf (minimal || config.swarselsystems.isPublic) "setup";
|
||||||
hashedPasswordFile = lib.mkIf (!minimal && !config.swarselsystems.isPublic) config.sops.secrets.main-user-hashed-pw.path;
|
hashedPasswordFile = lib.mkIf (!minimal && !config.swarselsystems.isPublic) config.sops.secrets.main-user-hashed-pw.path;
|
||||||
extraGroups = [ "wheel" ] ++ lib.optionals (!minimal) [ "networkmanager" "syncthing" "docker" "lp" "audio" "video" "vboxusers" "libvirtd" "scanner" ];
|
extraGroups = [ "wheel" ] ++ lib.optionals (!minimal) [ "networkmanager" "syncthing" "docker" "lp" "audio" "video" "vboxusers" "libvirtd" "scanner" ];
|
||||||
packages = with pkgs; [ ];
|
packages = with pkgs; [ ];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -4261,6 +4274,36 @@ This dynamically uses systemd boot or Lanzaboote depending on the minimal system
|
||||||
}
|
}
|
||||||
#+end_src
|
#+end_src
|
||||||
|
|
||||||
|
**** Boot
|
||||||
|
|
||||||
|
#+begin_src nix-ts :tangle modules/nixos/common/boot.nix
|
||||||
|
{ lib, pkgs, config, globals, ... }:
|
||||||
|
{
|
||||||
|
options.swarselmodules.boot = lib.mkEnableOption "boot config";
|
||||||
|
config = lib.mkIf config.swarselmodules.boot {
|
||||||
|
boot = {
|
||||||
|
initrd.systemd = {
|
||||||
|
enable = true;
|
||||||
|
emergencyAccess = globals.root.hashedPassword;
|
||||||
|
users.root.shell = "${pkgs.bashInteractive}/bin/bash";
|
||||||
|
storePaths = [ "${pkgs.bashInteractive}/bin/bash" ];
|
||||||
|
extraBin = {
|
||||||
|
ip = "${pkgs.iproute2}/bin/ip";
|
||||||
|
ping = "${pkgs.iputils}/bin/ping";
|
||||||
|
cryptsetup = "${pkgs.cryptsetup}/bin/cryptsetup";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
kernelParams = [ "log_buf_len=16M" ];
|
||||||
|
tmp.useTmpfs = true;
|
||||||
|
loader.timeout = lib.mkDefault 2;
|
||||||
|
};
|
||||||
|
|
||||||
|
console.earlySetup = true;
|
||||||
|
|
||||||
|
};
|
||||||
|
}
|
||||||
|
#+end_src
|
||||||
|
|
||||||
**** Impermanence
|
**** Impermanence
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:CUSTOM_ID: h:e7668594-fa8b-4d36-a695-a58222478988
|
:CUSTOM_ID: h:e7668594-fa8b-4d36-a695-a58222478988
|
||||||
|
|
@ -5730,7 +5773,7 @@ This allows me to use screen sharing on Wayland. The implementation is a bit cru
|
||||||
}
|
}
|
||||||
#+end_src
|
#+end_src
|
||||||
|
|
||||||
**** Podmam (distrobox)
|
**** Podman (distrobox)
|
||||||
:PROPERTIES:
|
:PROPERTIES:
|
||||||
:CUSTOM_ID: h:1bef3914-a258-4585-b232-e0fbe9e7a9b5
|
:CUSTOM_ID: h:1bef3914-a258-4585-b232-e0fbe9e7a9b5
|
||||||
:END:
|
:END:
|
||||||
|
|
@ -16204,6 +16247,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
lowBattery = lib.mkDefault true;
|
lowBattery = lib.mkDefault true;
|
||||||
lanzaboote = lib.mkDefault true;
|
lanzaboote = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
optional = {
|
optional = {
|
||||||
gaming = lib.mkDefault true;
|
gaming = lib.mkDefault true;
|
||||||
|
|
@ -16279,6 +16323,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
lowBattery = lib.mkDefault true;
|
lowBattery = lib.mkDefault true;
|
||||||
lanzaboote = lib.mkDefault true;
|
lanzaboote = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
server = {
|
server = {
|
||||||
ssh = lib.mkDefault true;
|
ssh = lib.mkDefault true;
|
||||||
|
|
@ -16320,6 +16365,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
zsh = lib.mkDefault true;
|
zsh = lib.mkDefault true;
|
||||||
yubikey = lib.mkDefault true;
|
yubikey = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
server = {
|
server = {
|
||||||
ssh = lib.mkDefault true;
|
ssh = lib.mkDefault true;
|
||||||
|
|
@ -16583,6 +16629,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
time = lib.mkDefault true;
|
time = lib.mkDefault true;
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
@ -16639,6 +16686,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
time = lib.mkDefault true;
|
time = lib.mkDefault true;
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
@ -16672,6 +16720,7 @@ Modules that need to be loaded on the NixOS level. Note that these will not be a
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
impermanence = lib.mkDefault true;
|
impermanence = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
|
||||||
25
modules/nixos/common/boot.nix
Normal file
25
modules/nixos/common/boot.nix
Normal file
|
|
@ -0,0 +1,25 @@
|
||||||
|
{ lib, pkgs, config, globals, ... }:
|
||||||
|
{
|
||||||
|
options.swarselmodules.boot = lib.mkEnableOption "boot config";
|
||||||
|
config = lib.mkIf config.swarselmodules.boot {
|
||||||
|
boot = {
|
||||||
|
initrd.systemd = {
|
||||||
|
enable = true;
|
||||||
|
emergencyAccess = globals.root.hashedPassword;
|
||||||
|
users.root.shell = "${pkgs.bashInteractive}/bin/bash";
|
||||||
|
storePaths = [ "${pkgs.bashInteractive}/bin/bash" ];
|
||||||
|
extraBin = {
|
||||||
|
ip = "${pkgs.iproute2}/bin/ip";
|
||||||
|
ping = "${pkgs.iputils}/bin/ping";
|
||||||
|
cryptsetup = "${pkgs.cryptsetup}/bin/cryptsetup";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
kernelParams = [ "log_buf_len=16M" ];
|
||||||
|
tmp.useTmpfs = true;
|
||||||
|
loader.timeout = lib.mkDefault 2;
|
||||||
|
};
|
||||||
|
|
||||||
|
console.earlySetup = true;
|
||||||
|
|
||||||
|
};
|
||||||
|
}
|
||||||
|
|
@ -11,6 +11,12 @@ in
|
||||||
default = { };
|
default = { };
|
||||||
type = types.submodule {
|
type = types.submodule {
|
||||||
options = {
|
options = {
|
||||||
|
root = {
|
||||||
|
hashedPassword = mkOption {
|
||||||
|
type = types.str;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
user = {
|
user = {
|
||||||
name = mkOption {
|
name = mkOption {
|
||||||
type = types.str;
|
type = types.str;
|
||||||
|
|
|
||||||
|
|
@ -1,4 +1,4 @@
|
||||||
{ self, pkgs, config, lib, minimal, ... }:
|
{ self, pkgs, config, lib, globals, minimal, ... }:
|
||||||
let
|
let
|
||||||
sopsFile = self + /secrets/general/secrets.yaml;
|
sopsFile = self + /secrets/general/secrets.yaml;
|
||||||
in
|
in
|
||||||
|
|
@ -9,13 +9,19 @@ in
|
||||||
|
|
||||||
users = {
|
users = {
|
||||||
mutableUsers = lib.mkIf (!minimal) false;
|
mutableUsers = lib.mkIf (!minimal) false;
|
||||||
users."${config.swarselsystems.mainUser}" = {
|
users = {
|
||||||
isNormalUser = true;
|
root = {
|
||||||
description = "Leon S";
|
inherit (globals.root) hashedPassword;
|
||||||
password = lib.mkIf (minimal || config.swarselsystems.isPublic) "setup";
|
shell = pkgs.zsh;
|
||||||
hashedPasswordFile = lib.mkIf (!minimal && !config.swarselsystems.isPublic) config.sops.secrets.main-user-hashed-pw.path;
|
};
|
||||||
extraGroups = [ "wheel" ] ++ lib.optionals (!minimal) [ "networkmanager" "syncthing" "docker" "lp" "audio" "video" "vboxusers" "libvirtd" "scanner" ];
|
"${config.swarselsystems.mainUser}" = {
|
||||||
packages = with pkgs; [ ];
|
isNormalUser = true;
|
||||||
|
description = "Leon S";
|
||||||
|
password = lib.mkIf (minimal || config.swarselsystems.isPublic) "setup";
|
||||||
|
hashedPasswordFile = lib.mkIf (!minimal && !config.swarselsystems.isPublic) config.sops.secrets.main-user-hashed-pw.path;
|
||||||
|
extraGroups = [ "wheel" ] ++ lib.optionals (!minimal) [ "networkmanager" "syncthing" "docker" "lp" "audio" "video" "vboxusers" "libvirtd" "scanner" ];
|
||||||
|
packages = with pkgs; [ ];
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -55,6 +55,7 @@
|
||||||
domains
|
domains
|
||||||
services
|
services
|
||||||
user
|
user
|
||||||
|
root
|
||||||
;
|
;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
|
||||||
|
|
@ -10,6 +10,7 @@
|
||||||
time = lib.mkDefault true;
|
time = lib.mkDefault true;
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -16,6 +16,7 @@
|
||||||
zsh = lib.mkDefault true;
|
zsh = lib.mkDefault true;
|
||||||
yubikey = lib.mkDefault true;
|
yubikey = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
server = {
|
server = {
|
||||||
ssh = lib.mkDefault true;
|
ssh = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -11,6 +11,7 @@
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
impermanence = lib.mkDefault true;
|
impermanence = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -44,6 +44,7 @@
|
||||||
lowBattery = lib.mkDefault true;
|
lowBattery = lib.mkDefault true;
|
||||||
lanzaboote = lib.mkDefault true;
|
lanzaboote = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
optional = {
|
optional = {
|
||||||
gaming = lib.mkDefault true;
|
gaming = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -44,6 +44,7 @@
|
||||||
lowBattery = lib.mkDefault true;
|
lowBattery = lib.mkDefault true;
|
||||||
lanzaboote = lib.mkDefault true;
|
lanzaboote = lib.mkDefault true;
|
||||||
autologin = lib.mkDefault true;
|
autologin = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
|
|
||||||
server = {
|
server = {
|
||||||
ssh = lib.mkDefault true;
|
ssh = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -11,6 +11,7 @@
|
||||||
time = lib.mkDefault true;
|
time = lib.mkDefault true;
|
||||||
users = lib.mkDefault true;
|
users = lib.mkDefault true;
|
||||||
sops = lib.mkDefault true;
|
sops = lib.mkDefault true;
|
||||||
|
boot = lib.mkDefault true;
|
||||||
server = {
|
server = {
|
||||||
general = lib.mkDefault true;
|
general = lib.mkDefault true;
|
||||||
packages = lib.mkDefault true;
|
packages = lib.mkDefault true;
|
||||||
|
|
|
||||||
|
|
@ -1,5 +1,5 @@
|
||||||
{
|
{
|
||||||
"data": "ENC[AES256_GCM,data:PW4DwwvVLuaUtuvJr/h+Zx+8V1i1D3hVlATFr5yI5nykn7T/ZLf7lJFYJGqms9DHExxiGmYNWCXkFrRqOnKpBajxUuuljaE0Yd4bxIga4hF5KC+nJS5BGT9tVOQfp/sopJvp7QjxLKBcZcZ9uya2+DhxJdhmtRUj5A04ze68PsQMl4zuU7Y=,iv:1rblF4XnYDHpwz0Sl6E/3Xd9ITP5KWC8Qm5Ghf+TaTI=,tag:JmxpswTJZO7y9D4hQEn1Gw==,type:str]",
|
"data": "ENC[AES256_GCM,data:8qexHpKJg6o1Fb9H50I3H25UOpNFs2sQl2hd3B2hdJRTjc96aVgTgI838Fnn7G6mFBpHqP0SFCU0/CP6SKqbhJ6SucrfpQN/RqZlSCxmuZi3sqv3voNd7/5JzY0D/5XUTfzHkeEA34HS0GcNLLY7m+QskfJdqGSMB5P++88xCNETqv+sRPVegm1ZGttj+tttesLkAcIU0556WiQhyIcpR4ZiO75NWRFerOmb4LxADR+bwBfesfGUfjflsqOSJll17N9SECSWE7o75Ojn+yde/EznK+zQlsCYvPp90d2xU6dpdRNtp9jrjvXvEVCmcwjIqIKXqurc2CU=,iv:xBYgbmjHwhbH+7WR5MLVysrChxr6rERo6WZuu07sUS0=,tag:vMoMu9mrrGRTA3oO2wsnWw==,type:str]",
|
||||||
"sops": {
|
"sops": {
|
||||||
"age": [
|
"age": [
|
||||||
{
|
{
|
||||||
|
|
@ -27,8 +27,8 @@
|
||||||
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBibGlMSU4vUEF5UlNVZzlr\nMTMyOFY2Zi8rZFdZT1JrelZEUUZkZHFvOFdzCjVPbVovaU9nZklJQWNZeDJZNm0r\nMXBIK2hsZEY0NElxTVVMWmN6WU1Ld28KLS0tIENaallkK05SMllia3prV25hZDR2\nZDBNU0dYYnJESG1JZGpvSGp1WW9UMVEKJgfdLp7BRXvyAekecNJiaBXmxSj1qNxx\nZeHceqEkfWV/PzX+RP4LHjXTQCLEOJijbKxDmxSsYq49hC9xjZASuw==\n-----END AGE ENCRYPTED FILE-----\n"
|
"enc": "-----BEGIN AGE ENCRYPTED FILE-----\nYWdlLWVuY3J5cHRpb24ub3JnL3YxCi0+IFgyNTUxOSBibGlMSU4vUEF5UlNVZzlr\nMTMyOFY2Zi8rZFdZT1JrelZEUUZkZHFvOFdzCjVPbVovaU9nZklJQWNZeDJZNm0r\nMXBIK2hsZEY0NElxTVVMWmN6WU1Ld28KLS0tIENaallkK05SMllia3prV25hZDR2\nZDBNU0dYYnJESG1JZGpvSGp1WW9UMVEKJgfdLp7BRXvyAekecNJiaBXmxSj1qNxx\nZeHceqEkfWV/PzX+RP4LHjXTQCLEOJijbKxDmxSsYq49hC9xjZASuw==\n-----END AGE ENCRYPTED FILE-----\n"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"lastmodified": "2025-07-03T16:55:42Z",
|
"lastmodified": "2025-07-22T17:19:04Z",
|
||||||
"mac": "ENC[AES256_GCM,data:+k6CeK5XiwsJJtvqr/NnRQvERqsV46tQoDnY6L5ptKQLyhMC8HPhrfn/LTJmRNqA8VXaDwSqm8zn+l8mJK55P/kZeeuLSmsvSYIgKlbp6naAbhyWM/q7IsT1fOAmFGKuG5nKaOy+ufxaXwIWWRPejmi9i+gmEw2FOTNimwyOqwc=,iv:q6P6QuipKMGc5i5oZ7XoU/qkbgo4X/SejfJUorAGb1M=,tag:sGfym1AaYAYHEzwDC5Dgsg==,type:str]",
|
"mac": "ENC[AES256_GCM,data:r1h9ouXb8o8Vk3/l3SX6hxbPApMn4BcCIs52Jhv9s9RYURMGb9qqPipbX7yFIYDBMka2qJJ0BneJz2EI60nTxx+QqATImR2oot2U6iONrelgs+AL3We//xpHOVHSxQ9XMmeEOcVqXEU3u843jV1RElxarRCwB9yM6IWTPx2qNzA=,iv:bS571Ddgz6Fbhyxy2bL/087ZTD7egcvPoLXD9uF8aN0=,tag:HJBI6G6ivRHhJMXYrNhIKw==,type:str]",
|
||||||
"pgp": [
|
"pgp": [
|
||||||
{
|
{
|
||||||
"created_at": "2025-07-02T12:10:18Z",
|
"created_at": "2025-07-02T12:10:18Z",
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue