forked from public/stack
recreate cluster
This commit is contained in:
parent
710af7dbc7
commit
5e9c8ad4e0
|
@ -5,9 +5,9 @@ before the Kustomization exists.
|
|||
Current order:
|
||||
|
||||
* Cilium
|
||||
* Cert Manager
|
||||
* DigitalOcean
|
||||
* Cert Manager (again, to deploy the ClusterIssuer)
|
||||
* DigitalOcean Secrets
|
||||
* Cert Manager (Deploy twice)
|
||||
* DigitalOcean (Deploy twice)
|
||||
* Ingress NGINX
|
||||
* External DNS
|
||||
* Keycloak
|
||||
|
|
|
@ -0,0 +1 @@
|
|||
talos
|
|
@ -29,7 +29,6 @@ resource "digitalocean_vpc" "main" {
|
|||
ip_range = "192.168.0.0/16"
|
||||
}
|
||||
|
||||
/*
|
||||
module "digitalocean_talos_cluster" {
|
||||
source = "../../terraform_modules/digitalocean_talos_cluster"
|
||||
|
||||
|
@ -115,4 +114,3 @@ output "database" {
|
|||
output "vpc_id" {
|
||||
value = digitalocean_vpc.main.id
|
||||
}
|
||||
*/
|
||||
|
|
|
@ -1,505 +0,0 @@
|
|||
version: v1alpha1 # Indicates the schema used to decode the contents.
|
||||
debug: false # Enable verbose logging to the console.
|
||||
persist: true # Indicates whether to pull the machine config upon every boot.
|
||||
# Provides machine specific configuration options.
|
||||
machine:
|
||||
type: controlplane # Defines the role of the machine within the cluster.
|
||||
token: ukp3y7.ojx633zx5whc4kxc # The `token` is used by a machine to join the PKI of the cluster.
|
||||
# The root certificate authority of the PKI.
|
||||
ca:
|
||||
crt: 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
|
||||
key: LS0tLS1CRUdJTiBFRDI1NTE5IFBSSVZBVEUgS0VZLS0tLS0KTUM0Q0FRQXdCUVlESzJWd0JDSUVJRlZGQnFmcERkMW1seGhYbWFTL3pqYUp6bzV6TzNhcTVJSDRMZkVqSjRNdwotLS0tLUVORCBFRDI1NTE5IFBSSVZBVEUgS0VZLS0tLS0K
|
||||
# Extra certificate subject alternative names for the machine's certificate.
|
||||
certSANs: []
|
||||
# # Uncomment this to enable SANs.
|
||||
# - 10.0.0.10
|
||||
# - 172.16.0.10
|
||||
# - 192.168.0.10
|
||||
|
||||
# Used to provide additional options to the kubelet.
|
||||
kubelet:
|
||||
image: ghcr.io/siderolabs/kubelet:v1.27.1 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
# The `extraArgs` field is used to provide additional flags to the kubelet.
|
||||
extraArgs:
|
||||
node-labels: node.kubernetes.io/exclude-from-external-load-balancers=true
|
||||
defaultRuntimeSeccompProfileEnabled: true # Enable container runtime default Seccomp profile.
|
||||
disableManifestsDirectory: true # The `disableManifestsDirectory` field configures the kubelet to get static pod manifests from the /etc/kubernetes/manifests directory.
|
||||
|
||||
# # The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
|
||||
# clusterDNS:
|
||||
# - 10.96.0.10
|
||||
# - 169.254.2.53
|
||||
|
||||
# # The `extraMounts` field is used to add additional mounts to the kubelet container.
|
||||
# extraMounts:
|
||||
# - destination: /var/lib/example
|
||||
# type: bind
|
||||
# source: /var/lib/example
|
||||
# options:
|
||||
# - bind
|
||||
# - rshared
|
||||
# - rw
|
||||
|
||||
# # The `extraConfig` field is used to provide kubelet configuration overrides.
|
||||
# extraConfig:
|
||||
# serverTLSBootstrap: true
|
||||
|
||||
# # The `nodeIP` field is used to configure `--node-ip` flag for the kubelet.
|
||||
# nodeIP:
|
||||
# # The `validSubnets` field configures the networks to pick kubelet node IP from.
|
||||
# validSubnets:
|
||||
# - 10.0.0.0/8
|
||||
# - '!10.0.0.3/32'
|
||||
# - fdc7::/16
|
||||
# Provides machine specific network configuration options.
|
||||
network: {}
|
||||
# # `interfaces` is used to define the network interface configuration.
|
||||
# interfaces:
|
||||
# - interface: eth0 # The interface name.
|
||||
# # Assigns static IP addresses to the interface.
|
||||
# addresses:
|
||||
# - 192.168.2.0/24
|
||||
# # A list of routes associated with the interface.
|
||||
# routes:
|
||||
# - network: 0.0.0.0/0 # The route's network (destination).
|
||||
# gateway: 192.168.2.1 # The route's gateway (if empty, creates link scope route).
|
||||
# metric: 1024 # The optional metric for the route.
|
||||
# mtu: 1500 # The interface's MTU.
|
||||
#
|
||||
# # # Picks a network device using the selector.
|
||||
|
||||
# # # select a device with bus prefix 00:*.
|
||||
# # deviceSelector:
|
||||
# # busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # # select a device with mac address matching `*:f0:ab` and `virtio` kernel driver.
|
||||
# # deviceSelector:
|
||||
# # hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
# # # select a device with bus prefix 00:*, a device with mac address matching `*:f0:ab` and `virtio` kernel driver.
|
||||
# # deviceSelector:
|
||||
# # - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
|
||||
# # # Bond specific options.
|
||||
# # bond:
|
||||
# # # The interfaces that make up the bond.
|
||||
# # interfaces:
|
||||
# # - eth0
|
||||
# # - eth1
|
||||
# # # Picks a network device using the selector.
|
||||
# # deviceSelectors:
|
||||
# # - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
# # mode: 802.3ad # A bond option.
|
||||
# # lacpRate: fast # A bond option.
|
||||
|
||||
# # # Bridge specific options.
|
||||
# # bridge:
|
||||
# # # The interfaces that make up the bridge.
|
||||
# # interfaces:
|
||||
# # - eth0
|
||||
# # - eth1
|
||||
# # # A bridge option.
|
||||
# # stp:
|
||||
# # enabled: true # Whether Spanning Tree Protocol (STP) is enabled.
|
||||
|
||||
# # # Indicates if DHCP should be used to configure the interface.
|
||||
# # dhcp: true
|
||||
|
||||
# # # DHCP specific options.
|
||||
# # dhcpOptions:
|
||||
# # routeMetric: 1024 # The priority of all routes received via DHCP.
|
||||
|
||||
# # # Wireguard specific configuration.
|
||||
|
||||
# # # wireguard server example
|
||||
# # wireguard:
|
||||
# # privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).
|
||||
# # listenPort: 51111 # Specifies a device's listening port.
|
||||
# # # Specifies a list of peer configurations to apply to a device.
|
||||
# # peers:
|
||||
# # - publicKey: ABCDEF... # Specifies the public key of this peer.
|
||||
# # endpoint: 192.168.1.3 # Specifies the endpoint of this peer entry.
|
||||
# # # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.
|
||||
# # allowedIPs:
|
||||
# # - 192.168.1.0/24
|
||||
# # # wireguard peer example
|
||||
# # wireguard:
|
||||
# # privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).
|
||||
# # # Specifies a list of peer configurations to apply to a device.
|
||||
# # peers:
|
||||
# # - publicKey: ABCDEF... # Specifies the public key of this peer.
|
||||
# # endpoint: 192.168.1.2:51822 # Specifies the endpoint of this peer entry.
|
||||
# # persistentKeepaliveInterval: 10s # Specifies the persistent keepalive interval for this peer.
|
||||
# # # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.
|
||||
# # allowedIPs:
|
||||
# # - 192.168.1.0/24
|
||||
|
||||
# # # Virtual (shared) IP address configuration.
|
||||
|
||||
# # # layer2 vip example
|
||||
# # vip:
|
||||
# # ip: 172.16.199.55 # Specifies the IP address to be used.
|
||||
|
||||
# # Used to statically set the nameservers for the machine.
|
||||
# nameservers:
|
||||
# - 8.8.8.8
|
||||
# - 1.1.1.1
|
||||
|
||||
# # Allows for extra entries to be added to the `/etc/hosts` file
|
||||
# extraHostEntries:
|
||||
# - ip: 192.168.1.100 # The IP of the host.
|
||||
# # The host alias.
|
||||
# aliases:
|
||||
# - example
|
||||
# - example.domain.tld
|
||||
|
||||
# # Configures KubeSpan feature.
|
||||
# kubespan:
|
||||
# enabled: true # Enable the KubeSpan feature.
|
||||
|
||||
# Used to provide instructions for installations.
|
||||
install:
|
||||
disk: /dev/sda # The disk used for installations.
|
||||
image: ghcr.io/siderolabs/installer:v1.4.4 # Allows for supplying the image used to perform the installation.
|
||||
bootloader: true # Indicates if a bootloader should be installed.
|
||||
wipe: false # Indicates if the installation disk should be wiped at installation time.
|
||||
|
||||
# # Look up disk using disk attributes like model, size, serial and others.
|
||||
# diskSelector:
|
||||
# size: 4GB # Disk size.
|
||||
# model: WDC* # Disk model `/sys/block/<dev>/device/model`.
|
||||
# busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.
|
||||
|
||||
# # Allows for supplying extra kernel args via the bootloader.
|
||||
# extraKernelArgs:
|
||||
# - talos.platform=metal
|
||||
# - reboot=k
|
||||
|
||||
# # Allows for supplying additional system extension images to install on top of base Talos image.
|
||||
# extensions:
|
||||
# - image: ghcr.io/siderolabs/gvisor:20220117.0-v1.0.0 # System extension image.
|
||||
# Features describe individual Talos features that can be switched on or off.
|
||||
features:
|
||||
rbac: true # Enable role-based access control (RBAC).
|
||||
stableHostname: true # Enable stable default hostname.
|
||||
apidCheckExtKeyUsage: true # Enable checks for extended key usage of client certificates in apid.
|
||||
|
||||
# # Configure Talos API access from Kubernetes pods.
|
||||
# kubernetesTalosAPIAccess:
|
||||
# enabled: true # Enable Talos API access from Kubernetes pods.
|
||||
# # The list of Talos API roles which can be granted for access from Kubernetes pods.
|
||||
# allowedRoles:
|
||||
# - os:reader
|
||||
# # The list of Kubernetes namespaces Talos API access is available from.
|
||||
# allowedKubernetesNamespaces:
|
||||
# - kube-system
|
||||
|
||||
# # Provides machine specific control plane configuration options.
|
||||
|
||||
# # ControlPlane definition example.
|
||||
# controlPlane:
|
||||
# # Controller manager machine specific configuration options.
|
||||
# controllerManager:
|
||||
# disabled: false # Disable kube-controller-manager on the node.
|
||||
# # Scheduler machine specific configuration options.
|
||||
# scheduler:
|
||||
# disabled: true # Disable kube-scheduler on the node.
|
||||
|
||||
# # Used to provide static pod definitions to be run by the kubelet directly bypassing the kube-apiserver.
|
||||
|
||||
# # nginx static pod.
|
||||
# pods:
|
||||
# - apiVersion: v1
|
||||
# kind: pod
|
||||
# metadata:
|
||||
# name: nginx
|
||||
# spec:
|
||||
# containers:
|
||||
# - image: nginx
|
||||
# name: nginx
|
||||
|
||||
# # Used to partition, format and mount additional disks.
|
||||
|
||||
# # MachineDisks list example.
|
||||
# disks:
|
||||
# - device: /dev/sdb # The name of the disk to use.
|
||||
# # A list of partitions to create on the disk.
|
||||
# partitions:
|
||||
# - mountpoint: /var/mnt/extra # Where to mount the partition.
|
||||
#
|
||||
# # # The size of partition: either bytes or human readable representation. If `size:` is omitted, the partition is sized to occupy the full disk.
|
||||
|
||||
# # # Human readable representation.
|
||||
# # size: 100 MB
|
||||
# # # Precise value in bytes.
|
||||
# # size: 1073741824
|
||||
|
||||
# # Allows the addition of user specified files.
|
||||
|
||||
# # MachineFiles usage example.
|
||||
# files:
|
||||
# - content: '...' # The contents of the file.
|
||||
# permissions: 0o666 # The file's permissions in octal.
|
||||
# path: /tmp/file.txt # The path of the file.
|
||||
# op: append # The operation to use
|
||||
|
||||
# # The `env` field allows for the addition of environment variables.
|
||||
|
||||
# # Environment variables definition examples.
|
||||
# env:
|
||||
# GRPC_GO_LOG_SEVERITY_LEVEL: info
|
||||
# GRPC_GO_LOG_VERBOSITY_LEVEL: "99"
|
||||
# https_proxy: http://SERVER:PORT/
|
||||
# env:
|
||||
# GRPC_GO_LOG_SEVERITY_LEVEL: error
|
||||
# https_proxy: https://USERNAME:PASSWORD@SERVER:PORT/
|
||||
# env:
|
||||
# https_proxy: http://DOMAIN\USERNAME:PASSWORD@SERVER:PORT/
|
||||
|
||||
# # Used to configure the machine's time settings.
|
||||
|
||||
# # Example configuration for cloudflare ntp server.
|
||||
# time:
|
||||
# disabled: false # Indicates if the time service is disabled for the machine.
|
||||
# # Specifies time (NTP) servers to use for setting the system time.
|
||||
# servers:
|
||||
# - time.cloudflare.com
|
||||
# bootTimeout: 2m0s # Specifies the timeout when the node time is considered to be in sync unlocking the boot sequence.
|
||||
|
||||
# # Used to configure the machine's sysctls.
|
||||
|
||||
# # MachineSysctls usage example.
|
||||
# sysctls:
|
||||
# kernel.domainname: talos.dev
|
||||
# net.ipv4.ip_forward: "0"
|
||||
|
||||
# # Used to configure the machine's sysfs.
|
||||
|
||||
# # MachineSysfs usage example.
|
||||
# sysfs:
|
||||
# devices.system.cpu.cpu0.cpufreq.scaling_governor: performance
|
||||
|
||||
# # Used to configure the machine's container image registry mirrors.
|
||||
# registries:
|
||||
# # Specifies mirror configuration for each registry host namespace.
|
||||
# mirrors:
|
||||
# ghcr.io:
|
||||
# # List of endpoints (URLs) for registry mirrors to use.
|
||||
# endpoints:
|
||||
# - https://registry.insecure
|
||||
# - https://ghcr.io/v2/
|
||||
# # Specifies TLS & auth configuration for HTTPS image registries.
|
||||
# config:
|
||||
# registry.insecure:
|
||||
# # The TLS configuration for the registry.
|
||||
# tls:
|
||||
# insecureSkipVerify: true # Skip TLS server certificate verification (not recommended).
|
||||
#
|
||||
# # # Enable mutual TLS authentication with the registry.
|
||||
# # clientIdentity:
|
||||
# # crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
|
||||
# # key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==
|
||||
#
|
||||
# # # The auth configuration for this registry.
|
||||
# # auth:
|
||||
# # username: username # Optional registry authentication.
|
||||
# # password: password # Optional registry authentication.
|
||||
|
||||
# # Machine system disk encryption configuration.
|
||||
# systemDiskEncryption:
|
||||
# # Ephemeral partition encryption.
|
||||
# ephemeral:
|
||||
# provider: luks2 # Encryption provider to use for the encryption.
|
||||
# # Defines the encryption keys generation and storage method.
|
||||
# keys:
|
||||
# - # Deterministically generated key from the node UUID and PartitionLabel.
|
||||
# nodeID: {}
|
||||
# slot: 0 # Key slot number for LUKS2 encryption.
|
||||
#
|
||||
# # # Cipher kind to use for the encryption. Depends on the encryption provider.
|
||||
# # cipher: aes-xts-plain64
|
||||
|
||||
# # # Defines the encryption sector size.
|
||||
# # blockSize: 4096
|
||||
|
||||
# # # Additional --perf parameters for the LUKS2 encryption.
|
||||
# # options:
|
||||
# # - no_read_workqueue
|
||||
# # - no_write_workqueue
|
||||
|
||||
# # Configures the udev system.
|
||||
# udev:
|
||||
# # List of udev rules to apply to the udev system
|
||||
# rules:
|
||||
# - SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="44", MODE="0660"
|
||||
|
||||
# # Configures the logging system.
|
||||
# logging:
|
||||
# # Logging destination.
|
||||
# destinations:
|
||||
# - endpoint: tcp://1.2.3.4:12345 # Where to send logs. Supported protocols are "tcp" and "udp".
|
||||
# format: json_lines # Logs format.
|
||||
|
||||
# # Configures the kernel.
|
||||
# kernel:
|
||||
# # Kernel modules to load.
|
||||
# modules:
|
||||
# - name: brtfs # Module name.
|
||||
|
||||
# # Configures the seccomp profiles for the machine.
|
||||
# seccompProfiles:
|
||||
# - name: audit.json # The `name` field is used to provide the file name of the seccomp profile.
|
||||
# # The `value` field is used to provide the seccomp profile.
|
||||
# value:
|
||||
# defaultAction: SCMP_ACT_LOG
|
||||
|
||||
# # Configures the node labels for the machine.
|
||||
|
||||
# # node labels example.
|
||||
# nodeLabels:
|
||||
# exampleLabel: exampleLabelValue
|
||||
# Provides cluster specific configuration options.
|
||||
cluster:
|
||||
id: AomznMVjQrZCD-Bm1a6DORI8GLZOVYwikdQEr0qI31g= # Globally unique identifier for this cluster (base64 encoded random 32 bytes).
|
||||
secret: O/0Q2iNvQ8HYaET+D/4/tw4KJaFIIWo5UYn98vbHGUE= # Shared secret of cluster (base64 encoded random 32 bytes).
|
||||
# Provides control plane specific configuration options.
|
||||
controlPlane:
|
||||
endpoint: https://24.199.76.219:6443 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname.
|
||||
clusterName: distrust # Configures the cluster's name.
|
||||
# Provides cluster specific network configuration options.
|
||||
network:
|
||||
# The CNI used.
|
||||
cni:
|
||||
name: none # Name of CNI to use.
|
||||
dnsDomain: cluster.local # The domain used by Kubernetes DNS.
|
||||
# The pod subnet CIDR.
|
||||
podSubnets:
|
||||
- 10.244.0.0/16
|
||||
# The service subnet CIDR.
|
||||
serviceSubnets:
|
||||
- 10.96.0.0/12
|
||||
token: pye8s4.xbsov4gw0wvrshzm # The [bootstrap token](https://kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/) used to join the cluster.
|
||||
secretboxEncryptionSecret: yW/XHbD87zaf+5JFwT5/YqadB26ZGU9gBrlDEREiFYA= # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).
|
||||
# The base64 encoded root certificate authority used by Kubernetes.
|
||||
ca:
|
||||
crt: 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
|
||||
key: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUk4cGJ3ZXR6YkRlNU1LeTk5NHJTT3ZSTmJnSzFlQnZYaFBLd2pXY1RuNkVvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFK2dkOVErTVpqZkFseTFIZlNJdjdLd0NhWVp5VDJMTmNIZkNMdUFOS2k3cXZ4S3BybkhiZgpmeHJQTk5uNjBOVHNMc1YrMXUvZ0dWczNOemZqQk1QblhnPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
# The base64 encoded aggregator certificate authority used by Kubernetes for front-proxy certificate generation.
|
||||
aggregatorCA:
|
||||
crt: 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
|
||||
key: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUdiZUVPRURJQ2lIM292dTNTQWdqNHd6SHhqK0oxWWl2SHd0MzFPc0lCQUtvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFT1JtMkRvOVZoS0RCbnVVTkc0cTR2WEw4S2s0WTRGWk1jVytveGJxTmVqTkpVOHFtdTBmLwpaZ2dvWTcxWXhZZEdtTFFDWFlIMk56OG9FSHg3T2Q5RUZBPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
# The base64 encoded private key for service account token generation.
|
||||
serviceAccount:
|
||||
key: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUNSNmJBV1hlUWVYUTBYRTlnT1RzdTZ3REh1aHNHMDFGUnExQmZydzRNR05vQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFWXRmaVlqUitFQUlka2R3dVhMMXA5OTl3VjNQa3Q5bDl5SUhPKzFSR0ZEY1ZNU2RvV01XMgp3YTNhZVovMS81eS9jdFFHVmxlVzJXcUs2RnNFQnZNeGp3PT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
# API server specific configuration options.
|
||||
apiServer:
|
||||
image: registry.k8s.io/kube-apiserver:v1.27.1 # The container image used in the API server manifest.
|
||||
# Extra certificate subject alternative names for the API server's certificate.
|
||||
certSANs:
|
||||
- 24.199.76.219
|
||||
disablePodSecurityPolicy: true # Disable PodSecurityPolicy in the API server and default manifests.
|
||||
# Configure the API server admission plugins.
|
||||
admissionControl:
|
||||
- name: PodSecurity # Name is the name of the admission controller.
|
||||
# Configuration is an embedded configuration object to be used as the plugin's
|
||||
configuration:
|
||||
apiVersion: pod-security.admission.config.k8s.io/v1alpha1
|
||||
defaults:
|
||||
audit: restricted
|
||||
audit-version: latest
|
||||
enforce: baseline
|
||||
enforce-version: latest
|
||||
warn: restricted
|
||||
warn-version: latest
|
||||
exemptions:
|
||||
namespaces:
|
||||
- kube-system
|
||||
runtimeClasses: []
|
||||
usernames: []
|
||||
kind: PodSecurityConfiguration
|
||||
# Configure the API server audit policy.
|
||||
auditPolicy:
|
||||
apiVersion: audit.k8s.io/v1
|
||||
kind: Policy
|
||||
rules:
|
||||
- level: Metadata
|
||||
# Controller manager server specific configuration options.
|
||||
controllerManager:
|
||||
image: registry.k8s.io/kube-controller-manager:v1.27.1 # The container image used in the controller manager manifest.
|
||||
# Kube-proxy server-specific configuration options
|
||||
proxy:
|
||||
image: registry.k8s.io/kube-proxy:v1.27.1 # The container image used in the kube-proxy manifest.
|
||||
|
||||
# # Disable kube-proxy deployment on cluster bootstrap.
|
||||
# disabled: false
|
||||
# Scheduler server specific configuration options.
|
||||
scheduler:
|
||||
image: registry.k8s.io/kube-scheduler:v1.27.1 # The container image used in the scheduler manifest.
|
||||
# Configures cluster member discovery.
|
||||
discovery:
|
||||
enabled: true # Enable the cluster membership discovery feature.
|
||||
# Configure registries used for cluster member discovery.
|
||||
registries:
|
||||
# Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information
|
||||
kubernetes:
|
||||
disabled: true # Disable Kubernetes discovery registry.
|
||||
# Service registry is using an external service to push and pull information about cluster members.
|
||||
service: {}
|
||||
# # External service endpoint.
|
||||
# endpoint: https://discovery.talos.dev/
|
||||
# Etcd specific configuration options.
|
||||
etcd:
|
||||
# The `ca` is the root certificate authority of the PKI.
|
||||
ca:
|
||||
crt: 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
|
||||
key: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSU5TNDJhd3gyazdnYk5JN3Rmam84MnFqTXc5N2ZobW5GY2oySFJMYnY1TXBvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFeVAxbHNEbnNlVmRtL3pYemx1RWhsRHFHazZOeUZ0am1xaG53VGJPSmJZMG4zcGtkdWdkTworMVhwOW5weERZMENlRmVDSjY5cDVjWlQrcVk0cVZVcnlnPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
|
||||
# # The container image used to create the etcd service.
|
||||
# image: gcr.io/etcd-development/etcd:v3.5.8
|
||||
|
||||
# # The `advertisedSubnets` field configures the networks to pick etcd advertised IP from.
|
||||
# advertisedSubnets:
|
||||
# - 10.0.0.0/8
|
||||
|
||||
# # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).
|
||||
|
||||
# # Decryption secret example (do not use in production!).
|
||||
# aescbcEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM=
|
||||
|
||||
# # Core DNS specific configuration options.
|
||||
# coreDNS:
|
||||
# image: docker.io/coredns/coredns:1.10.1 # The `image` field is an override to the default coredns image.
|
||||
|
||||
# # External cloud provider configuration.
|
||||
# externalCloudProvider:
|
||||
# enabled: true # Enable external cloud provider.
|
||||
# # A list of urls that point to additional manifests for an external cloud provider.
|
||||
# manifests:
|
||||
# - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml
|
||||
# - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml
|
||||
|
||||
# # A list of urls that point to additional manifests.
|
||||
# extraManifests:
|
||||
# - https://www.example.com/manifest1.yaml
|
||||
# - https://www.example.com/manifest2.yaml
|
||||
|
||||
# # A map of key value pairs that will be added while fetching the extraManifests.
|
||||
# extraManifestHeaders:
|
||||
# Token: "1234567"
|
||||
# X-ExtraInfo: info
|
||||
|
||||
# # A list of inline Kubernetes manifests.
|
||||
# inlineManifests:
|
||||
# - name: namespace-ci # Name of the manifest.
|
||||
# contents: |- # Manifest contents as a string.
|
||||
# apiVersion: v1
|
||||
# kind: Namespace
|
||||
# metadata:
|
||||
# name: ci
|
||||
|
||||
# # Settings for admin kubeconfig generation.
|
||||
# adminKubeconfig:
|
||||
# certLifetime: 1h0m0s # Admin kubeconfig certificate lifetime (default is 1 year).
|
|
@ -1,19 +0,0 @@
|
|||
apiVersion: v1
|
||||
kind: Config
|
||||
clusters:
|
||||
- name: distrust
|
||||
cluster:
|
||||
server: https://24.199.76.219:6443
|
||||
certificate-authority-data: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJpakNDQVRDZ0F3SUJBZ0lSQUpxcC9saTRpVW5mMmtUWEF6ZkRBb1F3Q2dZSUtvWkl6ajBFQXdJd0ZURVQKTUJFR0ExVUVDaE1LYTNWaVpYSnVaWFJsY3pBZUZ3MHlNekExTVRNd05EVXhNamRhRncwek16QTFNVEF3TkRVeApNamRhTUJVeEV6QVJCZ05WQkFvVENtdDFZbVZ5Ym1WMFpYTXdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CCkJ3TkNBQVQ2QjMxRDR4bU44Q1hMVWQ5SWkvc3JBSnBobkpQWXMxd2Q4SXU0QTBxTHVxL0VxbXVjZHQ5L0dzODAKMmZyUTFPd3V4WDdXNytBWld6YzNOK01FdytkZW8yRXdYekFPQmdOVkhROEJBZjhFQkFNQ0FvUXdIUVlEVlIwbApCQll3RkFZSUt3WUJCUVVIQXdFR0NDc0dBUVVGQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0hRWURWUjBPCkJCWUVGQmlUeDBOSHlTaG5pMHY4S1NOMmMwOUF1SlN3TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSUNOMHhDK2MKOFdNL1JHM0ZBQW9Md3BWaThPRmZjaFZoSTJXdFE4QmlTd1QxQWlFQXRvclZLajZPeDJsQUEzSUhtU3hsRjhGYgpoZ2pBVm9jWWlVdk9EKzN2OFpBPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
|
||||
users:
|
||||
- name: admin@distrust
|
||||
user:
|
||||
client-certificate-data: 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
|
||||
client-key-data: LS0tLS1CRUdJTiBFQyBQUklWQVRFIEtFWS0tLS0tCk1IY0NBUUVFSUswTzR4TzBJZHNLZS84ZWNXT09iM2tON21QTDJYcm1zQmhUSHVNQlJEbUZvQW9HQ0NxR1NNNDkKQXdFSG9VUURRZ0FFQXNmNDdDQzl5SjN1bHdkWk9td284Rkh4MnhhR1VPajlRNkhOUkpRVHE5K0IvU29TK1V0Uwp1cjN3bUlCeE1FczBPUTZ3STRlYmdHeXRPRGdLdW9yS0xRPT0KLS0tLS1FTkQgRUMgUFJJVkFURSBLRVktLS0tLQo=
|
||||
contexts:
|
||||
- context:
|
||||
cluster: distrust
|
||||
namespace: default
|
||||
user: admin@distrust
|
||||
name: admin@distrust
|
||||
current-context: admin@distrust
|
|
@ -1,12 +0,0 @@
|
|||
context: distrust
|
||||
contexts:
|
||||
distrust:
|
||||
endpoints:
|
||||
- 164.92.92.199
|
||||
nodes:
|
||||
- 164.92.92.199
|
||||
- 143.198.227.143
|
||||
- 143.198.227.174
|
||||
ca: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJQekNCOHFBREFnRUNBaEVBMDc5N0NWOEdUSUdYVFg5bmVkcWd6ekFGQmdNclpYQXdFREVPTUF3R0ExVUUKQ2hNRmRHRnNiM013SGhjTk1qTXdOVEV6TURRMU1USTNXaGNOTXpNd05URXdNRFExTVRJM1dqQVFNUTR3REFZRApWUVFLRXdWMFlXeHZjekFxTUFVR0F5dGxjQU1oQURSRXFBbXI3MFcyNDlHS3JpbVlxSUpTTlhaS2xUNXBURXpPCkpqZEd5K0llbzJFd1h6QU9CZ05WSFE4QkFmOEVCQU1DQW9Rd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUcKQ0NzR0FRVUZCd01DTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SFFZRFZSME9CQllFRkRDU01oREN5L1ZqVEwrWQpvZFFhZ2EyVEZzYm1NQVVHQXl0bGNBTkJBTzRnYnZzMzJQQTZBcnRRVHpxb1RUS2QybjJydjM4RlkzQ0dIVDFKCm9xMlE5ajZER1hwMHhaYm9mTnFleWJYeHJBZUx0MjlWRDgxWXRXWUMzYWNoUndrPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
|
||||
crt: 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
|
||||
key: LS0tLS1CRUdJTiBFRDI1NTE5IFBSSVZBVEUgS0VZLS0tLS0KTUM0Q0FRQXdCUVlESzJWd0JDSUVJSzZleDY5eDZVb3FBWTRjZmxqa1JUV2JTZEREdnkvVVpWUG9pRkg1Z1ZRUQotLS0tLUVORCBFRDI1NTE5IFBSSVZBVEUgS0VZLS0tLS0K
|
|
@ -1,537 +0,0 @@
|
|||
version: v1alpha1 # Indicates the schema used to decode the contents.
|
||||
debug: false # Enable verbose logging to the console.
|
||||
persist: true # Indicates whether to pull the machine config upon every boot.
|
||||
# Provides machine specific configuration options.
|
||||
machine:
|
||||
type: worker # Defines the role of the machine within the cluster.
|
||||
token: ukp3y7.ojx633zx5whc4kxc # The `token` is used by a machine to join the PKI of the cluster.
|
||||
# The root certificate authority of the PKI.
|
||||
ca:
|
||||
crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJQekNCOHFBREFnRUNBaEVBMDc5N0NWOEdUSUdYVFg5bmVkcWd6ekFGQmdNclpYQXdFREVPTUF3R0ExVUUKQ2hNRmRHRnNiM013SGhjTk1qTXdOVEV6TURRMU1USTNXaGNOTXpNd05URXdNRFExTVRJM1dqQVFNUTR3REFZRApWUVFLRXdWMFlXeHZjekFxTUFVR0F5dGxjQU1oQURSRXFBbXI3MFcyNDlHS3JpbVlxSUpTTlhaS2xUNXBURXpPCkpqZEd5K0llbzJFd1h6QU9CZ05WSFE4QkFmOEVCQU1DQW9Rd0hRWURWUjBsQkJZd0ZBWUlLd1lCQlFVSEF3RUcKQ0NzR0FRVUZCd01DTUE4R0ExVWRFd0VCL3dRRk1BTUJBZjh3SFFZRFZSME9CQllFRkRDU01oREN5L1ZqVEwrWQpvZFFhZ2EyVEZzYm1NQVVHQXl0bGNBTkJBTzRnYnZzMzJQQTZBcnRRVHpxb1RUS2QybjJydjM4RlkzQ0dIVDFKCm9xMlE5ajZER1hwMHhaYm9mTnFleWJYeHJBZUx0MjlWRDgxWXRXWUMzYWNoUndrPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
|
||||
key: ""
|
||||
# Extra certificate subject alternative names for the machine's certificate.
|
||||
certSANs: []
|
||||
# # Uncomment this to enable SANs.
|
||||
# - 10.0.0.10
|
||||
# - 172.16.0.10
|
||||
# - 192.168.0.10
|
||||
|
||||
# Used to provide additional options to the kubelet.
|
||||
kubelet:
|
||||
image: ghcr.io/siderolabs/kubelet:v1.27.1 # The `image` field is an optional reference to an alternative kubelet image.
|
||||
defaultRuntimeSeccompProfileEnabled: true # Enable container runtime default Seccomp profile.
|
||||
disableManifestsDirectory: true # The `disableManifestsDirectory` field configures the kubelet to get static pod manifests from the /etc/kubernetes/manifests directory.
|
||||
|
||||
# # The `ClusterDNS` field is an optional reference to an alternative kubelet clusterDNS ip list.
|
||||
# clusterDNS:
|
||||
# - 10.96.0.10
|
||||
# - 169.254.2.53
|
||||
|
||||
# # The `extraArgs` field is used to provide additional flags to the kubelet.
|
||||
# extraArgs:
|
||||
# key: value
|
||||
|
||||
# # The `extraMounts` field is used to add additional mounts to the kubelet container.
|
||||
# extraMounts:
|
||||
# - destination: /var/lib/example
|
||||
# type: bind
|
||||
# source: /var/lib/example
|
||||
# options:
|
||||
# - bind
|
||||
# - rshared
|
||||
# - rw
|
||||
|
||||
# # The `extraConfig` field is used to provide kubelet configuration overrides.
|
||||
# extraConfig:
|
||||
# serverTLSBootstrap: true
|
||||
|
||||
# # The `nodeIP` field is used to configure `--node-ip` flag for the kubelet.
|
||||
# nodeIP:
|
||||
# # The `validSubnets` field configures the networks to pick kubelet node IP from.
|
||||
# validSubnets:
|
||||
# - 10.0.0.0/8
|
||||
# - '!10.0.0.3/32'
|
||||
# - fdc7::/16
|
||||
# Provides machine specific network configuration options.
|
||||
network: {}
|
||||
# # `interfaces` is used to define the network interface configuration.
|
||||
# interfaces:
|
||||
# - interface: eth0 # The interface name.
|
||||
# # Assigns static IP addresses to the interface.
|
||||
# addresses:
|
||||
# - 192.168.2.0/24
|
||||
# # A list of routes associated with the interface.
|
||||
# routes:
|
||||
# - network: 0.0.0.0/0 # The route's network (destination).
|
||||
# gateway: 192.168.2.1 # The route's gateway (if empty, creates link scope route).
|
||||
# metric: 1024 # The optional metric for the route.
|
||||
# mtu: 1500 # The interface's MTU.
|
||||
#
|
||||
# # # Picks a network device using the selector.
|
||||
|
||||
# # # select a device with bus prefix 00:*.
|
||||
# # deviceSelector:
|
||||
# # busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # # select a device with mac address matching `*:f0:ab` and `virtio` kernel driver.
|
||||
# # deviceSelector:
|
||||
# # hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
# # # select a device with bus prefix 00:*, a device with mac address matching `*:f0:ab` and `virtio` kernel driver.
|
||||
# # deviceSelector:
|
||||
# # - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
|
||||
# # # Bond specific options.
|
||||
# # bond:
|
||||
# # # The interfaces that make up the bond.
|
||||
# # interfaces:
|
||||
# # - eth0
|
||||
# # - eth1
|
||||
# # # Picks a network device using the selector.
|
||||
# # deviceSelectors:
|
||||
# # - busPath: 00:* # PCI, USB bus prefix, supports matching by wildcard.
|
||||
# # - hardwareAddr: '*:f0:ab' # Device hardware address, supports matching by wildcard.
|
||||
# # driver: virtio # Kernel driver, supports matching by wildcard.
|
||||
# # mode: 802.3ad # A bond option.
|
||||
# # lacpRate: fast # A bond option.
|
||||
|
||||
# # # Bridge specific options.
|
||||
# # bridge:
|
||||
# # # The interfaces that make up the bridge.
|
||||
# # interfaces:
|
||||
# # - eth0
|
||||
# # - eth1
|
||||
# # # A bridge option.
|
||||
# # stp:
|
||||
# # enabled: true # Whether Spanning Tree Protocol (STP) is enabled.
|
||||
|
||||
# # # Indicates if DHCP should be used to configure the interface.
|
||||
# # dhcp: true
|
||||
|
||||
# # # DHCP specific options.
|
||||
# # dhcpOptions:
|
||||
# # routeMetric: 1024 # The priority of all routes received via DHCP.
|
||||
|
||||
# # # Wireguard specific configuration.
|
||||
|
||||
# # # wireguard server example
|
||||
# # wireguard:
|
||||
# # privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).
|
||||
# # listenPort: 51111 # Specifies a device's listening port.
|
||||
# # # Specifies a list of peer configurations to apply to a device.
|
||||
# # peers:
|
||||
# # - publicKey: ABCDEF... # Specifies the public key of this peer.
|
||||
# # endpoint: 192.168.1.3 # Specifies the endpoint of this peer entry.
|
||||
# # # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.
|
||||
# # allowedIPs:
|
||||
# # - 192.168.1.0/24
|
||||
# # # wireguard peer example
|
||||
# # wireguard:
|
||||
# # privateKey: ABCDEF... # Specifies a private key configuration (base64 encoded).
|
||||
# # # Specifies a list of peer configurations to apply to a device.
|
||||
# # peers:
|
||||
# # - publicKey: ABCDEF... # Specifies the public key of this peer.
|
||||
# # endpoint: 192.168.1.2:51822 # Specifies the endpoint of this peer entry.
|
||||
# # persistentKeepaliveInterval: 10s # Specifies the persistent keepalive interval for this peer.
|
||||
# # # AllowedIPs specifies a list of allowed IP addresses in CIDR notation for this peer.
|
||||
# # allowedIPs:
|
||||
# # - 192.168.1.0/24
|
||||
|
||||
# # # Virtual (shared) IP address configuration.
|
||||
|
||||
# # # layer2 vip example
|
||||
# # vip:
|
||||
# # ip: 172.16.199.55 # Specifies the IP address to be used.
|
||||
|
||||
# # Used to statically set the nameservers for the machine.
|
||||
# nameservers:
|
||||
# - 8.8.8.8
|
||||
# - 1.1.1.1
|
||||
|
||||
# # Allows for extra entries to be added to the `/etc/hosts` file
|
||||
# extraHostEntries:
|
||||
# - ip: 192.168.1.100 # The IP of the host.
|
||||
# # The host alias.
|
||||
# aliases:
|
||||
# - example
|
||||
# - example.domain.tld
|
||||
|
||||
# # Configures KubeSpan feature.
|
||||
# kubespan:
|
||||
# enabled: true # Enable the KubeSpan feature.
|
||||
|
||||
# Used to provide instructions for installations.
|
||||
install:
|
||||
disk: /dev/sda # The disk used for installations.
|
||||
image: ghcr.io/siderolabs/installer:v1.4.4 # Allows for supplying the image used to perform the installation.
|
||||
bootloader: true # Indicates if a bootloader should be installed.
|
||||
wipe: false # Indicates if the installation disk should be wiped at installation time.
|
||||
|
||||
# # Look up disk using disk attributes like model, size, serial and others.
|
||||
# diskSelector:
|
||||
# size: 4GB # Disk size.
|
||||
# model: WDC* # Disk model `/sys/block/<dev>/device/model`.
|
||||
# busPath: /pci0000:00/0000:00:17.0/ata1/host0/target0:0:0/0:0:0:0 # Disk bus path.
|
||||
|
||||
# # Allows for supplying extra kernel args via the bootloader.
|
||||
# extraKernelArgs:
|
||||
# - talos.platform=metal
|
||||
# - reboot=k
|
||||
|
||||
# # Allows for supplying additional system extension images to install on top of base Talos image.
|
||||
# extensions:
|
||||
# - image: ghcr.io/siderolabs/gvisor:20220117.0-v1.0.0 # System extension image.
|
||||
# Used to configure the machine's container image registry mirrors.
|
||||
registries: {}
|
||||
# # Specifies mirror configuration for each registry host namespace.
|
||||
# mirrors:
|
||||
# ghcr.io:
|
||||
# # List of endpoints (URLs) for registry mirrors to use.
|
||||
# endpoints:
|
||||
# - https://registry.insecure
|
||||
# - https://ghcr.io/v2/
|
||||
|
||||
# # Specifies TLS & auth configuration for HTTPS image registries.
|
||||
# config:
|
||||
# registry.insecure:
|
||||
# # The TLS configuration for the registry.
|
||||
# tls:
|
||||
# insecureSkipVerify: true # Skip TLS server certificate verification (not recommended).
|
||||
#
|
||||
# # # Enable mutual TLS authentication with the registry.
|
||||
# # clientIdentity:
|
||||
# # crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
|
||||
# # key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==
|
||||
#
|
||||
# # # The auth configuration for this registry.
|
||||
# # auth:
|
||||
# # username: username # Optional registry authentication.
|
||||
# # password: password # Optional registry authentication.
|
||||
|
||||
# Features describe individual Talos features that can be switched on or off.
|
||||
features:
|
||||
rbac: true # Enable role-based access control (RBAC).
|
||||
stableHostname: true # Enable stable default hostname.
|
||||
apidCheckExtKeyUsage: true # Enable checks for extended key usage of client certificates in apid.
|
||||
|
||||
# # Configure Talos API access from Kubernetes pods.
|
||||
# kubernetesTalosAPIAccess:
|
||||
# enabled: true # Enable Talos API access from Kubernetes pods.
|
||||
# # The list of Talos API roles which can be granted for access from Kubernetes pods.
|
||||
# allowedRoles:
|
||||
# - os:reader
|
||||
# # The list of Kubernetes namespaces Talos API access is available from.
|
||||
# allowedKubernetesNamespaces:
|
||||
# - kube-system
|
||||
|
||||
# # Provides machine specific control plane configuration options.
|
||||
|
||||
# # ControlPlane definition example.
|
||||
# controlPlane:
|
||||
# # Controller manager machine specific configuration options.
|
||||
# controllerManager:
|
||||
# disabled: false # Disable kube-controller-manager on the node.
|
||||
# # Scheduler machine specific configuration options.
|
||||
# scheduler:
|
||||
# disabled: true # Disable kube-scheduler on the node.
|
||||
|
||||
# # Used to provide static pod definitions to be run by the kubelet directly bypassing the kube-apiserver.
|
||||
|
||||
# # nginx static pod.
|
||||
# pods:
|
||||
# - apiVersion: v1
|
||||
# kind: pod
|
||||
# metadata:
|
||||
# name: nginx
|
||||
# spec:
|
||||
# containers:
|
||||
# - image: nginx
|
||||
# name: nginx
|
||||
|
||||
# # Used to partition, format and mount additional disks.
|
||||
|
||||
# # MachineDisks list example.
|
||||
# disks:
|
||||
# - device: /dev/sdb # The name of the disk to use.
|
||||
# # A list of partitions to create on the disk.
|
||||
# partitions:
|
||||
# - mountpoint: /var/mnt/extra # Where to mount the partition.
|
||||
#
|
||||
# # # The size of partition: either bytes or human readable representation. If `size:` is omitted, the partition is sized to occupy the full disk.
|
||||
|
||||
# # # Human readable representation.
|
||||
# # size: 100 MB
|
||||
# # # Precise value in bytes.
|
||||
# # size: 1073741824
|
||||
|
||||
# # Allows the addition of user specified files.
|
||||
|
||||
# # MachineFiles usage example.
|
||||
# files:
|
||||
# - content: '...' # The contents of the file.
|
||||
# permissions: 0o666 # The file's permissions in octal.
|
||||
# path: /tmp/file.txt # The path of the file.
|
||||
# op: append # The operation to use
|
||||
|
||||
# # The `env` field allows for the addition of environment variables.
|
||||
|
||||
# # Environment variables definition examples.
|
||||
# env:
|
||||
# GRPC_GO_LOG_SEVERITY_LEVEL: info
|
||||
# GRPC_GO_LOG_VERBOSITY_LEVEL: "99"
|
||||
# https_proxy: http://SERVER:PORT/
|
||||
# env:
|
||||
# GRPC_GO_LOG_SEVERITY_LEVEL: error
|
||||
# https_proxy: https://USERNAME:PASSWORD@SERVER:PORT/
|
||||
# env:
|
||||
# https_proxy: http://DOMAIN\USERNAME:PASSWORD@SERVER:PORT/
|
||||
|
||||
# # Used to configure the machine's time settings.
|
||||
|
||||
# # Example configuration for cloudflare ntp server.
|
||||
# time:
|
||||
# disabled: false # Indicates if the time service is disabled for the machine.
|
||||
# # Specifies time (NTP) servers to use for setting the system time.
|
||||
# servers:
|
||||
# - time.cloudflare.com
|
||||
# bootTimeout: 2m0s # Specifies the timeout when the node time is considered to be in sync unlocking the boot sequence.
|
||||
|
||||
# # Used to configure the machine's sysctls.
|
||||
|
||||
# # MachineSysctls usage example.
|
||||
# sysctls:
|
||||
# kernel.domainname: talos.dev
|
||||
# net.ipv4.ip_forward: "0"
|
||||
|
||||
# # Used to configure the machine's sysfs.
|
||||
|
||||
# # MachineSysfs usage example.
|
||||
# sysfs:
|
||||
# devices.system.cpu.cpu0.cpufreq.scaling_governor: performance
|
||||
|
||||
# # Machine system disk encryption configuration.
|
||||
# systemDiskEncryption:
|
||||
# # Ephemeral partition encryption.
|
||||
# ephemeral:
|
||||
# provider: luks2 # Encryption provider to use for the encryption.
|
||||
# # Defines the encryption keys generation and storage method.
|
||||
# keys:
|
||||
# - # Deterministically generated key from the node UUID and PartitionLabel.
|
||||
# nodeID: {}
|
||||
# slot: 0 # Key slot number for LUKS2 encryption.
|
||||
#
|
||||
# # # Cipher kind to use for the encryption. Depends on the encryption provider.
|
||||
# # cipher: aes-xts-plain64
|
||||
|
||||
# # # Defines the encryption sector size.
|
||||
# # blockSize: 4096
|
||||
|
||||
# # # Additional --perf parameters for the LUKS2 encryption.
|
||||
# # options:
|
||||
# # - no_read_workqueue
|
||||
# # - no_write_workqueue
|
||||
|
||||
# # Configures the udev system.
|
||||
# udev:
|
||||
# # List of udev rules to apply to the udev system
|
||||
# rules:
|
||||
# - SUBSYSTEM=="drm", KERNEL=="renderD*", GROUP="44", MODE="0660"
|
||||
|
||||
# # Configures the logging system.
|
||||
# logging:
|
||||
# # Logging destination.
|
||||
# destinations:
|
||||
# - endpoint: tcp://1.2.3.4:12345 # Where to send logs. Supported protocols are "tcp" and "udp".
|
||||
# format: json_lines # Logs format.
|
||||
|
||||
# # Configures the kernel.
|
||||
# kernel:
|
||||
# # Kernel modules to load.
|
||||
# modules:
|
||||
# - name: brtfs # Module name.
|
||||
|
||||
# # Configures the seccomp profiles for the machine.
|
||||
# seccompProfiles:
|
||||
# - name: audit.json # The `name` field is used to provide the file name of the seccomp profile.
|
||||
# # The `value` field is used to provide the seccomp profile.
|
||||
# value:
|
||||
# defaultAction: SCMP_ACT_LOG
|
||||
|
||||
# # Configures the node labels for the machine.
|
||||
|
||||
# # node labels example.
|
||||
# nodeLabels:
|
||||
# exampleLabel: exampleLabelValue
|
||||
# Provides cluster specific configuration options.
|
||||
cluster:
|
||||
id: AomznMVjQrZCD-Bm1a6DORI8GLZOVYwikdQEr0qI31g= # Globally unique identifier for this cluster (base64 encoded random 32 bytes).
|
||||
secret: O/0Q2iNvQ8HYaET+D/4/tw4KJaFIIWo5UYn98vbHGUE= # Shared secret of cluster (base64 encoded random 32 bytes).
|
||||
# Provides control plane specific configuration options.
|
||||
controlPlane:
|
||||
endpoint: https://24.199.76.219:6443 # Endpoint is the canonical controlplane endpoint, which can be an IP address or a DNS hostname.
|
||||
# Provides cluster specific network configuration options.
|
||||
network:
|
||||
dnsDomain: cluster.local # The domain used by Kubernetes DNS.
|
||||
# The pod subnet CIDR.
|
||||
podSubnets:
|
||||
- 10.244.0.0/16
|
||||
# The service subnet CIDR.
|
||||
serviceSubnets:
|
||||
- 10.96.0.0/12
|
||||
|
||||
# # The CNI used.
|
||||
# cni:
|
||||
# name: custom # Name of CNI to use.
|
||||
# # URLs containing manifests to apply for the CNI.
|
||||
# urls:
|
||||
# - https://docs.projectcalico.org/archive/v3.20/manifests/canal.yaml
|
||||
token: pye8s4.xbsov4gw0wvrshzm # The [bootstrap token](https://kubernetes.io/docs/reference/access-authn-authz/bootstrap-tokens/) used to join the cluster.
|
||||
# The base64 encoded root certificate authority used by Kubernetes.
|
||||
ca:
|
||||
crt: LS0tLS1CRUdJTiBDRVJUSUZJQ0FURS0tLS0tCk1JSUJpakNDQVRDZ0F3SUJBZ0lSQUpxcC9saTRpVW5mMmtUWEF6ZkRBb1F3Q2dZSUtvWkl6ajBFQXdJd0ZURVQKTUJFR0ExVUVDaE1LYTNWaVpYSnVaWFJsY3pBZUZ3MHlNekExTVRNd05EVXhNamRhRncwek16QTFNVEF3TkRVeApNamRhTUJVeEV6QVJCZ05WQkFvVENtdDFZbVZ5Ym1WMFpYTXdXVEFUQmdjcWhrak9QUUlCQmdncWhrak9QUU1CCkJ3TkNBQVQ2QjMxRDR4bU44Q1hMVWQ5SWkvc3JBSnBobkpQWXMxd2Q4SXU0QTBxTHVxL0VxbXVjZHQ5L0dzODAKMmZyUTFPd3V4WDdXNytBWld6YzNOK01FdytkZW8yRXdYekFPQmdOVkhROEJBZjhFQkFNQ0FvUXdIUVlEVlIwbApCQll3RkFZSUt3WUJCUVVIQXdFR0NDc0dBUVVGQndNQ01BOEdBMVVkRXdFQi93UUZNQU1CQWY4d0hRWURWUjBPCkJCWUVGQmlUeDBOSHlTaG5pMHY4S1NOMmMwOUF1SlN3TUFvR0NDcUdTTTQ5QkFNQ0EwZ0FNRVVDSUNOMHhDK2MKOFdNL1JHM0ZBQW9Md3BWaThPRmZjaFZoSTJXdFE4QmlTd1QxQWlFQXRvclZLajZPeDJsQUEzSUhtU3hsRjhGYgpoZ2pBVm9jWWlVdk9EKzN2OFpBPQotLS0tLUVORCBDRVJUSUZJQ0FURS0tLS0tCg==
|
||||
key: ""
|
||||
# Configures cluster member discovery.
|
||||
discovery:
|
||||
enabled: true # Enable the cluster membership discovery feature.
|
||||
# Configure registries used for cluster member discovery.
|
||||
registries:
|
||||
# Kubernetes registry uses Kubernetes API server to discover cluster members and stores additional information
|
||||
kubernetes:
|
||||
disabled: true # Disable Kubernetes discovery registry.
|
||||
# Service registry is using an external service to push and pull information about cluster members.
|
||||
service: {}
|
||||
# # External service endpoint.
|
||||
# endpoint: https://discovery.talos.dev/
|
||||
|
||||
# # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).
|
||||
|
||||
# # Decryption secret example (do not use in production!).
|
||||
# aescbcEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM=
|
||||
|
||||
# # A key used for the [encryption of secret data at rest](https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/).
|
||||
|
||||
# # Decryption secret example (do not use in production!).
|
||||
# secretboxEncryptionSecret: z01mye6j16bspJYtTB/5SFX8j7Ph4JXxM2Xuu4vsBPM=
|
||||
|
||||
# # The base64 encoded aggregator certificate authority used by Kubernetes for front-proxy certificate generation.
|
||||
|
||||
# # AggregatorCA example.
|
||||
# aggregatorCA:
|
||||
# crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
|
||||
# key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==
|
||||
|
||||
# # The base64 encoded private key for service account token generation.
|
||||
|
||||
# # AggregatorCA example.
|
||||
# serviceAccount:
|
||||
# key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==
|
||||
|
||||
# # API server specific configuration options.
|
||||
# apiServer:
|
||||
# image: registry.k8s.io/kube-apiserver:v1.27.1 # The container image used in the API server manifest.
|
||||
# # Extra arguments to supply to the API server.
|
||||
# extraArgs:
|
||||
# feature-gates: ServerSideApply=true
|
||||
# http2-max-streams-per-connection: "32"
|
||||
# # Extra certificate subject alternative names for the API server's certificate.
|
||||
# certSANs:
|
||||
# - 1.2.3.4
|
||||
# - 4.5.6.7
|
||||
# # Configure the API server admission plugins.
|
||||
# admissionControl:
|
||||
# - name: PodSecurity # Name is the name of the admission controller.
|
||||
# # Configuration is an embedded configuration object to be used as the plugin's
|
||||
# configuration:
|
||||
# apiVersion: pod-security.admission.config.k8s.io/v1alpha1
|
||||
# defaults:
|
||||
# audit: restricted
|
||||
# audit-version: latest
|
||||
# enforce: baseline
|
||||
# enforce-version: latest
|
||||
# warn: restricted
|
||||
# warn-version: latest
|
||||
# exemptions:
|
||||
# namespaces:
|
||||
# - kube-system
|
||||
# runtimeClasses: []
|
||||
# usernames: []
|
||||
# kind: PodSecurityConfiguration
|
||||
# # Configure the API server audit policy.
|
||||
# auditPolicy:
|
||||
# apiVersion: audit.k8s.io/v1
|
||||
# kind: Policy
|
||||
# rules:
|
||||
# - level: Metadata
|
||||
|
||||
# # Controller manager server specific configuration options.
|
||||
# controllerManager:
|
||||
# image: registry.k8s.io/kube-controller-manager:v1.27.1 # The container image used in the controller manager manifest.
|
||||
# # Extra arguments to supply to the controller manager.
|
||||
# extraArgs:
|
||||
# feature-gates: ServerSideApply=true
|
||||
|
||||
# # Kube-proxy server-specific configuration options
|
||||
# proxy:
|
||||
# disabled: false # Disable kube-proxy deployment on cluster bootstrap.
|
||||
# image: registry.k8s.io/kube-proxy:v1.27.1 # The container image used in the kube-proxy manifest.
|
||||
# mode: ipvs # proxy mode of kube-proxy.
|
||||
# # Extra arguments to supply to kube-proxy.
|
||||
# extraArgs:
|
||||
# proxy-mode: iptables
|
||||
|
||||
# # Scheduler server specific configuration options.
|
||||
# scheduler:
|
||||
# image: registry.k8s.io/kube-scheduler:v1.27.1 # The container image used in the scheduler manifest.
|
||||
# # Extra arguments to supply to the scheduler.
|
||||
# extraArgs:
|
||||
# feature-gates: AllBeta=true
|
||||
|
||||
# # Etcd specific configuration options.
|
||||
# etcd:
|
||||
# image: gcr.io/etcd-development/etcd:v3.5.8 # The container image used to create the etcd service.
|
||||
# # The `ca` is the root certificate authority of the PKI.
|
||||
# ca:
|
||||
# crt: LS0tIEVYQU1QTEUgQ0VSVElGSUNBVEUgLS0t
|
||||
# key: LS0tIEVYQU1QTEUgS0VZIC0tLQ==
|
||||
# # Extra arguments to supply to etcd.
|
||||
# extraArgs:
|
||||
# election-timeout: "5000"
|
||||
# # The `advertisedSubnets` field configures the networks to pick etcd advertised IP from.
|
||||
# advertisedSubnets:
|
||||
# - 10.0.0.0/8
|
||||
|
||||
# # Core DNS specific configuration options.
|
||||
# coreDNS:
|
||||
# image: docker.io/coredns/coredns:1.10.1 # The `image` field is an override to the default coredns image.
|
||||
|
||||
# # External cloud provider configuration.
|
||||
# externalCloudProvider:
|
||||
# enabled: true # Enable external cloud provider.
|
||||
# # A list of urls that point to additional manifests for an external cloud provider.
|
||||
# manifests:
|
||||
# - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/rbac.yaml
|
||||
# - https://raw.githubusercontent.com/kubernetes/cloud-provider-aws/v1.20.0-alpha.0/manifests/aws-cloud-controller-manager-daemonset.yaml
|
||||
|
||||
# # A list of urls that point to additional manifests.
|
||||
# extraManifests:
|
||||
# - https://www.example.com/manifest1.yaml
|
||||
# - https://www.example.com/manifest2.yaml
|
||||
|
||||
# # A map of key value pairs that will be added while fetching the extraManifests.
|
||||
# extraManifestHeaders:
|
||||
# Token: "1234567"
|
||||
# X-ExtraInfo: info
|
||||
|
||||
# # A list of inline Kubernetes manifests.
|
||||
# inlineManifests:
|
||||
# - name: namespace-ci # Name of the manifest.
|
||||
# contents: |- # Manifest contents as a string.
|
||||
# apiVersion: v1
|
||||
# kind: Namespace
|
||||
# metadata:
|
||||
# name: ci
|
||||
|
||||
# # Settings for admin kubeconfig generation.
|
||||
# adminKubeconfig:
|
||||
# certLifetime: 1h0m0s # Admin kubeconfig certificate lifetime (default is 1 year).
|
|
@ -3,5 +3,6 @@
|
|||
DigitalOcean's CNI and CCM, as well as a few other separate Kustomizations,
|
||||
require a DigitalOcean token and a VPC id. This can be generated by running:
|
||||
|
||||
```sh
|
||||
sh kustomizations/digitalocean/scripts/generate-digitalocean-token-secret.sh | sops --encrypt --encrypted-regex='^(data|stringData)$' --input-type=yaml --output-type=yaml /dev/stdin > kustomizations/digitalocean/digitalocean-config.enc.yaml
|
||||
```
|
||||
sh kustomizations/digitalocean/scripts/generate-digitalocean-token-secret.sh | sops --encrypt --encrypted-regex='^(data|stringData)$' --input-type=yaml --output-type=yaml /dev/stdin > kustomizations/digitalocean-config.enc.yaml
|
||||
|
|
|
@ -3,36 +3,76 @@ kind: Secret
|
|||
metadata:
|
||||
name: digitalocean
|
||||
stringData:
|
||||
access-token: ENC[AES256_GCM,data:SncEdDwS401k+njXftfwHM9Zb6+u4QdijjFWuXrzwlh8cjYa8Rz84SeRcjzwdXZFmJKBN83zH0nIpXzDy288wgL+1yeqQLk=,iv:DVSrIJtkcbOQoyZkb3P4lweVBHrJVDiI8+yO0AqSPS8=,tag:RKmJqay1ldCZZhJRa8EEdw==,type:str]
|
||||
vpc-id: ENC[AES256_GCM,data:ZHqBS5AyTXikzaAAVgAZBVcTSphE9eO2GQfuhjaxiBqCQSGN,iv:0OogtBVicAGsbKUoD/lJ2lzrTPDuDT7jYztqz+xyNMM=,tag:MelJVnJepBehgLupdHzdKg==,type:str]
|
||||
vpc-id: ENC[AES256_GCM,data:HPnbLIwgO9M0cmaH6X3clW4SrdyjWSL5dNMRKIilFzqvbKh0,iv:uh4YohrDpqO/7sissal5OMhAVeOFX4TFzEbvKzbRjnY=,tag:CjNkUHxY5aYCLQYGp48U8A==,type:str]
|
||||
access-token: ENC[AES256_GCM,data:iyMUvEppUgrDOJRjeDI87YxhSM7SYTO2znjL9lXjzMDARoc+byAvB1Rml41UCvKcKGNgg7/1Vqx2oLKm7BpgXXIqP3DG8Kk=,iv:gAPwgSYrYJ3bRj0PDoSey2JuOYiAyXaGXK19OpEbAA0=,tag:/dY5NLrq302iHOK1oV3n2w==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-13T05:26:48Z"
|
||||
mac: ENC[AES256_GCM,data:d4ZzlU1WT+h4PKspmThDct2XlpHbw8YLHwhGB73jOU1bLNPht6WUhcWD1mS5vhPKhdGa1fOB2reshJ6ueSkm8dhozcPNtHBt9cSKERVgQ8pcNF3DUET4iEp/pRY4YZ1Lr5gUzaos8hN9Gys8JpuTJR6axfOmlD75j0a3tKyLpq0=,iv:J8XxKp8WSmp7E2qR5dm1UmWWmNUotck21Jk6Lwp30K4=,tag:CLDhCsbaHb+2Rlnc2GEttQ==,type:str]
|
||||
lastmodified: "2023-05-17T02:32:42Z"
|
||||
mac: ENC[AES256_GCM,data:/r3XV5k2UXxRwNv+comZBBSKftovXuhx5opWa6w6u4aM2vfJcjwdAZ/ZvgHpoLJxk3tjm77beCnCMLTmGfL2L2eT/WrBCiZHofXd6bHZQ6t8jNiPz4R2P4E0Cb/O4sSGCw2/TUxyiBlQKNJfVhNPmtfpBrgQ+eXQIuuSM+lr5UM=,iv:krSMU45WsO7Ew/2EmyJUQc9/yH/ejiI0MXdd9kYC7KE=,tag:2kugMJ710d67vO806tzMyw==,type:str]
|
||||
pgp:
|
||||
- created_at: "2022-05-20T06:11:55Z"
|
||||
- created_at: "2023-05-17T02:31:40Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUARAAUpLGRJWXvLVu8a85Csios56yZQBM7UK02OE/Jf23ZHdY
|
||||
QbOP/I5vs8egBJCS+6TGQ50ufyqhdng1iaPRH0YwMQw57xi39ernIlN00nJ0Rf5i
|
||||
O1Edk1qj3y6VrQoUmfzhF/eTw6GoCzNDdC5oq0Lc0cajCQrHrwMuCdX4P3jBnzf2
|
||||
JKeQQD+3iU1xQgbNXr+JD06vGUFAyjV0UCxvq3Un171KmwRZRqXbpSdhPFg0fdLs
|
||||
SEVYB9B3FaAy93NeLY4s74Y97+a8G26TBXMQeaT5efNsR47R/563wNJHz/5+SL2p
|
||||
8NQ0naj9LGjLzXmc6CUTk/nGqC/OhE+CpNYIVCOlyuHp7YvruzZ0KVOFlZWQHst0
|
||||
kLk4KzlnEVqnW66E4Ql7aOR1YCqOpjeYTN6jMRxstPMplwMamPBx/f68rWnJGit/
|
||||
X+Dm43Vyr5W6wlTLJqdRT8/gJAP+TntAk6thF8nCv4HjNfLcGN6su0susHG2CWRV
|
||||
ZG0S2yzTyc9axK01Xk+40lgPzDHFaY030ZBz0nyCl+UIK+JVdtnuNJQwbqoEbMDZ
|
||||
d6HbKzsmyhJ4QHePKBdzYs0PZFOHWoKGGtXdtuDJXhOLnb0WKbR01Jx4gSe3CFQo
|
||||
V3GY8WuLfA8TH2yzex2RlLLkyAoiVlbZ2enyB5aKMA+vcdvJM8P7n6wAy85WDWHS
|
||||
5gG8xbNWc0iDsL26fII+jXGOCU7JbjJJRvZHznr/+d7wTfmkZsN6uBoT7cgeBgwI
|
||||
0AHGmkF5B5YYV8gAa7H6mGfkJCh4hG5oyw9YZXYrEl1NIeJimaSQAA==
|
||||
=G/ug
|
||||
wcFMA82rPM2mSf/aAQ/8DQLl7JeBVWmGjI79aJ5bDzIxvQ+MJ7GsFdjd1aWc9oM3
|
||||
pldz7saZVbMtth9AllTQSJHpOQUtrTi7eiGHzGt6M+xYMcaaA6PkNDDQFQ2GF0FG
|
||||
3zNFeK0k77DcsVlk/T+XPDH9XZkqMzIACQopp43ORyRPS/rTNMHEM7eag5OIQ+6N
|
||||
seQFkP0fZaSG+Vg3IO5xLFOKE/u/E5P6sk//6hKty6jZcJKU9KeSJu9YrjiDtK3l
|
||||
uQRcXG3fmWvtjS+2PQ/mN+e4vd+pA08StrHaTHvEbWCp8s/bO7cvISmsGss4byEc
|
||||
MXvuKNUrzQ4yrHVd9UI19Tmlzat19QwEVoIfgrqbEBElKxdM5hoHRU9kgu+ROICi
|
||||
rRKGcHLHBOuJKRtd7XGo7sML4WuWJ949uJC4e4LL5MGernUhNXNkcZHvhFktvvUc
|
||||
bMQ/NzGu3O2m584e4AU7B+o7lZTicYheLi90MewczJx3AThZOjNMS4NVIj0fuSnd
|
||||
2dtVrnoLwgIvd9aTolI9JSBOWmQpmIHza3goyoGmzcrN6f6Ky0I6Z9P7TQsiu6T1
|
||||
YYhWmeXrBaJWePhHF860v0UIjYjnhjP89mLgpQkQ/yVQGULYpHhdP2Pm9oAZdaav
|
||||
J7fJEwCJtw8Jzq+E51f2SDr1yJCqFEb2c1vXIj3edP7LTeXJ6QX7b91W9qr79vXS
|
||||
UQGt/yauDfM9PyApcHaF7AZeWmAvig/Pmo3fqC95CXQ0zqSIzNxz/k6iFY1q86Mo
|
||||
1Qu5AHW51xzs5VOwcVnQfw+1AKHZG7pm4LHlEzJDdnqjVA==
|
||||
=pEDh
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-17T02:31:40Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUAQ//avLBHqWsB5wyosA7E2KDadn82k2A0w3Zh8XDxljznwzD
|
||||
N/PcE4QORIEb1iqlK34T+XqRURUzM4Ct3Sbti/G5IThm4usE9js+wUNXNqMrSPW4
|
||||
m6dr//5YNHRLMDS0t1MMhhhLY3PWgnx3LSrb7PJhCVo2D0HSgRZDoGZSj6cfLUFl
|
||||
5FKeIXWQSk/JDCzrWyPsZ73fITEVj/hIHbiLu6shSB1owYPa1suq4eF5XD7B459s
|
||||
xQpSq5tYLrNrJj93RjHUmQwSdyfATjk3cHDbPntTwYNYzU/xDTCCKZ/fECcdJY5f
|
||||
BdEosvuA33eS7fUGl/X41J90xfE1YX1voaSuXcqvml8OYLLHkfARcCgQcnXhddLu
|
||||
kv7hxzFaH92lBJCSw+kxQ2Y8/ckZweMQae9Iri5zO/PQADSlXZ4q1ZPYi3P3W9Mu
|
||||
xpZ5SngftunG2ow3hy+cXsZbip8LSX/WUhaqLRXFtDYHYEAo2adm++fwakL3nwe4
|
||||
Hi6KRStfgEolmIXOqx8v8k02XtPF8lRGVOt5fY5TfQhto76hBlpjwKc8f+erPQmY
|
||||
LR3+uZ3/mZOplTvXM5gHeyj3WYUHIG8kbXF/DQR9vywjtGhvs52scKjNxWi913G+
|
||||
uetZYdLknn5sZJ6vFuoS0HXI5mbRIe/pYJiyYY5QFf4PqPEuCCXEU97LbK/DiKLS
|
||||
UQHy6Ql+XMh7N5vGIuGfO3UUViUxHVI9YPUWPnYcg+r9lsqlVQK+ONQ7UvPpv5K0
|
||||
ihl7wn2WLDVU8vGKdJoEpVguzTGDRYjexARXujma0m3ZWg==
|
||||
=qFim
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-17T02:31:40Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ//SZnnBl2yscyGe/91Askyrj911GXu3OLIt7FRbkxzrPm0
|
||||
301N6KuwAWn5iMG51Phh1OD7Xiv9z16R5FjD2J9NQOdSXZ03u2QKY0Pp4Pq+3bVQ
|
||||
bm2B5HGDFlf2mjAPzsXrBCK0YmP6vOm5ehZX10p5j8RcvgkzZMELdiPtMa6Gw1lB
|
||||
KpQSCw52E4yyqmHoe9bu9tCaNd0L3lcEnbwDz9iRc+vCmdnJvzIQZeSQqv4iU9qZ
|
||||
fhwDvNd63ntBjdtV9EtvP662Y1IsQkL9fdSHBQYxOEmov859i1LkVxZI5EkB1ebI
|
||||
H3BmK4EO1oJEE8LDoZkcue4RXAJbwfOy6ReN6Ds4Q+tgAdJdKL+sq48UrA/AHp+d
|
||||
dxxsoZzKUc3GXq24lpjVr6uvdBBl037GRtyVvCisQRjp/Vh7IKFtWvkv70Vh7/1U
|
||||
8k3vi7r6EZbpw1dBwFpRX54xVkXXbYR9NQJLep6E13Nbx9M3GVT4C9ylRV5T/fNQ
|
||||
0sKEhLT5kS6hiS6iTDyWVuvH68YnBGiQRTDYBBpuy6pEqbVY7kOoQutwzRCEyzlP
|
||||
eXccctyrS8EzcJVv+WVI4nxC5ufkDnDSGxQwNrkpJa0n16RZSJKuLpnytLlAYjRB
|
||||
6Qw0fzjkNMM0y0mpoae9hbfou5m2d2+kX3ZJzObBvaZSpmXQFKwVZFwMFxl+bWLS
|
||||
UQFiF9SZqHa1xPE99LIumWOZKY9G4EgUekcPfXXtGhJVo36a7kTa2gJpEFNl15EY
|
||||
V/BoOL83x1WB1TEOH9kAEj7tBcOHb36vRy5SQuDr0O4fPw==
|
||||
=Ybcm
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
version: 3.7.3
|
||||
|
|
|
@ -17,7 +17,7 @@ sh kustomizations/forgejo/scripts/generate-forgejo-ssh-secret.sh | sops --encryp
|
|||
To get the database credentials, run:
|
||||
|
||||
```sh
|
||||
sops exec-env secrets/production.enc.env 'terraform -chdir=infra/main output -json' | jq '.database_users.value.keycloak' | sops --encrypt --encrypted-regex '^(data|stringData)$' --input-type=json --output-type=yaml /dev/stdin > kustomizations/keycloak/postgres-auth.enc.yaml
|
||||
sops exec-env secrets/production.enc.env 'terraform -chdir=infra/main output -json' | jq '.database_users.value.forgejo' | sops --encrypt --encrypted-regex '^(data|stringData)$' --input-type=json --output-type=yaml /dev/stdin > kustomizations/forgejo/postgres-auth.enc.yaml
|
||||
```
|
||||
|
||||
Check the Keycloak Kustomization documentation for information on generating
|
||||
|
|
|
@ -3,76 +3,76 @@ kind: Secret
|
|||
metadata:
|
||||
name: forgejo-config
|
||||
stringData:
|
||||
GITEA__SERVER__LFS_JWT_SECRET: ENC[AES256_GCM,data:PMPjQesE7LMTm9345yiT0te/jD3c4ea/YB2RpAmUBXzWEkOf1xDmTF924g==,iv:4U01ffSZMbd7nbIdJ3galwn9GLfjz1YRzY8O3CiulAs=,tag:gOMuErB4aL32tkf5WVoPFw==,type:str]
|
||||
GITEA__SECURITY__SECRET_KEY: ENC[AES256_GCM,data:9YAR3AfcAnhsrTfKmtGEY/L/RP4lIN+zG3gG9a58qrO7KVp/Awr8Ag8dDat3rZQhjfqZEAweok/PCZk6j8rtbA==,iv:7aVM2ElvBFy8ZWv/wC9Ne4SQ4Jd4VfaTbuSbdqgjirQ=,tag:2nv+oVdVhfnxi82R0vpNXA==,type:str]
|
||||
GITEA__SECURITY__INTERNAL_TOKEN: ENC[AES256_GCM,data:Zo/HXJSy4CMDOD0f9Y9qhnlHWE7LhAH+gJBG6jAxXelqmVnfqBq7EnspNpf8IJmbRpbZs0O0JmRYcaczZUZDs6V+brxnN9dis35CCH9mqqrKUgda4OI0M4EQiCvJEbY3V4kyMRtea+6c,iv:+o5qWVQqZBr5+FyWJ4SQ560eXQ1BygKChZjU9GKoXw4=,tag:oGiSX2hzhBfzOMiZRrjOlg==,type:str]
|
||||
GITEA__SERVER__LFS_JWT_SECRET: ENC[AES256_GCM,data:v6EWWeq0MDTcxesXXdZ9s5YMAiLNhy5f3mdGZKDOl4j25DX9T9Y5hzhdZA==,iv:PDjtO0bKbpHJVMCsQ+DNwmLwqp4hn+mMpIK1j72JUkg=,tag:N2s9jjz3Hal1FcU0dcOveg==,type:str]
|
||||
GITEA__SECURITY__SECRET_KEY: ENC[AES256_GCM,data:Ny0s7FUbcSJC7EjInhCgcRUACwIU2jz8qo9QhEzSVckvG1d8uwSfJ3sa45tE/hITP0T5m94ofrAEHwaTmQ0mow==,iv:iZrJPznGkkD++wS+EF564/QilKT53yZaS2h9SBQdJhI=,tag:kh/jySPF9qZ9BZ3JkP9zpQ==,type:str]
|
||||
GITEA__SECURITY__INTERNAL_TOKEN: ENC[AES256_GCM,data:tZtCtZ4vMd1M4M6b4f9qCp9jjLgRyo1Xo//63qXxZkRdgvvGg0NkS4bRS16Y4ZjR7uofAk18ZgXLseRN6uiJujAwif+82Hilc9FWOOXYU4ni9sJX2YyJg0oTICjxlinB43mFuBzmMuW5,iv:WkanY0QfLKRjc5D1fJzSgUojxf47pla0BfecomNqISM=,tag:i4DQS6pwCruRPS7c7d/+Tw==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-16T01:04:13Z"
|
||||
mac: ENC[AES256_GCM,data:Z4I7wqmTH8sq8BbNUT/yfW8IIChL8eeCFh+aNwDdeVBfhTJke8QatVUsPsq366lDqYcrkNft89hUuYZ0ny69ksqQANQl4547gJrJ9kg25qN7i9M4qON/drlg7iJV+B/MLXouHdY23XQM7s7JZF9o4XOqy4o6X4d/mWf/oLVlZGU=,iv:3IYg7h1DZhM5eBJFhldAauiT9gdERBAlRIGZdMtykwM=,tag:2Xabp+Tn79WasynoMnSfYQ==,type:str]
|
||||
lastmodified: "2023-05-17T04:43:13Z"
|
||||
mac: ENC[AES256_GCM,data:iVoGf44NRRbZJJ7zZFxKeqt9ab81+XrWJXzKkfGHxh5CNPtY6Ruq7v9W3KZkoHUhci3xWdm+0WbJVioNLb4zxbg1cdqxcQ+4HDPnCWR6pfE4lsvjfPCDJ/hraphewWisKpjbIV39o6LyfmaRh2gAkirFiCWI8DZRJ7RF9HRI25Y=,iv:z0gPB+pAHC/sBU+hjMw66wK5NpIvpx/XMvj0XHjbn/4=,tag:eG/iF4oq/s4jX9aBqXgsMg==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-16T01:04:10Z"
|
||||
- created_at: "2023-05-17T04:43:10Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aAQ//Wyw0+UV0AMqRCM+X27tKwSEt2RGaQb3ELbJW4Op9xraJ
|
||||
lJAdOKqLhTkpR3DLumSjlVU3pukiBoq003FqwizVIbjD1Yp8z42HNL/KqlmGn8eK
|
||||
WB+vz96L34SJP48uK7qSsJ9lxYlSlWZCRPoTKdoxZR3AYClpVWsr9B6WkGkbC8mn
|
||||
/oTu/MVA5tq/POdxDy+K3ZtVLudnwvpOD1VwH97+kJqwJNjMNE33uPr9O+z8JfZ6
|
||||
NIgdljVE67FJM7Dk3wcyRKEJHhFajhTLI4acZGWGASjIXP4j/w2mCX7gv3J8Gerb
|
||||
3shY5oN+cDjO7bQBvvbER4Xkl2oLn/6h7Vu7pQki2ggjIJg5f4wlLz7y9CDLsS4Y
|
||||
BHpBYRljHqzblTG6IeiQE6Oz2GMBibJBEv/MmGriZ+ON9bu6Vmn9QBwzUGOKEc7F
|
||||
F+WF+On2ntGcpMUW14L8KLeK3kHZxJuioOCNOB77Xwg6c04p0nh+VmWtLWrMeEIr
|
||||
1M9p29K1HXQto0NhgNQAMGr1jIlEDKxD7XOaK3w80qZivyYmgGDIM8g4bpDYbaCV
|
||||
gjaHyfLUTwdReiarSK/xjq4/udjAJN+VBWB1dggTqc+a/rhiUOXsdXy2X/+N627g
|
||||
1NEDNkOpmJLz8HMhBZPLTOJJHp9/mwcL5X5viBz824deh4ZQX8CqzrtSZhoPRUnS
|
||||
UQFSD7+NCg1koARk98aoX7pW4OwBjA9pxuLxAmx0nFagj1wMu/MNZLlbdj4H47fF
|
||||
6v3EjZqvJJwjE9GPugjFE4Xxc7Y38j92yY7RFd2qOP08EQ==
|
||||
=I1Lu
|
||||
wcFMA82rPM2mSf/aAQ//d8WAKvmjk8Y3z9AdY2d1mAvwupoiJsJbrRkbmiXigBsm
|
||||
FYcwTHFF6ML96ml6/g5P3C8m+S73FcnzLBZzaL2IIih2B3e59J+7Ol3xi3shcSek
|
||||
e4o5GuSITH1QdsXU+JzgdNrVFRXrEUTmaf60aKK6ejBW+ki+Q6xxPrGt92M4XN6E
|
||||
qyTS2G6wTJoGfgG0NUTrBUPBmhHND2D8TK0ijvf8VkEX/YXYp7N5E0b2jkU3Qn6x
|
||||
6UQ1Xv4jOoB8+8pZaPZp+9W0EmJ+V6K2yEEpqGzNed898caCT8XLLfgjTbe4sYZk
|
||||
h5iC3ORitKR1OgNthRXhojbkBtgVxqYN6q7gl+jstKF7AhLBDx8uSC+bAI/YTHRi
|
||||
zjBJK6aI40cyJDTsEHGnTGRn5Egdl0zjyiDdwFGZ+n67ynw9ge/fNZvMlnYpkVcq
|
||||
SD6hP9HL0Nl+LSH2HJ7E0ANKKKfuOTwJdFicafMXbafgy9vLM+SC+riGSoC732V9
|
||||
AU6Hi/rEV9uaHFah67RSf2Y/KHZCIU3pGSkZ5vrEHrPAb8rdvVXOndBGfrbNg1++
|
||||
dOOrwMbdeS9qusivhBN6CLJcTu7OB/XU1IBaF4lG91ZUoGkirIPv3lhbcL7MWPLS
|
||||
CSr9ptCSWqtutXe8/I9VIkWzuICKOKBgDiZwRRVtlHSHo4BqF0Wav/IN2hSYg8rS
|
||||
UQFvCdj0zyjJLwdUkPYQnx7jUI1AwZ2d/GdFKsXf1zy/Lx5EO2Dniyns/7cEtc47
|
||||
sCvlv15vb+WNAPBJ6/8EohALQefbzusWIzdBkZZtV9pVhg==
|
||||
=IA+Z
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-16T01:04:10Z"
|
||||
- created_at: "2023-05-17T04:43:10Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUARAA2CMPzEZxtU/wsobnddpJmZHUzjynaStWN1bnP3uC6RgC
|
||||
/IvzxW7g9sUqGgjVLVqWfvsbUZNFQyJ0LLkXUwAC9rjP+Hj/WJ8C48tf0sKmrI1e
|
||||
k+ebafZFlpTNk3Il/hzUagUhuA/1mPDq3jxhxy3GYmwxn78pt8m9egpdZFsoZZnG
|
||||
bEQiyAeF4QOQsgwXjBCmuzY4Gz5q8gYIgZbvE7YvknsQHVUx0gRieQFgwWuE3jXY
|
||||
nxCf97tmb6pPT4KBbmDXW3y/38SX5Hq9OyJxPN/rF2PlGdXbCcrrzmPqRits3Q/4
|
||||
G1LixHIU2G8R894etl+eewj3KH2uzLMF7iu3dRa83qELdmv6rNW8PaGCceRk77I/
|
||||
HCHqIKhMpAuX4DMCcq2W0b975tDZFdY3V+tPhNuqDbuVsUuKN9BdsXrb/mvOLntS
|
||||
MOSo7ymyDNE0WEmjgz79CftPpX69qkV0LK9oSb7iK2Ro0qaTJI5+so0l8s+XaY8W
|
||||
EjMNMEr92UVQeUUDHTpvkbCfnNZcw0P0Plsg6gbp3FYRlwyVGJ2wLwATbxQaLhW3
|
||||
2zUjohJ0bhHZzL1Nfxs7tRwAv7I0wGUjAdB0r+m2tt0fq4xMcWNsGNA2nYIVw7tk
|
||||
nhJXgoiqTzY542FcbdkT5E1SRgqtliK+WllBQpxiG7hdMd+kE8yVIIBtMDyP3jXS
|
||||
UQEBMk1W1uM8paV6mN/vUo+GywmsIY6YVz1sClGvqWUib3D7TjIC19CpJpsA3mEu
|
||||
71PTUmlyu5Fv110khriLDT7n4wvlCGxcAUedPhfaJ29j7A==
|
||||
=L9c6
|
||||
wcFMAw95Vf08z8oUARAAwkO6Di1YjlZoYFq9XHqVm/Njd+p8PpfE2q1Ay5WCM8gc
|
||||
FGUoeZ/zcS/dPRVwI6m04SjCi2Vld2Z8usZ3l2vpVgNEiZe+a3nzPkRbJno7J6xE
|
||||
6kQggHFcvAira++lLvQ6T0xN0SXzOmGhBIcAz9OqbAR2dPY/9eFj+LDUJmBNlMo6
|
||||
A4ZaKVjCy3VzwFluLkCkztcdVAKwQ3bK0ZVi0L73IHxYI57W+Jv8h9n6Dvh5wbDP
|
||||
aDwv8K/f8m9QRXUkb2DXtQzs/LFY6mCxO3ZKrkbujZX1wIJR79a3FVJnGKFeqhAU
|
||||
3EdxempGP1nipEy52zVjaKKccI4qVN3N4LwZDoyGnVBHgiVLTBMjNPyYKyveZ0r4
|
||||
YHoB4brHX4Az7MiDZpOoxoFvRNrtk+I8GRJrlNNeMcFny5d2oZm/ANYO77AnLw83
|
||||
SYWs7ACYeahKadWQ5qfeGTdgNFGxZtZIPzkaTVlGXOcLdKCnbiW2kpPhmNna4OT+
|
||||
kac3aICyyntVNrRY05CVB28UPWhJBer8zVhGaIhzeoJ3YJjbMqNJKffl9yWVtN+j
|
||||
NamZRl1TTwBPo/S+7Nq/r+h6nUQzLiaWz0SxvDab2he4qTG4T9RxOycohUwoeFnF
|
||||
tXGgQMwfxRoURbjmYpLdxWi6LTt/xWzPl0ld1UgcBcPOwMUQAzXvQ4NoKQ5pmtvS
|
||||
UQGYOcN9JicX594J7QU54T2OHwMvj6NZyVaLGu/t58tXE81qT6hzP5/cQQ7dhIBo
|
||||
HZ/IJ8EdgCebogdsVxQHyiq3kuPIoO7dlkQFwvH9Z9H8Xg==
|
||||
=Q/2s
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-16T01:04:10Z"
|
||||
- created_at: "2023-05-17T04:43:10Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ/8D5FK8KboAoDIR25r+ZGDzvU0B/kKFtdrULfjZ82DWv+2
|
||||
TicQcfzjqoxxJdGppe3MUNliX7E5C03Y0cTYaI8HxAuUpsuj3T5XuQuK+7v6hVP3
|
||||
0MmSOii8OiZMJxHL7RUJfJ7z/VvLxcUw88Vdogu/9DYEtENyFi3eYMik4J6YIpVh
|
||||
23Kn9/jT2qTs0d4wA56wKCRMG71eZj6U38Tfc5XCzJhi929j7qhHbSMNPFVxZWIh
|
||||
6atXx412N+VOx8aaYAAp3TXHNf+8vpSvtNByl5cRRFUuqccO8Erie8rJ4y4rHZna
|
||||
FG0Yj3NDecLo+VC4r7v5v9OIlRECCnS9DfVHCJIpA1lTprXyvrQTH9Z2Ko0pJik6
|
||||
zUCF5wqxd80oVm2P2iOmLLoF9oxo16nua/eLarMPKElhfj/g8Rw16b1/NO1I4qjK
|
||||
/Nh8uE7BXtrMV/BlYRHv8KoHwAyNpQLD8B3tCnBNZAtdhmdCPNl2XU6NifKmsMzj
|
||||
hCGvqUiTycb69T3Nek5aCcHQKyVwOhizHpjCpLAEgBlyFsvYtIQdu9PGoFSCnSMw
|
||||
RM9bCh1l2zzsdi3aH1UaVE9fGIFOUbOvxAH6MKOTYw01xW4tF/+2qSZ3qU4XVU6T
|
||||
zi1SoSzxuCea7Ik/7QUp4LBOq0eXBMKHQSUw2YgVJte1wm5xw12k+RxiikPWfY/S
|
||||
UQEYNVZNXLfICgm8f143jUI3/Uu6I3Xs7SxJSbJMRLh9bl7QuRFpDCI+ymdUBjUN
|
||||
gTRhUQVQEVCFUu+OOYeuBIe/T6BTmrcyvHH3PiJIIoRntA==
|
||||
=vMUS
|
||||
wcFMA0/D4ws+/KPtAQ//SPnqWp8yvDWogXPa/SLAnRKRiCHrMGZrrYMGL5I8neBC
|
||||
AvYeOSLu5KB8QZpffUP3Mz/SLVJ8MJ1aBiqwxBDQZ3dPrJJt59Bg3CHD5hbtE278
|
||||
6rAup7KG3AqdXlPrMg0J8cZo+278/SJqb6sxtc7BbVG2fWK/e2Ps0bcVZb9HFKWP
|
||||
eHHdJs+9A89oWieYfoLPAB9MZpiW0SgPQ6+TxQ5AAxTw+5Nc97bRwpgoKyM8k0nE
|
||||
PYWLz9jFrvEb3TxLinrDi4ir4bK3pDYjP4/Q4IAjPhXs6ECCiOcCb39vBKnVctf4
|
||||
2QBQDmDuiINKShYAk8EcmhAfnNS/213LH/hkVXndRhDrUGYb0CdxFS1xfbtaf51c
|
||||
xlnmXOH9+2TqAqP61VOF3i4qMx2EMNMAjP6GpaWFyIIB0x+j7mMhBykq7EfMpALa
|
||||
QFqc/E223fdTXGse/VYkHCw0JkEI7XHf8/OnqHjnUTdIpgMMv6NTH9NNeftIhFeF
|
||||
GqDElRtvC3H/COvU0bUluq4Xrjqo666kbmcwPD1I3pY7R/4IgoOGK5y/sxXlGcLe
|
||||
UjzIClxvqmVdGTwzDRELR1+p5ld67ZUJcufXzGrDTqP46bjUOI/Pz3K3NXLaVLzV
|
||||
j5Stl/4apoGCfTphINZhZrqsA3RwtX6Fc8gEH75ZBh200ZP94vNcJFVN2Tlo6wPS
|
||||
UQG+fz96l/oxi+EZfaQMqpHALsfDDyYecXm0gm1ZlugHx+bXE51MkpskIiKIHJwz
|
||||
UZiLgKV3Sd9EQ7vTf4uuOp6LIsv+/iWdVCj3Qe1JQ2vHzA==
|
||||
=MzCR
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
|
@ -3,81 +3,81 @@ kind: Secret
|
|||
metadata:
|
||||
name: forgejo-ssh-keys
|
||||
data:
|
||||
ssh_host_ecdsa_key.pub: ENC[AES256_GCM,data:ItIdgBQ2OLhUuQhhTzedAkOCtwxHsFf9dMU4R6RXAE0GWaLu5gIRAWyA36h9TtnZ6PzeaEuPc/661XPzieZQeXdzm7E9pDylyR1PLLm5jfiOf+LyMwetGSWRZABw/AtUeHefRwqe5b0B/328Y78+76uofCOW+LhgEJelq5V/0XIqHLPDOrGKH6gEzpy8e33Q3eBzyrGBvkvo0rfE4Q1NbSw0OZa+f874BRuSMH+JZV+ni9LSUjqhp06gc/b/ZeSWoTNfGTTxtVV8zu9SA2Dbbkn3hmx5DwAV4bEyPkJjTBDtF8StM6WhlMIw0tk=,iv:i6tkqM49Mh/FjZ0N/KFEtUqwM3bhvekbdG3G+w0BEzM=,tag:wW25FduVGhFMYLwQbVejtg==,type:str]
|
||||
ssh_host_dsa_key.pub: ENC[AES256_GCM,data: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,iv:5z1pRJLM0jqv3jle1/2aLrFWlRMVrTqwW+tP9OYKQh8=,tag:6t3LskcUhQKDP3yUEQL8Ww==,type:str]
|
||||
ssh_host_rsa_key: ENC[AES256_GCM,data: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,iv:wEczRehVG+r/N8YBANTJwHzszLtUu50/0+kYRuzbwiA=,tag:0nYeR8XUKgHUwI5cgYjGbA==,type:str]
|
||||
ssh_host_ed25519_key: ENC[AES256_GCM,data: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,iv:aC6SKP2k9LsE/a2+1G38NC29va+5aNSf35hn5VjaB9k=,tag:OrZQrxa6/JS7WwC4OrMPCw==,type:str]
|
||||
ssh_host_ecdsa_key: ENC[AES256_GCM,data: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,iv:jnLJgfAbQ1DPSyu5IQ9u49mQU6nsYsVNKe5J2lw+u3c=,tag:+Gn8ivVAcSdoeXcuMx0NHg==,type:str]
|
||||
ssh_host_ed25519_key.pub: ENC[AES256_GCM,data:KDQ+VWgqcqgJ8whWaoykmqugQNEWriwVSi4IewyRV5juNKLwiePMhjYtvLU/lGL0BJOzUp+fm3Uv/9bDGxEaT9uDGUHzsXRCLTP6Ws5PIOIileBEI89s65vY9jfnbwOslB4WMpJiASldKuy6edri6pAMGjs/JAVq0twbLRMTtQQ=,iv:qg85GAZlqyYCjwNJtbpUJSD0GN62e3WbGtcJWWdYUDo=,tag:QOK8Ha4OQPpsb66HQl9U4g==,type:str]
|
||||
ssh_host_dsa_key: ENC[AES256_GCM,data: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,iv:cZ3Iyl0itwVfKYmImzuJ5Lp2e3+m53kID2UgQ0P2L88=,tag:8z20+dQ+fAd4vf1HuWmsvw==,type:str]
|
||||
ssh_host_rsa_key.pub: ENC[AES256_GCM,data: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,iv:axLBXsBFwQNcmKh4YeFcOtwLG/gIyJUj1dsZkjIR02A=,tag:cP9DaIegAfyXbwVRvdhNKA==,type:str]
|
||||
ssh_host_ecdsa_key.pub: ENC[AES256_GCM,data:VOuGvQnelnYCk4s/yR74K2IOowM5184AZhW0YuJ0S49bSD7YU9zratOYRwHLdNBRha7fJMLPg+eLCNgB1qMTQ8PyYbZHFvqazXP9jJ/E2MM/1MBK1XlcHEajg3Of3FqQRmIVHjhOc1e8tNUsmV9GAXZJD64v74hQ5XmWaNE3f3y5C6MKDwZV2pWpHMt+vaMgl0Jz6WhXjgXKYXJzoKb96vXrbRKMhFRNEMYuxjolvqXUNCtfT70uRuzycUrEPG6ULizamhl942zClMv0h35947oDslYCpiGvZCtOqEpfkzGqyfSwMd4iERJC3bM=,iv:oszLiZd2oUUdr4mWaNOktcR0HSkc2UYpJDl6s3plRII=,tag:VluUpN9DD6dRXJR6L87sVA==,type:str]
|
||||
ssh_host_dsa_key.pub: ENC[AES256_GCM,data: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,iv:55i0lL5O2DLsoOobvqKB7syMRsgoN8Jj2YnDxYnYL2U=,tag:7H5gGB8IMbw5kPEVyOSZOw==,type:str]
|
||||
ssh_host_rsa_key: ENC[AES256_GCM,data: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,iv:DfGvCUw0zPaJtB6uehT9djO1a9+n/vL6SVumOmCnHDw=,tag:aw7E2tKk+o919VpqXUYs2A==,type:str]
|
||||
ssh_host_ed25519_key: ENC[AES256_GCM,data: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,iv:HfJ0YQc9rgtETGWM/dDtVW1J3NUOHwerk1kA7nBaYxw=,tag:+LULyDdw97kFFXJspTmsag==,type:str]
|
||||
ssh_host_ecdsa_key: ENC[AES256_GCM,data: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,iv:7OXES/JmVsTgbxAyYPhMKUyV1hdCAR/Z9H/Li3H/0jA=,tag:ZvRegm/H0QayQkR5LRuHaw==,type:str]
|
||||
ssh_host_ed25519_key.pub: ENC[AES256_GCM,data:EZWxrJsDmWoSyj65UYvDWv9cLNDGf6NATsE05e4LmOdfDQdeeHH100Erl0fgGqFB+6JW4U2wx9/C0sQFcvK8jPQDyMkW4jfEeqkNJgVhIYi8EccAEbEKQudlAn+DeOZYnjy5NTjgUnaeqvJWl/O0hj/T4pAr1O7Og1+qE3M3MoE=,iv:oq/xU27MRVMl/4qbVlWJ4Sg6xgDjSmRzoI+xMGcgdCw=,tag:x9+EHPXgCt7SeDNsXgeZ1w==,type:str]
|
||||
ssh_host_dsa_key: ENC[AES256_GCM,data:CBlgYhwPm5ZjCnQt6O7t3+SeA+pZ0i6BGe1uL8Vcca2Dxa7DTwQ21lDfqhAk/46h3XqAOkoiUvRdNCvI7QAnE0ib6/wvmwXYXJ/XgeSmjPjhExg80dF0oK/67+Lf2JM+g6JZT0Iw4rC7glA4r/+CE5WTW4RifAv7ScPEUHbpb8lGaKwkJ47Uqic6MluSLQVzG/liLVMia0AdMlNwa9dgvRLo2Ien/HX9jhlNMoU7+KiQg5fZkoVsY/7bRMyU3oftb2zgvuR8kPYbou7Mspf5jXzYyPwAlHiYm+taTYMcLE4xTx+TQ/OiFctKnKVzf2JA3JyJOIx2Kx+nAs67AvN/FdZdFcmfpGDXW7tYviCPJu0QntL/UnCcLhoxzZHQ+70jKxbTY0sSAiD4D4OFPJhpe8QTFcZ9eVXmqZtSrBNlHZBVGwor5QBoC4xaCJmWZrkErq6MKeYOu2SR7hDqDyl2/wAPtK6ciogLMrYMOLwNPihOsaPso2Ihbi4qP87uw63QKnpmIz2HS3C4/EM18SKdM7YlcUXFiHxdIcXHRFpfiJ8n+ReVwj6OYalnAwE72kqI0DCOoRnr+uL2kGbsSUFQRfOu72BjDpwO8jZxGTCq6Gpbg5Mv+ogMJ04nlTLu2J08p6s6Ds6E4a1N+yy40wp9p7yFZ/KJRTm0220XrT/QWPbKmM1Ux4cSDlRjr/DpWPjmsGlfPCT0OlCkXOPTlazz5Ch7Levztmq9Pt11uowXXPhfvZM0kdUQD1mJHFLKTTNOpF+28CpXfsiBsq/JRcvS+9og66BPzSlZYhzp4eXTrDIlBfZu8PhZLn26a0XrN4h/QmRC8wRhUP9xQuwiK6y378YZZku2w5LCSg2WWzfu1QI28zjqXBCtic4Jiaim/BaZshtFpGgdUTxj9cx/zQtZ8/h1GnCJ0iqrFd2EQrQFezQt+67HaD9hkI910jg7CzYqSBUrYbhrMoZ4EHak5GQVRvI8pi2XZH9k3x13htMs5tTDAfAopB2+48DSgfZnwOi23kKx0sl/ak5Pqz0vWlBR2MVaP3/mBtJpC1PROPUDvWIs2EGgZR1b9C+wDpBCa969cA5Oj0STQhS9O3wUiY692t1jb7agyuJXLRyZ0aNkHWYrCgv4pvEkHxrO8OL97r6EXW8rtqsv4ckeUiCkd4dCkbPaj1d5M+ecl0iwQXX7Eyu9oLuUXmVn0KmJZz0Gkt9nIGySbm2nt0jWm0t8c9fX4hiPUQwHB6TNXgWO6fMBT0E6iO55M0TF56yTb7zb9ARqJoVQifeEH6O+PPtUt3E4McRiqNhWXQiMC2UgihfsYxs3TBSqkoJFcMu6DumkuNNOBjKQrFHTKC3W3G6h1RTpYjFe39vkVkIo8uU0vcHDLZP9cgeGYh25E8poJn/QTWuZqbC4/SKKoBsML4ORtsZZvXUuVZfBNmupff8XNgNb90YdtJLebSw8nkNXBo88LgjLLU4i1YmqE573yqhQ+Fj+VtI1JDu4YXWriGfgFcVLzKHVzQytOvuCL0zSS7NPeV5aUAoI8AfjyV+hi40CR6X2CPOB9k0Sf7E+OhXrAkBXJYt0L2bgI5MrhIUjhO5QadoPiR794BM6Wew5JqB9iCQQkUWY+/SIUoIYYJ239ExF+91oYPiiLrDXuzzN6mCuw+fhERtXAffbhTH8ae+RqgbxooFssoCp0HdhbGAiyNQfm0i9xGY5qY6JL1tz9JtlMdlpCqjq2mmWR+hEIwCLRMQEu9575A/a1AcBkvrwObFZ9z1E27W+VXK7eeQbWahTD5anZtPqPZqIdkWgrEqENzUksf/sxWgESllGSNYfBXeK3WXTxVxD7SBlKsc+oGXBanoXOEh5eHRppeQ3cQ8XC6CSzzVkPDn18WViZifqpkgr7cpasDzGC3Akyug/6MytlV0+GdJvil/Mspkz5VvmfNixzJSAjIWyPDiL22FDxNYcqsDRg1XprBMh67gllKqulBJEvn18LxSoYWsS18tfdhLKpUNTpAA/Kd3AcTBspW7nKgwxWYDpidyBg8N7HI0ykpFNsDX4p5+Vq8Gb2YNa78UOJjIoemGRnQq1gD6PK1ih7kuqohcCIkaCG1ncDs+Zplx2wZdnM9hJFYQmXMWmYDZTrz6A+Hrzolav+MUxd60nYGGnBPYmJ/U/4XEFvuvs06k90jP02/Z7J+DNCAGL3FGnIZth+8PxIzuQusnTCdiWuAZVfR9WXj0vyoBRw8qAQN+E5KNXeRnsVQSUVoaZ+p5uqFS8SdLg1zLBndC53fW/A1AD/h1Eo/nfxvdiOj2B4abNBKba9xooEXOxA/eXVLGUS/PNw7PjoBvTuEtEIkl8fgJ/c/xLeEcgKOz8nwSH41pF45gJ0ZyUTjkdVh/IOck7dmlPy+9SWJ9IjUnVYwOENxaN1ILLXGoVWAyEvBDcU5GJpk8m3qQKFd2FrLCULNYAQXyscZ0=,iv:BBmbPDgCFJKWnAD2pGnZPvm+xFr+ZKUrp1cGp+IP23A=,tag:p/zYGDrfhpWppTUxR7k3GQ==,type:str]
|
||||
ssh_host_rsa_key.pub: ENC[AES256_GCM,data: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,iv:MzcAxHb7Vy1eFRhVzrb7kV+Ut39DEpIV1taGvHqIB28=,tag:Ttui1RIhjtpuKlZ2X2ckIg==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-16T03:02:13Z"
|
||||
mac: ENC[AES256_GCM,data:RMZJWZzEpceTdLC+EX6SBba/fy0rnT0W8srXsduG1/c5ZxWgqwtUxUH33Y9rNRfF4xWB9/jFXnbBpEFoZDWvs8kBjP90T8GTxaW6NPksYMBlCJmzG3OVQA4cLJMRzLT8WU7O65xX3ByW74FS3ueBMFYLiOFuxcXq6xWFR9rlTbU=,iv:DmSzb1Lb5Y4dk2/w5sWUOlvLcS/ikoHd6rD2PTijVbY=,tag:z2yQwhH1W6E4fL/K6bLaYw==,type:str]
|
||||
lastmodified: "2023-05-17T04:43:20Z"
|
||||
mac: ENC[AES256_GCM,data:ckF80Njd6BQXJpQ4X2z0Os5wvfZ2zjXVyTqtGQ5fFIBDoGa3tWgzIel98xIRgx4f71kKisBsWg3ofxn/3gG1DR5vx8EJwpekpcsTq1e8z4ZKFeGTIMwPb9GdWKUJBvuMxv7dQxmM6HgpwkUsEFUaxmNnOmetK3o1g9LMN0VSpuU=,iv:VTLGM8ZAFsFDNcUop6sqfw5QBRFtmzDdZHWxHMHmzow=,tag:e/KQ0ytN6HfSJohGAtGcNg==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-16T03:02:11Z"
|
||||
- created_at: "2023-05-17T04:43:19Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aARAAgsoCpfxfMon1jxrjt3OHRY/l7ZXPAA5gOt5EgPKM97tF
|
||||
RpnVczoXe12AxMTbhkAojUNq2NAkCeY1x9WhSz4vVw6ImgIznpXqEM1JiKLPHTCG
|
||||
UuJhYb/Lr6ehlGJP2YjICMu0KeeAMt/pu8h7n1+HuINxtYOwofxEe6hgAPS312T9
|
||||
LLa9NNW42kNWp/huszVSDVqibSBxFly6Ca13xIQ7O0BauTgsHSfFKkB/o0XavIG/
|
||||
H9jMUTj/HMr6R/OhS5oWJW0ZHk9QRVm8Q6bZLX5ZPBTfuHlFyb0Z0bIKl03cbUtk
|
||||
EnHMO40Qd1MF0Q1hiGFphAtbPPATGyKM3XVF8bVaw/utLzMYqZK4bLZnVQrkrRPC
|
||||
n9L6wd0PK3LYIEg1JCySV/HYpSkMrwRjbCO07XPlmkRSbRfHIld5tneZ73ICnzby
|
||||
7S3mxb3ZRYpZnmwQtNN9NnhYRYchyq4DB2Cuz3Tuz+9lJAobSESzNYx7EnKSq0ub
|
||||
ivmpDt8JED6ydNrtX1mUZO/rTiC5hBtUL0+eAg64v3/v3GDaKnkPlSxspnmGNvzh
|
||||
wpr1zQugytJTo92mqX4+CQlJZmGQPtrDjX0bD8F1nobw3MrP1ZLhRp6Kgwl0A5s+
|
||||
BPcyWkQT7KFAi9FB29hcan61UFYTkNT0jW+zv8f8Zsk58smOv/N1MhthMnGk1o/S
|
||||
UQHyNMZbw9U24M6z4Ut0eXJkp+GAX4BoDt/eVltlvnAginhdSTdvJE5wSsHNt0CJ
|
||||
pVDe5n4ps4u1xodl9r9nuPPr8WJfKbNjeQn+VZQ0qScvTA==
|
||||
=E3ap
|
||||
wcFMA82rPM2mSf/aAQ/8DF+bts51IM4cxJqEvN2hM5e4bkI24dE8/eNfMtzL2+WA
|
||||
sF9LSXsKOf5SQgjLq2wHFRdXw0Oh8KouaeL8FgE57lcFNWnIenKoQH0QbxfeKXL3
|
||||
UGiDK4tD3hdoFEkUIS0fFHnv+gwnRIcYXe3VXfUR1v6Zu/TCZkuw6NSSILLW+9ta
|
||||
1pIccfmiAuhDtLcE99E6/XPfMXDmrnNZISA5eYTP3ln/+dPPMZvsm7EXFu90Sjd3
|
||||
qyjLffoMFz978XuBxzTfBkSLynMDyb6uMFIQ/bLb3qGOBXV8f8hr4F4iH5K0E+eA
|
||||
/NOSih9JO1R9EmCwl2s9peu/bjmuLMkCr0tRmS9qIrZP4TEgFLRtm30ZCBgeO86c
|
||||
PYlmvo4u8SF34X7HOjB0NfJJr7xZbVHV1pUoHEsLUrHHKbKzZZso+azH3CBqVDjw
|
||||
szeZDl7zRLVnIOhFQiEa6kX1pONFMBma8zktGTK6uIAP81G/tIVXIW71P++v8udn
|
||||
pfvxeaC+lNZ+HmoHF8KiDbuL+tOPbTfrCCTmPMhWUtyYL0H4Zbh5am91WLCwl3Z9
|
||||
dOfYa6gEdN4Ci4M2X+NoaHaQmO76ED2aXXa9tbmxosXZha4m7FqbDQwLGpeskC7t
|
||||
Q7QTzuPSpdkMcBclz4WmCRWgsF8lhc8z5n7VrpHKQmJssk0Veac7ZijOZWf4v/TS
|
||||
UQFyrke/EqP4r1WotIyLosgAii6k5Iystwx1N25w9ta8VXfL9GY6Abj3/yOA7p2a
|
||||
valV9RGUSLWHf3MilQtToL1RSTYC20By7ojhPMFsw6i8SQ==
|
||||
=eLtw
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-16T03:02:11Z"
|
||||
- created_at: "2023-05-17T04:43:19Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUAQ/8DYchX81IWgcj502S7clcN5IXx/si1OUo3RU3Fc+bdcl6
|
||||
JguLGkdA9SGpPAxoQbEY6H6g5rJO6ciN5chJQPiIEEf6ChW+P4uwWJHvz6PnN8dm
|
||||
EYlxDrSrsUpDEKPvDV9aAQLTdlHxVIerBjtb8BMUPDs0muSNtx3cElxNSpvwbi1e
|
||||
pNafNIY3eRuxGHueG1Rzd09TsgcsupIL3MAtPp1OILXJDdJJ+LH+4qWkxJDKU9DE
|
||||
VvTTtu0633rlWdU4Fus8lPcb4ZwUZCM3/LuKmjqEalfeW6KCQ44gxrmAoKUXAIjO
|
||||
S4Yn3nbnZu54mv0Bt/Z39HNNv5ScA+OqqINYN9fEKSF/r0DJqVU+buFulxypvEMq
|
||||
KeVaz0lOw34T33/fTMFJaLorSTC7yAYsZfuK90+Mv6Jb34HIHY2LFjgRZyzEub1V
|
||||
cKzb8sS06jYZZ0csFAgoWbJPK2fgxmG4LR7xd9trDb4AssPcknG2g77vipD2vnJQ
|
||||
hZYt+f4MWwF8qrCvUQ2N3QrEBpNvi1KTrHFa+6ZUjE4PDlnGyo084efRN2NLIeLQ
|
||||
JH2oxKNaXLgms/B3cOGYDNxihmUMFvZXriJkuJWimTl8ik/3GU6rS+9BsDNY6EMF
|
||||
SlqX8URaKgA0e7jVb+Yt7EDloqyHjH0Y204u8e95KKUsUrUd9kTw9Sq36L3ogzXS
|
||||
UQE+pIwWCeaDxcXZTMh2ncvZ1Np5ITXHilx2iTS+0H19X4kn9QzuAlDKj6Lv2A9L
|
||||
2pU1RfgstN5Y7kkdWqQRlv387ATYpFrF6ktEl7K/xySjsg==
|
||||
=DEEM
|
||||
wcFMAw95Vf08z8oUARAAmkFuy2s31HF8E3rwLKrJEkYMLMslUARI5hhk9RShydwt
|
||||
ZeY/pshfGxd3H1z+gLmRa/iqiD4Iyhvtj51vOnnpWgetfnLfrd9BN5fP86kiNJqY
|
||||
LS0uLlNnlA3Wl5Q3qMXBRb2FqLQZKsoryGbwigmyFoDSmt50Cib7j4EABKUmA8Az
|
||||
ZZMN+65v6a0t9owyTFOTV/rJLwgo9TcXZJuoo/RoynBzKxpxEVMhN0eTn0B9qX6Y
|
||||
ttO2eLWB5vUWtU/FbXRtleROwns6K8vueQ9EKFxYs2CAK8rwii44Gb3VhIMyPHqA
|
||||
UrMaCXPJUOKYPlFribGSnjFfc2cRhaeJIb/AxCUtEerRBPqhO+PGNPMX6fTSpwl8
|
||||
xz4gno0DmDKGAv4a9onPEbCCMko57kcZT3s3maTE0Pm3PqeVXh5CZYtFxZx12Ngs
|
||||
GsYYadOdTBPw9mfTdPuWx3DBrdSVEIT94DQfKoPJLMLAJm3B18wGhGeYZXj883Gn
|
||||
R9eHA7w55BI6e8cxbMKBceXi+JVRr0QZxQe7YwgpjW8utjRQy7Cc98wnw4+6TE0e
|
||||
WkqeisiunxCpVLaNgAeJdzjtfawjiu+/AOMGjj06cJMv6zIUVOXKNrP8rv5AVumF
|
||||
uNw1C/QFhEPbDIOt4yfD8hBtKYckY9iRv1/mTav5eGQVeX+vsnXDStlEOkhdx+LS
|
||||
UQFi2I88txzZK503LB5fPW/asHVDay8ZItA1fZZFCzew0kqIzEIdsdiDMf/qa2I0
|
||||
dBKvq0s4fDjkropJWsR9c5/rG1LDU20/UZ78CTfdpKx89Q==
|
||||
=ALmU
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-16T03:02:11Z"
|
||||
- created_at: "2023-05-17T04:43:19Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ//d4kupW5D9iBrS9FkRZWC5xx1gBudSd5fG9jw+2FFJKVB
|
||||
I54nbbzMOtZdMr6arldSc48pAi6PVW0VbqA0s28Nxdo1nrPj3ZRCGiz+FKbIup/H
|
||||
KKNXTOWns9KO+yAQbrVtHQ8OnQHViksa48mDzmZwmaQJdWvJguSf+GLPc67lpu/1
|
||||
HYJSiMKHjI3t6/v75SoYo8zbaSd7tyZBE+FdbwUxouvvxaoWnr1DDR4SVfXqwvQ0
|
||||
mPzD6eBSjs8Ccxi0GlVkX573gz2mk4hLEcmqWOCRDHTupbjvvV0AkF9AfgF83lXJ
|
||||
/HfxpMn7dsg+O0R7ozrvNTOiBElOn4KUI6rtatnj/1O8q9e6Zn4abbbiDsEdPWXJ
|
||||
nrhhfP0iJCZ1GggcKEcwN18SpdFCfOGzm9l36mOR7e9FtpdefcBX79ytnXvE6b1i
|
||||
4MNZ6F+Hje/9H7VqIXonZVVDuyjAvo5DjkRu4kHM/5tNHflVQnWOAj3zOyyMipdu
|
||||
Pinn2Ru8j2vvFtCx5jSXXVnvCqG51B+atFeyEAovyfsJChHDH0qE3Ey7AzmIcpP6
|
||||
122MyRfYYkrH0CFSSj+J9/IQ7LMn9IN2R6xb1PC4XyQ4qCeMztuuwn/stD5UDjxW
|
||||
IzYFdgp3Ae2zTaVlTHrgIGYPTONUvbT23q8Wa8u2oxPW0WJqLE9Wt7twOA7OKJbS
|
||||
UQHLkfzi9dCacuBMJHf3cpRCBSDmEvt4v41myf3/KFZzMaO9/TkPQhaM6L7eMg4A
|
||||
joD5qiDyNB+itYbx5FveX+Ckpk3BGUgxkiBFAw55b8rw7g==
|
||||
=VkDK
|
||||
wcFMA0/D4ws+/KPtAQ/+JH3bDOtFbLGQs6oYu0eyNTNwME4bzbyh1AUPPZeCx/2+
|
||||
vfRpHX/3C1jg9NPAg95yC+xJwMVxjGthAUE5jGznMr8tpv6dMCp9PINrYm1X7OU4
|
||||
C4lrlDRJ1Nyi+eWrDzN933kq997kMHAVC6LdErTOFKRfZ3PrG+MBZcJJM/6pCa+8
|
||||
iLDOTsbq4bXzctRZxVRmuwZfPfWHn4zZNpqo7IMRfYknfIoVUKRkHZBz8vXxPjFy
|
||||
Llhr2bC30ZrTBwSuIApxIv0r6dwReuW4eIHXSVlNDPB9NjmbT20bh3oshhRHanCK
|
||||
sIlc5YxS8zbycnpF4CRM25wXeBSSxbtBUeh65ciVuHWQyuGseybjzo2wPKe9KiDr
|
||||
fMG5Sq/NhS+LkMcGDzs5rk7yf1HCmTBdotHhmf6VzHXxfctvJ6Q68Sv/kjJeyPmP
|
||||
8/flvcf12CeeR11Au05W2ZmhbftwqwIaxHYif3kCwMf3jf79ZghvCORhAuEOELV3
|
||||
am86dAFAu6aSrQI9V4tqFK3sbHOCY+gtzRLhD/E11+h5o+fyApz/5ZBuyv1QJ89C
|
||||
Lf8NQMQdm5FJgeI9kIOFGtkDtrHFtI1Fewcf4A50ieQ6jA0aIfms5LLo/eqjeONY
|
||||
iKFUS0wg/Le6wCm+2z+dfYp96e7FEglFBacKB+WSqRdbyFiDthPPh/0nZYOAEObS
|
||||
UQGdn9EdcRnpSaEkOMACNmHYMfn/WIFC+wlwZTFhn+QXS2XyXxPqxR1XR5SDazCU
|
||||
e4iBPpnfiklTSRHKg99a/AeV0pMdfjlVBd1PTS9CX6OScA==
|
||||
=/Opr
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
|
@ -3,77 +3,77 @@ kind: Secret
|
|||
metadata:
|
||||
name: keycloak-client-config
|
||||
stringData:
|
||||
AUTH_PROVIDER_NAME: ENC[AES256_GCM,data:Io2mXly2E3g=,iv:WWskGOsSUUxDAmVj/nMUHVp8yWvuzTmhszG7EY8UGnI=,tag:RYvROXLs+x6az+GMOHpRbQ==,type:str]
|
||||
AUTH_PROVIDER_KEY: ENC[AES256_GCM,data:xj/J1eb8GQ==,iv:lDnD8wQXH+5ELmPQU7feO3nz9VgDQkCIqlk1qaU3AIM=,tag:IzkSEIH2kmu6seALTkMIZQ==,type:str]
|
||||
AUTH_PROVIDER_SECRET: ENC[AES256_GCM,data:zo1+LnYE2l4HgJPuhi+naCqdgnX3Y6+DJBoEpTydDT8=,iv:LCo341HG1khZxfLVCd0WWDKL5Jdr3IliSBI59FUNvVI=,tag:+5JagjfDs9WxbJOPpUIYDA==,type:str]
|
||||
AUTH_PROVIDER_URL: ENC[AES256_GCM,data:mJ0O17EFLLOACryKpfRA1Gi+/PCBm+u6323H7RVhiMbK0G3WXtWgPF1BWPwSXa5V0C7QmvCswIjHaM1zy1k18Qbpi6ciud2+LSLNb3k=,iv:3Y7tQd2thz1PqBU2hfa4fC6sQfiZlfrxLvMKrA7pyTU=,tag:VL/3bj6pekimKuJRkLbMXg==,type:str]
|
||||
AUTH_PROVIDER_NAME: ENC[AES256_GCM,data:x56JkJ9hJ8w=,iv:dSi/y/gO7G6fyEV01NwwQYiNFCFmbdJ6Nx7WF3tT0B8=,tag:/UZXBBTmzJ+UCKxBukqE/g==,type:str]
|
||||
AUTH_PROVIDER_KEY: ENC[AES256_GCM,data:aUXX3mqFuA==,iv:u1O9OgTk95ASgSbpNchlFs8UMPuqpPubbbx+oD9DPlo=,tag:FZ4W0dsBx+1bGI5oqeT+UA==,type:str]
|
||||
AUTH_PROVIDER_SECRET: ENC[AES256_GCM,data:YlLZnS6d3pDvVLmB8UH4b97cC4OX2r5YZlvhygI4ZO0=,iv:/QET+u0xwYBH0hMI91ApcgTMhDoNJn2HUbhiIdukH5E=,tag:FhR6ER/rto18QaPG0XmBwg==,type:str]
|
||||
AUTH_PROVIDER_URL: ENC[AES256_GCM,data:ObcwDFglRD7QcbbSo9HbvDoScOCEuIuGMakuh7IgDofbrgvI1wfizrHPx2ERqn39hvzMeAnm33PAOmHq1sJGAmjFNOYOFPd0PZtxmW0=,iv:LcDQUz8gO32iukWwzhJSLShtATPKbXB+BHE5FNe8WoM=,tag:9SPGXZO9MTa2CACuYQ/LBw==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-16T01:39:54Z"
|
||||
mac: ENC[AES256_GCM,data:0GRi7AsCBvb4g77HRGC+Y84GBtoM/wNJ7+omrNWojH5IleTBEUC039IgSlMjBkYOnE5jnAWYVjywD3l4E5v0+fy4g5+q+iaRDm/fKoNupm6aigdumihuh1KcoM+q+qBmfSi28ZJKvXuLfvmBGf4K/BkDvd57j7v2fiIoB5I1kes=,iv:y9h13Mtce0ylsGu0JvHD3Dn0CwM9I0N+hBKUiDp2dE8=,tag:7vxPXIU41zgrnAfcUfsVwg==,type:str]
|
||||
lastmodified: "2023-05-17T04:42:46Z"
|
||||
mac: ENC[AES256_GCM,data:yEhIqMzYb1AJIcKkU/8lizXMrhQf8Sm+WvTUp0O0OcBn8eP2RRyTpX5CCk0///Dv/FonfheKTz77Hfs6L+8OY3GU+WxBmo+5F9ACZ4aGLHldvw60gLH5J7PmR7TD2L7D0EE9OMD2EeTKV4NJA0AV63W7PT/Vr7rO0EITGz1RgCE=,iv:OwfyaH1V9KwkEBrrclSMqT5uDjM6s27MkJuQTGoWei4=,tag:65kiPK6WSIAReLJudDkM5A==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-16T01:39:37Z"
|
||||
- created_at: "2023-05-17T04:42:30Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aAQ/+ObNAqozTfRQ3E2WB7wCrn9xgQ4hMPe1XVRQGqgBaDsvk
|
||||
axlOdWH7nbR+7WbJvbBeIWU184OnICfmONpb0XHQMdGUiuyuE7uZFubsQupROui6
|
||||
6CA/4tmRAC26WZMa7CHfbkT8sCiKuGHBR803VQno9Yqh+b76TB0K+jnGatTpbokW
|
||||
9hdz8UcB6eq9Sqa1EPXljj6GxLLE6H5K9gpxXJPHiQYSwUFDdBnaU9ewA2AGoIuu
|
||||
iGX/et36eIHWVuoptFI8t7LDXfkoEFj8MKlPoskkgOAh9e2gX/BhyLQ02xhZMaYj
|
||||
8A5r7anNWoUL1gDhIoB121gVuwD21pei3pK4rLgW8pOw4ZheztiQrWeF8sUmb+WJ
|
||||
4TN/op7owiLJBJokZvLCPgeOkcmhLsp+mhHzWj4AfNcDYcnzBnChpd/6I9Y5s/0a
|
||||
oBsnThSywf2XZG4QX37WYmORWoqkaq6Qjd3IADYsTOY8lcpfl31Z67YOt+C0gwgZ
|
||||
GOYMYdNySzCEXPVhcC50XRj1SWz2hTuOCpjW7vc/vTBhc1AlU+RPI2RnyxuXjxeb
|
||||
zw2wLAZGbwhUcbaKMBJ+LlWH8hlPuvotPXty0JuhkJ3BN+yNEMLlJv9gDhqfam+S
|
||||
jSNl3iWx7k2w01ztqtfq7lwRo2uyu5hctje916yN33poiugjIPP4+mXLHXnL93nS
|
||||
UQHBxSTVnVkJybgAdx7JgK2Liiteq+Yu1QxtAK1C/RQ0RxcbJXT+LgpSP7AIAL0K
|
||||
62J/869NK7y1XX3EV0yPklSKgbN6rybKq/0lyvRoA6WdeA==
|
||||
=DZ0t
|
||||
wcFMA82rPM2mSf/aAQ//QbHBxGnGu3SQZ9hQBeKirQ4BuoBTntPQpW+696a0Fb2y
|
||||
5qvkdTHwJ95HEhTDhXtvppSUlqxvjfmSp+Ps/h9gHIEkH9C8W6Cl3EvRmIwv6wVc
|
||||
ur9KSuSOJydTDKwnXlGyYaQy5o+JATENAwNRd3F8ttP2KhphroDidfAdArr6EGcV
|
||||
rTAvNIAWSkDxffPrA+3o5iNd92LGQH52CDzOcad4TipK1eMnMC8sEAza39pm5DIe
|
||||
FfOv8tnpI5Tz2wX8HiayCHXIzYNKPMHMp6SQKfxOZ4jjeisajOwvhNvesK1K3ozy
|
||||
JStxI1qREZauI9j6HOPDgNvFe+qe1y8c/Ua+gMaK3pGkGAIOa90EfR6ANO2Dr91i
|
||||
5F15eog4ONzeQ8mP6bEk0Ehcvn4kolMpgk3tAVJDHS3TMuVWUyyjA4CrKbfgAqQp
|
||||
7sh9qGG9lgD/uAtm/cja+VsOPisr7e4Mejbv3yWFvCmx6d78U3To4luLd4TxfB7d
|
||||
TIx9FP32rRxzOiMAOQ/s8vDor1PfoCQEAxSrX3f1QjoR8bHWshcb5v9XhwkpDpeE
|
||||
UlkLLoqnkPcerXlwUX3kCgO8gW4yx/IwsfxwiZUirG51+m3+P1Cm3grrBqX2+v1U
|
||||
u8jtlDjFhTBO4NUKniPrfDz7okuBMlrYM8zMWKnERBO7zbVjNZMgtAIkihV04szS
|
||||
UQH9gVSicEixmM2Cms0RqQiGRzSU8gqzXfrVu6sDxSTcVUByANzC7qqnEjowCWKX
|
||||
TJ6jJrR7MtSJ2JUHjOLM2vD+FdEbEjN8InMmA5nbFpsGiA==
|
||||
=vrRi
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-16T01:39:37Z"
|
||||
- created_at: "2023-05-17T04:42:30Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUARAAoiPfLJmhhn6tR76JvB6CMk4WwMVURBN9FPabyujgRUkq
|
||||
opw5IBNu+ou813SK4JHvMrJht1Kk+wMxgoxXr4MJGtBPaepuqO21a5udmeAseGq6
|
||||
QBFeuEWi2D7HMC6i9xr3WrhpaNoGzfFuuYW/zEEpO5p5Z5hYl+37sA/vfkzvDMkX
|
||||
X0+poVVoizjy3EWYF8MzBzaZv+J45BYWAxVnrr0/RI1+IasN5/Mc1F1hzky3n4VP
|
||||
LsgNPiJ722Km0ORytf15l5//n1oVKrtPcmNoCiwb3OIWGy/uKfvPHMvZJwMpO/Rm
|
||||
eFOTLCI8rF91TOT4OJk6NS8xVfRO7b1n8NhJ5uwY4hBREOmjlZ5uPgKN1rTOuVDL
|
||||
5QbH5FlbszO73zyYRBzajyPuC2cD6DbAgb4mnrQ+NpcDR11NLGQY2HcRX+qxJRLS
|
||||
Kkx++/vNDS+dZtQlIFHWX8MPc1k2kIrgphWCY9ztoiZcrM+IMfnatFR0MQGiv4Bg
|
||||
qJaVurV/pkQQe9U1f0UEurnnDWFzt/T16fkr2r+9tlQee0qV+VtlivWYRNBkKb8B
|
||||
jKy4RIBdCYg0fhz7pfjKwEXkHKKPXiKnoOX4kNO0VoIA5N4hHD6xHfpBnFXoil1Z
|
||||
4dnxGHe6OTDqVXiJ9oo3it2reQTWdJZqU/YtND55YAvC+k61xnO4Vucczg6cGRfS
|
||||
UQFLAMkkenHVO7rHYX1io7Ua3t5061h53Lil2BlVVQ2L4N51lVUnkjT26lICqYP4
|
||||
vPZ7/xpTPthlIBPX2cPDvq1pgn1sqIInMSeGdO2P1ixXow==
|
||||
=xXwH
|
||||
wcFMAw95Vf08z8oUAQ/+LTd9cwkweVOtvlNxBLlwoxA9sYRXkzXXUGMefpf4C+WG
|
||||
RtWxwsH3FDjaE5FhT05knXDfNZ9R5Q7JHCCYXx2rGDVOuA0Xw/CAVBg4sRXI/97A
|
||||
H9STSgGyPR3wnltiZTEMHRjVN/ka0oK54/1Is8TBCU+1iB0VGEHemij5mEwe+uZ3
|
||||
rX9WhsdMokMyfLdM2bTCstTXZxlhJog/VL+JnGJqSlZIUFoLt9koo33yfKzAEs6h
|
||||
dFLODFtRqdxkEEdOdQ3Ph8UesS7Q5FV/nnrz8QVQUIySL2Ac8GWSpQn3UDh7CrNi
|
||||
r9eVbijlPkWQk9XbOVn/XN5bssZhhzqgkgPROleInaoUe4lvwa5dxEJm5VAaYkE5
|
||||
MgTtTDCahF3p9kvALMYTeAfZGytdPR2T7emi9uoBwkEDX0C7c/SMjiXnvzlq3nm4
|
||||
zjoO+dYxfnTcX+kguyvg006517viUuDT6muXdUD82XAEEMjuoIlgqpwNabkjk10c
|
||||
T2uKWKgCpaDTPplowup6TC1YtYvhfaAAY+lGpM4iNBEhwvgeh/L27cr7+SnFSH25
|
||||
7ekNUtGR2WapP2ptQ5wvKE71u2HrhxnjYRMnG+7PjeXeumBsljeS9hX6ubSLulkl
|
||||
vEPKaL904ab447rmU2OxuDGUmdBsVGRVpeDUTF147kTE0+1rGYcPTloLHEyT3pnS
|
||||
UQE0dY3HJwY/mg0nFJk6ZF2az9igIsKwzqAkUXg9uhELZlNG8LSQzlOQ1z2NPa+f
|
||||
6wqqQXawx9YeKSZg4+Ew++JX0Dma+t/NWZSgSlWJAm2HaA==
|
||||
=W0PJ
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-16T01:39:37Z"
|
||||
- created_at: "2023-05-17T04:42:30Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ/+K4pZscts0jF53I0wX7htbFK3WyE7EOsDs3KKa682Zkgo
|
||||
Vhou8x0iCDMQ3oyp2rM14LTv6feRc/Iy/WMAR9WVHeLlCQwl5puyHmyI+0M2uIM+
|
||||
kTqVrRysGHhbSZaiwcydXwEhxInuXmoxD6zDGaLzkuy9hgwc4Ejyeu/gCF5kPqim
|
||||
v3DgaBBUOl0Tfp0Q73onUfz+cqeRVG27TbE3Izrljho8sTAFOBQHKCuVqh+TnRfl
|
||||
PdPzImv0/HJzFQLnO0p3VTEU36JD9h270ATbTt5pjeYYCtMJAP6tH5Yo3tDU/9XR
|
||||
QDE9hJfJSTJdL6JWuvwKslqgNV6lS3kUSstKO3Y6H/0Jv3iSYzNqlCHoi7c/h6H0
|
||||
fprOfT4ymOmV++BSYlsH5/AqXCMWsB6yFUMvTNGdQjRtYY5NAXwDQUaNIHSX1VMC
|
||||
SXx9qqQOVEfvgDRtzKW8Hexz2EAAG0B5DvQA4C1PrENmYqpcZmDOTvO17LgipWeD
|
||||
MWHLoyIjOcNy7u0XNgagn9pJFM/FYhOpkleq6pUGY3whyA/+UnCoX2YPieuyTatD
|
||||
S8yocJveqIwmGBya7oGQcYRorZGVH02DGMUq0G+aNPnJg43WPsrxGAEm2y8Eg3iI
|
||||
jZCIQPf1bnxRpwS7iFJxh3eRW6ncuSa9DX4GL0u31m7Ophlk/hijfGlzhkNvWWvS
|
||||
UQFmR9wKqXcB47FjY9dwNiydeHmUXJqNVA7ajRXsNe9WXweZ27TVip430it+yurV
|
||||
ulL2yONfKWI6RHiQ/1mS/nZTuQkzIDZzGYu5oe2UhGKkNw==
|
||||
=9V2r
|
||||
wcFMA0/D4ws+/KPtAQ//Yv+SwxWvr1vkaCIW3l3RCE0Uq0T2cxxfoaqYJvvaKfIq
|
||||
YkF2TZWAa8JLicQss56K0Gvk8nvltjwX5j0AZ90PdIS4+ju+OjeGnFso86xSb3hv
|
||||
xE6fItMXRW/DUqF515waU628W8J4UhiiZjTX3BtvVP4cXmh/Cj3yXY58eblLqn2V
|
||||
DGS/YNG7UeHlZm6myUJ9jfaqer98rYGcLZubQQZOi8iQLgau4uj04/sp5QGwLkZZ
|
||||
wQ1Thlwss9Fx2FZgCibtk6Wo69peb33NsJC/muTP1mk9lfEZolMhPaGHE4ESb0dd
|
||||
MloJyJALQZT9jwvkTk3Wi6tT86LUYTo97AjykNN5WdcRHL3K2HTHWSIGQBIm9xW6
|
||||
L1HWcLUGuPaXeMN1PHRZyFoqnT0wxvYOxW3BHUz+50+3fq1OKF5Tq7nxPUOU1OP1
|
||||
5JerRvtQHZYpiStfwZb3vObLHAW33wY5+e/IRtbO+i8TPG4fHd+wfK2KwdQyNYoj
|
||||
JBrddff11tu4YQmvPzI2HouavtHNK+YuaOGHHuI6o31NvnJTPcB+R0nkDPrpHOXA
|
||||
UXahuEJjWLjSRwBZiUjDuDtYmVzkN/0Pb3IUZP13zNQOffbl6p9X57jHkryF7qUv
|
||||
rRKZBhSAyPrwjvpr2EnAdEThl4gu91tIWh3lNKJRz30w9rtcn6Erqa84bTcPaI/S
|
||||
UQGyFGUWQ/fZ4STq43owUuOKgvk/p6PLDBqAiMpO73eXzqr7tUP/ZQhESAno6BB7
|
||||
OqdEI8SS2FXS7YYdox/DdnUZC2AB39/W3mwSUKCAs3XTQg==
|
||||
=XdhT
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
|
@ -3,80 +3,80 @@ kind: Secret
|
|||
metadata:
|
||||
name: database-configuration
|
||||
stringData:
|
||||
address: ENC[AES256_GCM,data:FVtSkk5ti72nc5sgQ2yzCDN6hvWqd17YwpSS8EkqnerxX1iebtS7P+nkQqaNiN5BaTp4xirjEdkMMVYGfAchYsY=,iv:BtysOt0wWM1Q+9SMw2FoQtHd2rXCCjNvDC16dXsaHzY=,tag:7EggMyJJ8TVwQE1c4u18XQ==,type:str]
|
||||
dbname: ENC[AES256_GCM,data:9yBojYPVsw==,iv:yvw5Nbgk73rZuInG+PByq26oGLDe0Sszm+LrVC0W/Uk=,tag:Nt2XJXOg4SHB+py86KX6ig==,type:str]
|
||||
host: ENC[AES256_GCM,data:v/kW45090UONtO3fjE8J2IRr0vz2HbLb2k5inBKPDrVqmIrC/XbBPU6S/ar023bdQb2wHn1mcZU52m0=,iv:99+XaSJmavGkJmkIVyUNCuxM3Dsqme5/dvOXmXgIRUM=,tag:VECgfR80Npazn6daJzdRJA==,type:str]
|
||||
jdbc_url: ENC[AES256_GCM,data:584+73EqTWRc6h1q/fci21SSXhHIAKwsq2zMUrCqxyti2DF9BLvYGhlioIqWUsZ991BWtAv1UdHCU5tzx2/rCoYtI7zGF9WSz/fEU0gN4SqGLUbg5swtUcKg96LGHfTKWqtP6Qcx/CGDfj8=,iv:oFm+sYaim5+a3qmJwYxI8cHC7Ydj40RieRUMwQFe2u4=,tag:RlDqjKY0/RIm3Ps6b3kDtw==,type:str]
|
||||
name: ENC[AES256_GCM,data:yruLsayHYA==,iv:yc10JFsc+1Z94chPrVl1BGFLlML9Ls/2Gn89oYess54=,tag:TodFxbFT5FzHY62pZDp0Hw==,type:str]
|
||||
password: ENC[AES256_GCM,data:Lrz0uDbJ9t8sO1Pq3Lrfy1Cf8Xdf4F2d,iv:qkO2ik2cSxttjJigtqXHlsq3VnmuSiFvL4uc7jZtKyw=,tag:9w9ebhaFUWaHV+/KwSm+6Q==,type:str]
|
||||
port: ENC[AES256_GCM,data:2o0wuVg=,iv:AqxRgfSq1AzhjXlpiNPTkYV7NTUi61brSOcErr/VhtU=,tag:T2tnz80QdwansDcFqCjYHA==,type:str]
|
||||
address: ENC[AES256_GCM,data:63ZDrBbSqC3AA1ih+Y5voTw65P9TMfjJkkOdvyAN06dNHahzGtANQk1QOF4hf7aY07XHJ/BCYB6pr1IzzqKbKnE=,iv:8vkk8TlbsZ8zCHw5bm4b3e5rbxNuAMLn9cfBs+eUMKo=,tag:9AxSNd5AoHLes9GLVtL+AQ==,type:str]
|
||||
dbname: ENC[AES256_GCM,data:0y+eZJ4qzQ==,iv:mCSRJKjQIeobFKlsIAwCi2fn/g4JmweQYs2w/7g8ah0=,tag:t8afmjnuTu/RIkv3TPr9wA==,type:str]
|
||||
host: ENC[AES256_GCM,data:24ZodubPg2+uKRc9cXMY7l7hkzb4D9xVQB5n3hKwcEZk2z6pQB9H2zZGix/TmpOofvuF9v02kz/6Ro4=,iv:RkxOm/VzGFmuwfdBgmqIsMdfU2sDIgN5MzrkCcWdDSQ=,tag:/bIx1wpTjPNbNrdV7fqvBA==,type:str]
|
||||
jdbc_url: ENC[AES256_GCM,data:od/PVm0tWTJLKQpYDOPDNTa2GOeQu9yk9XpvDPdJLwwmpaoXmw2KwdXBsdlCeb2PS6oc7g1K9b4bgUgQsbJ9M1lS74VnXPSZP/lcvmimhCfkdAtll4HxfQpSe32KiAAeWqS2lVejMt6VDIg=,iv:9+y0N4VR3O/3ROMSfklCp9WlNjpOJp2/2DwO3h0/Gfc=,tag:2ImzBaEqV4oVIDsZYS6prg==,type:str]
|
||||
name: ENC[AES256_GCM,data:mapnSTvdaw==,iv:i8aIKJAMmwh2dLZn3tOXPa/VWF90CSb9V0NEuPMWjIc=,tag:JmsbcOm+zMgSnke8MpZ9PQ==,type:str]
|
||||
password: ENC[AES256_GCM,data:Kz23HQT5u+qArZ8XzcUYq86ACimqRpib,iv:2oOpxRqqz1r7gTVmVkeTN64iJAJ31WtwSg6oSneP7Nk=,tag:ugDCQk4SROxu/38tnyBy0A==,type:str]
|
||||
port: ENC[AES256_GCM,data:THs19H0=,iv:ClV3x4MqLoKtJpeBbiDUYPgaSu0s/0app82jfE/J8jE=,tag:iSM57k3nE5LQ3UBJq3oCIQ==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-16T00:07:06Z"
|
||||
mac: ENC[AES256_GCM,data:TJpATzRb1pItqtHpecpfmEt6AwpcP8AJz5cn6Ra/fzEdP8k21lkJkaZHZeIlZzfZ9FK/oynZqydley4pILxvT+I9M2xwTVZOK1HZ+n7wlDxpTodv+jnzLPBMcuDR0SwCK9WbKuUSbUJpEgYszMJ73f7vGc15oCp4qc7ial64SgY=,iv:073Q5MHchlhCXi8/S/nSFf6lQvk3YahQWweNk14cZjc=,tag:cFIjs4d2nVfucU8MsNKawQ==,type:str]
|
||||
lastmodified: "2023-05-17T04:51:07Z"
|
||||
mac: ENC[AES256_GCM,data:VkAYUP6gCIxXq282+aeqeBj9kYNemw3C3k5+twxv58nhz8rFlzXKwEpRmi38WH1mM13bcp5usVz98pIKGZ00kh1BOE8LtvFbyUUBH/WqRBAZBFcuBC94Z9llVMDlZMaUTmSI6bPOF5ZMtB7YieSU8fgfWYm2+jaSLNPc3BiE3k4=,iv:ypClxnTavYFW3PJ9non3YKAUcLHjXN1YpaMIcVRw2DU=,tag:q07HOHb+Njn3xyZ/RgFJEQ==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-16T00:07:02Z"
|
||||
- created_at: "2023-05-17T04:51:03Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aAQ/+JM09ezDH98a+8K//Le1bk7yjADNJGB6jvtnLXNr7YNoi
|
||||
qdTOTuNwbwErRg9iZK63moryzKBy49xMZb4pKDVE58p2UHb7jkTQ3IHblYZHBW/N
|
||||
OPCZY7sDMl8gLqpJeRkWe7JY5Y6oi8bYYBCmVicDoqrqpK1FAO+ERpgdMPmK/gkG
|
||||
fFfbtTBV2dsE4DkNlL2FxB5pbLjTW3TPu8MNQH3bjrGlXF4FbXklx+OwdOyapt+c
|
||||
VQvh0VY071nFoh2wOCXG+uLIWcYClbxwM1/i639hv0I6jefnjqDTdy0CTaCAbPx5
|
||||
Bjes3gdOIm/yharVAAyWboxX6I/LE6HMM3NwjXh0kJzsHdNiJCrliC9Td6RNlj/i
|
||||
r3Q0kfNmZaSEMCJq/ADFu3l2FTu1iJcGeD+pauzRZUMy2+7dqmwX0OJWYvE3jvNc
|
||||
xv5Tp0j6AvXoMlP0bREitot/GrLNa8FwbCSzCsgBGeP6oZn5+e4qZnj/eRM+x/Ie
|
||||
795Lxz6rMXKUS5lRel/pSDQA4tT9mYo359p1kyNlwTURtbCEXHjCniWTCm8zGqW+
|
||||
6HMVW3GpJkJooy1z5w5mBGyk4DYHnO0jds/Yvb1V99J1iY6ihPRhWyXj0X6QQzN6
|
||||
MUTjcuNbdE6nCiQcpX2I4qdSSFlW1WP3OPLdDoGd4sF1jKSmjDeS4+7HvWjF/g3S
|
||||
UQGIJDmwUsxRZzbvaZS/kDOG9iGmfa050cEQUhdZyrlCbFG/0xxhwAmbUv6uojHb
|
||||
0kmIhW33tlBfpwfSAJZW6na2AEhMIfV6HpG0RveKKCKeVA==
|
||||
=EZL3
|
||||
wcFMA82rPM2mSf/aAQ/9Fxsu+M3vAwsBt81ttsgqmbuNT9GJs/kaq8wCEn8bXb6b
|
||||
Z6xMZjkPpBrpLw9kTm7xNfWEAtSZlEaOZk2JdnzX3pkoavbU39U0rPasOtBeQCPJ
|
||||
Uh183yK6AfLz9T/y9Gtd1ucSKQc06GcjgefOJcPvkQSytLHK1LYkEb8P49f9rvHQ
|
||||
dzh0SJ/+UT2m8J6U4tf6v4fzKfV1QQP1J+02EBxqgQEMWf5VpGQMUyUaWF9tqnrY
|
||||
mTIrwWrBLII/cZhmeTAmW6xcGJhcqV56Wp43CClKlWkQWW5VsxYOI4jYSzpp5h3Q
|
||||
cIVqJa7wPc1queZ7QT++hoyKm1rgRkUbJUWldVDdsbRpaNYvLbeNbNP/5hymnTSA
|
||||
TC6GLOCXaE8oD05Ej9c6B2Dudo4bL0gzncgy5d8/EHyVGwaidjfvUTbIbEnXPLHN
|
||||
k5UuLyPWxbGmmJgBmPFBoKmyNb1z88PCfoSe8//aC1BHzpHUU4ttAC2/WJ0VQXn4
|
||||
jvK1t8OD3NjjLUivwgVY47eOsoM58lMeSwhY1cqXgA+Lg5QwLvmNZ56ZjzHAHcU/
|
||||
MHX/fIe90UQsyyhnsdC//6e8g5Md+Ogn4R0sck8b1OLXw0xyssFmnq00HLYWF/k+
|
||||
zLWt0AQVjsBYbvPMar5qEXo37Dv5ysxDVMG/DiRc9tpTxEtThITHTbiG6H2CLiLS
|
||||
UQFewalfgutwUre8yghgrwJPJFcwo0biG+sE3Fy1p8DbUJdvsbcQcgGQ9Xbo/H0X
|
||||
ER9tesFK5lV23nYsKwIRFBk1sZhkHFw0hF3hgZGhNwU6NA==
|
||||
=3cqS
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-16T00:07:02Z"
|
||||
- created_at: "2023-05-17T04:51:03Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUAQ//SxyVJiGf47+Xpp1TiY2wdTugfGHc2VocNQ9CbLeNAmDE
|
||||
jA/qcxOVSeetqpLNQmg6UFlmmUIFdBnDJ0H5ZBBpu0gXHF8XTxXNk5vUoRM29XXk
|
||||
PjKVgVQCGYVhmWDhYh1+my66xDMKbymOYJGuCj10bBwVScHxPXM9w/EbXx1lcDP3
|
||||
4kYfckbO5b/Xf9J4+JB4sBdEpHcuKdrxAn1cWgN1KpGGec/M5Sos9zBk54ZcA9WV
|
||||
1RYYpkUUALtAdg1VcoPg4GkvKBT93K3xklOAdYoQI0fWR8/YtUN3yRG6BP48QKjd
|
||||
QJnntAyWTEQ1zdfxo6x4W8nWxDf9haySflUdt3o57o56S3GTw17NSbUZNsSpkPz4
|
||||
5TRDUYPvyK/yyeKAVAx4n7pKbEkoDv8SP4cymicAfOWOWjNnj2jbhDuTVCd/Xcht
|
||||
xocPNGegCn7Y2MSpcGgS8scDcfGu8pI5ZkeLxVrS4fLWtmp8jntU253hOSPQ0tl0
|
||||
c1fxIYkrUWh+1YwBH9UnZ2aBaWx0exgbmymK7eKEKRTGgE+oZqIWy/q1Z/mS79mC
|
||||
tNCCtzD4pxkhvuHUFjH+SvLwKLF1Azm+budRbEDc5qITjEWlHSrQBpie5p2dKKBc
|
||||
EnJuMn1HtyEzi5vTDhnjq+hI0OIfRAL+K3pA7QwqvH2m/ElWhk2GsosZ06dJMy/S
|
||||
UQHXJcTkLSK0ktV75bEcDfPiORnpzHgJdOJx20MV4Dzfeagn/v/Y4VKOdxn6pM2K
|
||||
EJ4zjMp7cURoRa4otGRL0myXlJqwyNhLC1OLKv+NjfrlxA==
|
||||
=fP0Y
|
||||
wcFMAw95Vf08z8oUAQ//e8sNyX/ceOkWiYJGzRC7/zN0Wwc8tj6bz/4iIkKBI3cX
|
||||
mSjr045rVerNvlKQEZhFmJ6Prde75nTeY+JQtn9NF/EpqJq7WLpP/K7W71zXiSLA
|
||||
1KKLDGqgSK29+OuVoqPpdA47yo9GJ6BEZAaUvglI7pKzcC3IdQ3qasqeGippVLRG
|
||||
KU7hANcLQ5n6Z5gRzOfXsVkn4PA3Oc+vlNu5mPjISEx/o9oRHM9oPRxa4icQ+RgD
|
||||
L+8CxXNfkHdgUg/epJj4XAa8wBKkuQwZRorXeeD3Dc7EVGo8j0sWmwf7jQrYewWq
|
||||
Mw4VRnCtrYMvh+3edNWM1OzOwEC3qFbdu1rUj49REQzThtjLgTCi8Or6hmOe95Pn
|
||||
o1yZMMqb4WMr9gm6rioc2AJSUfqXa8dZY2/HzxGXXn78PXb/9jnbDqlxBquQsx9S
|
||||
SUiZHEhYXeT0H8xjJYTSen47H3QlTzJwNaDjFvkeTbXuk//l7Qh8bP1ZliloFrCM
|
||||
OPKgFiaB3gaNoCVr+QIwC4ya12mp1A4IsqEujNePbTF9QyT1Y6D2vIAsWKRpaSgH
|
||||
9yr/KR5afNpJmadS0njCWuYGE0CPrpEaN9TVn+uBph9MGJhgxun69eeNOtLgvUg2
|
||||
d9WYHbsEyA+AdLISZ5z1MNJodQ42SZEkWepqFvcmqcW2lCEJAocGLVyMhcXZvarS
|
||||
UQHVNU1yswZrkL5T4BApriFU1MnS5u+w+nwrnIOha/a0wcFf7YAuLuXKoD64jgmd
|
||||
HnpzkynR0ncvUma3DLd9PuZvVmfbdaDk3gyRj9qWhwij/g==
|
||||
=U4Oi
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-16T00:07:02Z"
|
||||
- created_at: "2023-05-17T04:51:03Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtARAAnEl/8yu68nzqGMjeUGNcMHqCm5yseivXx4bdXougk8mz
|
||||
xYUkEneL3uYMdlGhs9C/moTc3qQbjX280+RCGjHyLipGYUjS7sboP4Rx0kWJB3gI
|
||||
6feqDW5uCAyaKfhZihNNEfcFglVdF2LHuJBkaw57jIcxqcK905Be3117a1PtMmJn
|
||||
gXRqHvi+cDliZ7Qm89LCTKHVuDZKYVkkN9JfqkOXNyz1j/S8f2vGID+yxQLCkHv/
|
||||
3+xB7umDONCNviZ4cUqQ9ZCGRB7OhT4VwrNjkFFMbrWr7eLAty+CDwpDq/cmjrV2
|
||||
oFuJJgKqD8+BAXMMlEN2dzrmr+ojBmr7via03Awn13Q0CNXSkdm8aeYZn6o8D7Ok
|
||||
KweR2+RczpKxeN//vBEJdeku+3+0sDqCPRJKYDZyClCSDf3IGGPpNwb6IDJZYb2q
|
||||
Im+p2DXGFfMGnAjMH+oGQ+2zuV/JHu5lnBbbmYn9C3WEZBzstLWIdjNFiiOZcs++
|
||||
npfciP1R6jXQGLnUwYdlg7H6ZpNeKCxtky6yWbrYgh8Dma61/T1WTc+561YYBlLg
|
||||
FOBuCwKd5Qw0o/wObPm6CgUC5i7+qW0MuB/aIVypQA5/qE7zLtksCXSxOl2YYrVP
|
||||
klB/hq/vcl+46YE8Uk9f30WuvEvVe8nboosDlSrrD/NAoulr4B5bu6w+Oi5rmfPS
|
||||
UQGb73b5HiOHD6Y5OMF3AUy+qz1Ga0WQem59v0PbBUbueSX7VgpiNjTobyaQxGwU
|
||||
uBNRWaMrfmelYUbNr05XrB2BGGfro+HzmGe8rD1maNl0JA==
|
||||
=HRlU
|
||||
wcFMA0/D4ws+/KPtAQ/9GEZwphMFiR9xUS089WmTbX9SDrKicEFbAgtVxWlf7R+m
|
||||
1WxYsWvGxPJE270Ts8ATjESmByM0u/CuQiH9g3j4gYfSAUc/+N6oXugMsFT5nuNO
|
||||
mZoAow11aaI3SIqmMaGJw8lvPtYhjEk3yCSF6iRN/7evzT8XtrEZa7eAkqyrNJpP
|
||||
wv6ISYeP8TPxj5PredQC+vqhr2CnfsR1yEwtZU3NYetKpFpo+esV1Nb3Yw4nA0ET
|
||||
r9pSSCPVTIu80nMwVLxn4pLK7BujlloqkAl9ohpa+VtBLI5Tt2/qVqpRjvvy7KiJ
|
||||
sYgO26nZC2zVp9DORlCprjnMR5IjQUMq/YZK7pOhTbG/XeLauxSiA7teQJmkPvWT
|
||||
mvM8++s4frf6P8qDHdZykkx90sINxX4o8HhNDTsV+w9VIjEBNVITjVddIXkwwR9H
|
||||
VZYdUosGwoUpRKmy0U1BIkfhoRQYZIBpGskkZ8NXK6D6qFjtKYxGv+87Ubb8C+n6
|
||||
vbLuJcpFYTgQrY5VMkXv0zeJHCxCtrPCNQsXVrfekvgG+MvaCeXQKYWVLwdoAZqO
|
||||
M4yscPtIbeFMneaGYgJN8S2JoSnmQr0ECo+mVyK1R2gCk6814AAjtlmX/VhGnBrt
|
||||
AZ790+9MfvyxYbpp0t+hwHYd8CaDJsaoU32xmQ9v1+RVCQTJVDjJNZONZPiFRifS
|
||||
UQEnAC6OyQbE4BpJLWCfDi9bQEfUXRsc/YoP9/H5/0CsdqitAKJDUWZ2bQyo7K00
|
||||
zZjB5LBAbBv+mljI6/CDBNJ9EEJ9gkFv4+cn85CfmcacVg==
|
||||
=oFfs
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
|
@ -37,9 +37,29 @@ spec:
|
|||
runAsNonRoot: true
|
||||
runAsUser: 1000
|
||||
runAsGroup: 1000
|
||||
fsGroup: 1000
|
||||
fsGroupChangePolicy: OnRootMismatch
|
||||
seccompProfile:
|
||||
type: RuntimeDefault
|
||||
initContainers:
|
||||
- name: forgejo-ensure-directories
|
||||
image: codeberg.org/forgejo/forgejo:1.19.3-0
|
||||
securityContext:
|
||||
allowPrivilegeEscalation: false
|
||||
capabilities:
|
||||
drop:
|
||||
- ALL
|
||||
command: ["sh"]
|
||||
args:
|
||||
- -c
|
||||
- |-
|
||||
mkdir -p /data/git/.ssh
|
||||
mkdir -p /data/gitea
|
||||
chmod go-rwx /data/git/.ssh
|
||||
chmod go-rwx /data/gitea
|
||||
volumeMounts:
|
||||
- name: forgejo-data
|
||||
mountPath: /data
|
||||
- name: config-templater
|
||||
image: codeberg.org/forgejo/forgejo:1.19.3-0
|
||||
securityContext:
|
||||
|
|
|
@ -3,10 +3,10 @@
|
|||
To generate the admin password for Keycloak, run:
|
||||
|
||||
```sh
|
||||
./scripts/generate-keycloak-secret.sh \
|
||||
sh kustomizations/keycloak/scripts/generate-keycloak-secret.sh \
|
||||
| sops --encrypt --encrypted-regex '^(data|stringData)$' \
|
||||
--input-type=yaml --output-type=yaml /dev/stdin \
|
||||
> keycloak-config.enc.yaml
|
||||
> kustomizations/keycloak/keycloak-config.enc.yaml
|
||||
```
|
||||
|
||||
To get the database credentials, run:
|
||||
|
@ -32,7 +32,7 @@ When a Client is created, the Client Secret can be encrypted to a ksops Secret
|
|||
using the following script (Forgejo used as an example):
|
||||
|
||||
```sh
|
||||
./kustomizations/keycloak/scripts/generate-keycloak-client-secret.sh \
|
||||
sh kustomizations/keycloak/scripts/generate-keycloak-client-secret.sh \
|
||||
| sops --encrypt --encrypted-regex '^(data|stringData)$' \
|
||||
--input-type=yaml --output-type=yaml /dev/stdin \
|
||||
> kustomizations/forgejo/keycloak-client-config.enc.yaml
|
||||
|
|
|
@ -3,75 +3,75 @@ kind: Secret
|
|||
metadata:
|
||||
name: keycloak-config
|
||||
stringData:
|
||||
admin: ENC[AES256_GCM,data:MRhVmq8=,iv:IMmqxQsXUcPg7Nwq6b1AXEipB4Ks05lEPrEh4nmTHxQ=,tag:K+dM779PcYEtCl/l3fquZQ==,type:str]
|
||||
admin_password: ENC[AES256_GCM,data:wzTxmvr83LTWSLCdtoprqHMRuBxKkK0C2dmFCcF9lpI=,iv:frlyzI4trbJRHpgzRWUffOgnMFNfaO/XAlrxKdcLATg=,tag:Lv8zMWDqyppClmstGB2BPw==,type:str]
|
||||
admin: ENC[AES256_GCM,data:OpUQVXI=,iv:itDUevA4gnLKfES92DtN6SY3vtu5fu88eVCUQ9KzWrE=,tag:4/8hmDdIS7ADSLcBN+Welg==,type:str]
|
||||
admin_password: ENC[AES256_GCM,data:H+RUQnraa7mK7v1wxNC/AVo/bcoxyd16yQXKUjQtP5U=,iv:B4ZaALHHfYo0U93ZVupHdQmnHz/ctwbe+/pxoMivaTM=,tag:FsGmdez+eEhpi9XZs6ayow==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-15T03:10:17Z"
|
||||
mac: ENC[AES256_GCM,data:UnjytZ+qoP9jsD+6XWo6f7Zrr2NGf4ZXa6bX4rqMoPu5VGbAewbKjeg2LQPLdB5t0V7cC0Zl0sfg58hLWZcG8igclSmfARkDBKeyCp836hkkUsoELule1jwUzlopNRFeh5W5P1sIpDt54QWulm7+stDAbT7tR586mIrzNOUj/M0=,iv:1vcNRq7pfVoRjPOxZvVKql5htdhAvueG1n2Qbx37mIg=,tag:vfuo+GbGz2p7MYib/uvxDQ==,type:str]
|
||||
lastmodified: "2023-05-17T02:36:37Z"
|
||||
mac: ENC[AES256_GCM,data:Q88SLpF5oLkWM/nCsrmjjnaqwvjZSkbpiuUzTHOPNO1YcPYupuUfiMm5vmwfAl2Z7KXJWDaQgwmRAwb8XId4XOS/5jF8B5wddyusiXqt/Lw5f73XN2BO4KNwJnj4Xz90je1eeC7yRpIIOcMvNL0OQT2JxxYG6HGg3YnXpVVXT0w=,iv:ZwCgmGiOaRWCnxMUZdnII5trS7mh3r9AOubV911wjN0=,tag:6ta5SGvbDtQgZ+omxCU39A==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-15T03:10:16Z"
|
||||
- created_at: "2023-05-17T02:36:36Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aARAArGyOdTV+QuqLX0HSdo13zZJfEqzz6arQ9nUVP9vSPF+C
|
||||
i96V90KmzC1t/C1RFFzinKQ6gnIgC+yDZAs1HnvBpStaItz9oMLrldqDVMaEpK43
|
||||
u2HIpHsLvo/B2QN/0g63XSI7a1+MsDHZHWWbat+pDehLRWy9BgSd5/cZSiBIe0AG
|
||||
NhwzeEIoEinecFW3NWUy9PZA0yEn/Gl6gdaNYLBDFdbAox8enwr3M5kmMolWmOgI
|
||||
jYLyVQhU8tix/dRCXx+vzIrus7rIvoRqlL7ji9nA1wsFto/6OMkxfylIZzATK3JU
|
||||
wQ55iZriD8WQOn/GTpDcomLuavu9/pNP+o2rszkws714CROPUa/vn963BZmxrNQ3
|
||||
W0ztTvOpJ+1dlR1ZxgPCBtUnv6jv6MCBC3DTtYtOCN7+CuRvlU5jSQUoiUyF12O6
|
||||
GLY+GiVWKE+d+EbF9rf3s/E9un4hop6izYjSP2R3lJPJvPX/KyFe0v6V2HfwNBaH
|
||||
t5NEui8R2/9icmy1nTTzXN2YMQ59buPgSJJ7ZAdm1Vf21kddZFAijOhAGU8pL08Y
|
||||
cH2lbD2Lx7/avszaG66Y+YkNnKWY1Ql/bv7qoBLWtC+49YiThxi5GiBfLTGGHXEu
|
||||
GevgmC96YumLZpdmME1y5Zn62MrVHO0zTXxEnTb4txkXHDX2SUB/QvRfuFdxySvS
|
||||
UQEU5w08lky/SvZ2pj/1EcTaJUv7pYOKs2yxjvD07IUFuWzwJTjqd4uxwWTaqdXl
|
||||
Y4I9oSUTaoM/Qjr/yf8CpJSg+mjTSbXRBlJAXRlomPuMKQ==
|
||||
=oFCJ
|
||||
wcFMA82rPM2mSf/aAQ/8DTrA2HnRfcn/VY9betvfUJIK3aCKUfFIVTfKm2PoMXBp
|
||||
vV2rTiR2iZa8+6YPPJWVR+S7s5MQBBkcUshd9KGUoRj55Oq/imZqoS210vofAa4E
|
||||
/gvhBgamVDHthqNBX7GLDKVS2P383B/X4u7k0cB+CPKTM8j9gytWQbXwQwCwSWoQ
|
||||
8ihfqsjCVpSvJ+WH3rVoz+EfjB72R1NJZHZ5/nU1OlaY6XFe8oh4vup7w1LGOSvi
|
||||
cJBr8i3ylN0zT9MKORmksut25zMlWkKxm+qfsCBg1yZbNdDMWQLGvAxg+VuQUZEA
|
||||
nIvIerPgXH5scKUSqN7koSMpxjzFv89NpAWGOt9/9prl1gHmXEzG2TNAyoYbDY3y
|
||||
lPXldbQBVYwFLMNg/HIGxVzwpge2YXMCVZVQgvRLsIhRVCCMnZhFYhkctrnnaBQy
|
||||
WkCBHFHqHhu+kVHr9pPDD4j3KOPMMJwCVJVUHNhPNjWBI2OKR4cmf69go6j6VrKv
|
||||
AuMFkEQvfwMz4Trj2dWpNC1ZY9mHyR0oSzXCDu/FQuxuR6LXtGozbWF0wtt1qUpg
|
||||
niik9rNWNgL87L6qXzRGOl1SawpxreOXrc/dnqt9aflO991FKm+2XrNgDOAYXjpM
|
||||
i8ug3Rrk8W9u2GatXaSQNTOADfUVxhhjA7dV17NNTyOKV2rRZkho3NfMxha62QPS
|
||||
UQGMpAYBmLwgorNfpN7AhTJs7gDZFXHOytH+Kb+4blxg+XkAsnMUEGacp5t95mBr
|
||||
Q50a5nc8M8g6r6N4QGcVAOPpaWAPEnU+8hzv4Pdb8xyCxQ==
|
||||
=AmmI
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-15T03:10:16Z"
|
||||
- created_at: "2023-05-17T02:36:36Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUAQ/9G8zOlijaI9Y3lXZLwrGw/PPgCFPSi0bXSDALI+HfB7ig
|
||||
4F2tHmnUz3BVYzEwkNgs4Kc3CqI1IJ1MrU5jCCqR9+fpAmkPrKr+oRcYrmb5PGK1
|
||||
81vYQ0H+dTThieNnI6bL4CCFEjwbyJTgPmiYrSO9G0BYyjiFlatqEe5ZI3nVk2w7
|
||||
Y3r5EZhFcVlTjsVuphXmf6KYzAoFq6EJn+nAJC18kqmdYBsK2iu1123kHR+lOWCK
|
||||
ASiTkPezk/5KxNKb0rnQQexqpGEqBzxBCEw5kycrGgIxUdy31+749BolB5lstsFC
|
||||
q6kdeshFBFzaNktH/lRKYrsee/qgGOHyheMC7HJwrLmsCvsESi1v3b6EJmNWApIg
|
||||
ewxD7aj9oUKQg4m4Apc5Fw2icnwRefIF48TFGefL3syyNniWlnkTkRfYMIaEO6gy
|
||||
a5IYg4utghkTx8uF+XQjV1njOEMsOekCiKWRhvacJsJ6ziWMXrJ8+R+NriIoJGV1
|
||||
svekoRuHTaK1NOH8Yb8Ftflqzf/MFRJT+xVWw+8S1cTXMq3nuYw6HgF2HFoA8STU
|
||||
exD8Wd57BnUyx04IMqtwDwCDgzuwNJj+CU8OfkuGytgN/qOTb8XqVKkI2oIpqCqo
|
||||
TtVSS/9W2vV5JqXQwSk1WU0Sxo8u7s89GC0uZqfCrD1c430M2UiWTIj16XFIqjDS
|
||||
UQHon6AwuwAz0HAD9H3uPspXV2h2v9XanAXf+b8wI63X68bPovbr7TkIsHWLFpzq
|
||||
4Y11aben+nwqQkpN4ei5DNZ5LQsedwJ50Z7wuYkOxMthHg==
|
||||
=8E34
|
||||
wcFMAw95Vf08z8oUARAAjbyM0k0I2kxY2e6ZULFXNjdYTkmtij/dJK/Y5TkvphzI
|
||||
JUL+sgXaf9GH4xOreRYbLkg31JGh/XF3ONqRBKxmShkbY14igDp+TBKLAx5jQChD
|
||||
OxZPLGWjum2n3UrfBq0tV6SQMBt3HNHRboq4ao0Epd7XrErx4banJkxujUaE+Dqv
|
||||
wh/FfQvNRGXC/L3v9BUs4lJfZcL0ICx1fuIxh/TvnA0WFkpz2KwCsQFspb7WhTkr
|
||||
QMbrztB1QK575Kp/iex/3oejxs7QxGIM8n03Wcla1NzE4fLLToYa0lhW/vkS9n5f
|
||||
daTm0ctbZdIlWyMLl5hJ4pm7y0Gj5Q/5QDxpyPY2TK6LF53hzVnmy6fWhn1QPtwQ
|
||||
+mwm5d/e9I15SyjvvYvQW3DWRl+HTPdzUaw8vL5gmOMpkZEbGYRJ7SyKKKM6xiHr
|
||||
rCd4mDw+Hls8A0j9okmz8biErGEn07tW3t9ToaBL+wj7ukb2S+6HbAgOm+SRkG9L
|
||||
Fb9eQEcb3yDOs1HOMFexWMHIlYYV+Y1LBQEytcY6aVrXbCmJH6xOpimHP9yrKO/s
|
||||
kvMW/sEqHFT+5ZNcg7ygtnsXcPP+0NNzxbia4KLwezGlsQr8631hqItllHVW/OB+
|
||||
Pfaij6/txbFJeD2x6kyKjo93vBMWz3R5DocMZoNRlS8yAfF0XbJDAlX//opnKVbS
|
||||
UQHgTgpE74vpL09C6ZnbSkM6fwUUiyFjHXH3W189w5QWcwOZNBCutMxtzJiLD4Pz
|
||||
iFR2IYU470OZHGw3nMpJwmg1WXcInwyIlKPBhf7ugqSazw==
|
||||
=qUVy
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-15T03:10:16Z"
|
||||
- created_at: "2023-05-17T02:36:36Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ/+LJiQrH4ODbXOXKXiiZD6qhya3KrfXIRG0Jn2Q17eN7Dw
|
||||
txhKYfdQn3czsqfHEB082abKZ5P8rm8jSH85H8i6SACqsVic4zK72Uwqsd6c/c7J
|
||||
dewAsvx4LuKdHh8RqxGOloE6Orvn3CYQT1K7d3asMEHyxYFkQLFFrtbUKVtx+BIw
|
||||
RHTGmxU+ej3wmWpIEpXXqGbYbLzQA4j5jYe4jjUPW218bxJ+4nF4sNEwnYWEeYlZ
|
||||
vol7gq2vPaqq8KrnDJhrc0GpbIQgsWnUg4LtExrWPLrhY+H+41tQ3GvpwZMncIJr
|
||||
4klNbeFjsNXh+1hP48IDwqgpUIWkBpSnhogt830Umciej/xIzvfyJnSxkzqYB60j
|
||||
ZKUUky2iaSpR1IVNVu1Y3+ym+mQEYEypL9tX2sKkUZHOXKC0Iz2WpwcnEk/4WaI7
|
||||
KYk+IgNj2iwwCNHeVO2BMDcb91LA7FRt3EnT6XPH1mWawgRF3UM/wbzbYDUTJYKQ
|
||||
FT7Yu+sJOjEWnv0goCwK6+CR3Yox22QnJ+Xi/rZT/B3LYixyKd0RD+f7zP3P9UGe
|
||||
+fWsJUpFzftWaKto8eyz+mTYBaFYqwgqfqudjCOmW6DhUBr5VWfzW73xFE16047f
|
||||
CZTgqAeNo7Npzm0BQTlODDk96j4zYa35Fho+GIscpji/phSQ+c3N7lc5RMxTRszS
|
||||
UQGJYjTdH7N+dXYixN0DF7o26vC8GhJmOtZsNLexYFgGChPgCc1q+wX9td0zevwh
|
||||
FD1pL4sxVsKPXfNKSF6UqZdEKglR2ihv6qywEQ5IT8sirw==
|
||||
=o9zp
|
||||
wcFMA0/D4ws+/KPtARAAjHUXCr+VjVF9mqQzipmFsyl8qmAUB/IoV3REoWkUAOJQ
|
||||
xI7OWq+Pt1Kp0Wz57uvw2L2foyCApvSI59yhs0mmO4RHkUGOJ/Ni1BvTCqeHXF2y
|
||||
2Q8OSG721Kj63XB1H0tfxNnWMdaHkVbyVbzsBcKXJCddOcrLTR8i70ewzL5eX++M
|
||||
5EEyrtSgc75DcPdR0g4wYK9nlAAiArK2F318bdMNqi3njzRvtGA+G+SBazt+yeE0
|
||||
9kH7o7EZ28mroew4SHc0t2S17UoiRgCO4KE2UbjdETB2zEZ+Cii5UT5fFjanPG0d
|
||||
/boVpNcSwqz08LlZqAHUt5Rf8V5oGca5a08dgcX71AJgH+sZW5AkBb9uKlVUU7k3
|
||||
xQUMwKBhNPTwjCGkSoKAvGD9E6PwBQbR2jTm1VFjhXKklz3t4xl8e4HwrULhCiNG
|
||||
Cjw/t0BsL88HVBS30Je4wKbgAgkhEkPfpR0dJuwugLNJoVbnUViuQnOjnPIM9d2y
|
||||
f4DttIOtlqReID8FA8yb47gFyn6NFUD5uVJshyxeGN0RLgOhMcQyC1DJp+V+SQt0
|
||||
essZvLGbadnbsaJx62CvzyOpDCrb8S2gC4s0XGT/d/6cSj9l+cCV0jybpe2V6z2R
|
||||
wyuPeiC3Nqr2qtTZSev7Z7qslcQLZuBBJbu1AzPx+IuUtsp/F3ypAsTb/I8UCbrS
|
||||
UQHNNGhyoMZfeVduEy1jf1PvXeVM6dJNY/D02H6E/tJUnqhp/e05SZ0IZeS+K9dJ
|
||||
Deq5BhkkwpjjSYhNenmTWSP7K+yJ9WJQ+a1RuWFVQfWynA==
|
||||
=xngZ
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
|
@ -3,80 +3,80 @@ kind: Secret
|
|||
metadata:
|
||||
name: database-configuration
|
||||
stringData:
|
||||
address: ENC[AES256_GCM,data:RS6hEXdX1KCHRiQRZKh8KquHLopYO+7HrEQd7xEzsQ19sFZ4FTGO5JSDv+sQSFajdI0LEOvRrYrhVlWEQ8+VZ9E=,iv:1ImaNPCJ4gRPZnKLyUDAaYC65hznkJTN0XcoHMht7Uc=,tag:7EE/6DFeoftrfEWL87dhvQ==,type:str]
|
||||
dbname: ENC[AES256_GCM,data:96lDzmgCQ44=,iv:Tgqn2ExHcLA0InFyq0vaIJ7JSki6D5yLeOFnvMtbfkY=,tag:eLKfzhvGL1PX1gjqh1aMoA==,type:str]
|
||||
host: ENC[AES256_GCM,data:xiesN1NpCAEW2dGHutysgqfvHgQalMeQoe+JBSlLp4/RSdsZLBijzmDt7puqd29sLK0wgcqsxQgVjo4=,iv:HaG3YQ/g9rRoqwtWUT7W/gC+sCnq4f0shoLw2NV1f4s=,tag:sexGZ2EDkIIqN1cHU4OvIw==,type:str]
|
||||
jdbc_url: ENC[AES256_GCM,data:Qq67i6hnALTr5eUdWQ/ICczNkdvRIC96qP53AQMN10AJoBvQUIDgbMN/XWTRC1SZPucC2b2+5hbsEFntud3ryY4+ucFe+c0O/k4hCC0qYySsf7tqWfiezwYxw16BskCVr3WalEzBB13zih0D,iv:gT/i4R+ZN/kmZfbrphDFZxdBfSQXyQjV231SMGkN4pc=,tag:/KBMJaRbsJmr35ncWcQksw==,type:str]
|
||||
name: ENC[AES256_GCM,data:8sjmGhI2rfU=,iv:lZVcv5ADwJL/fS7dneji7KhfyFpHJGavcKFO1VB6zuk=,tag:vDIhIgX0/tjElndzUIaVyA==,type:str]
|
||||
password: ENC[AES256_GCM,data:QZhQHjfakGBEcsxXC6OxAN1pl4z6DIrJ,iv:0mlgs/ihf5YKeEzn9lp6keNzKe4gMT+TTpquTLc7Lq8=,tag:3unmkIvaFQcfdDQZvcPiug==,type:str]
|
||||
port: ENC[AES256_GCM,data:hR/vQxc=,iv:g9IODLw/3SjVXHR/+XEmYXm8sZbqJsTc13NJ3tE8FKs=,tag:JMvOoQa1dN9l5aEa79OeZA==,type:str]
|
||||
address: ENC[AES256_GCM,data:nTcQhHWOxhcL6sDsDxA5c0qxlXZ4tg6GZvEPuEOLDppFoRpOvk7nPojG2zqaZQRO1hHzaf2UPal8e889Aok9iA4=,iv:L5QXN1v7npNnY1GOQvZaYg5pIGQWM28aRdRKfyRZgOA=,tag:gggnalDFRFLF1N+cE+XdKg==,type:str]
|
||||
dbname: ENC[AES256_GCM,data:B2AIDf83Dp8=,iv:ramyD13BScrc0jVaBFhF1GC3d/nitN2V4ZqgZhjCKkU=,tag:NrGkU9gYzOc4mIskgG2TtA==,type:str]
|
||||
host: ENC[AES256_GCM,data:Ap55eiVmanVQTzNMFDjkxEQ2TW2QjfROXitkxbbJpH9lnlWEqNUfy62+xIAJ9ZJwR+MnvhM88q2eHTo=,iv:wMG+qBGNvXBObW84UbpbPYiOayjeo62Np/Hgan4gV/c=,tag:prWyOg8lTdPkn4mT5uKmag==,type:str]
|
||||
jdbc_url: ENC[AES256_GCM,data:zbx0nmNAd/fxWqLBZNIsMbgCKB9Rm5lEgpR/JGtNAWQHHZquo5xjSs4sHUym9e5Rou4OjdLAs/pr+fZtgI9SmmNBjX7CguHqkvK61H8iHtmgkHwZM7BOMv20O9/j1SWiO39kE7IhdH17l2L2,iv:1/2voHWImS54BX99jNkZqG5JIuQikYwPmuptVYqO9Ls=,tag:9+aLwdC6em9wiM3YtyBkYQ==,type:str]
|
||||
name: ENC[AES256_GCM,data:AiKT1gfoXyA=,iv:lWHLXHNHgIThLDYoR1/fL16TmfjMvccqyRKF6ou/1t8=,tag:02f9VjfLsZUSftAy79bQzA==,type:str]
|
||||
password: ENC[AES256_GCM,data:/rJ2nqKPyX2I5bMx0EYCZVl+YmyxW+xy,iv:Mstha5NUhCwIJUNbGMg8fLnLVkKxhqCGdD2Sc36C6G0=,tag:wXqUWhpMZT8Ums/c1xb6TQ==,type:str]
|
||||
port: ENC[AES256_GCM,data:YqbnieU=,iv:1iQVDLATtjhIbpgff4AHYLaghKBz/yn9hvq/GzciaHI=,tag:Em+PB6x/Mnw4Lk9qlR2Hhg==,type:str]
|
||||
sops:
|
||||
kms: []
|
||||
gcp_kms: []
|
||||
azure_kv: []
|
||||
hc_vault: []
|
||||
age: []
|
||||
lastmodified: "2023-05-15T04:04:00Z"
|
||||
mac: ENC[AES256_GCM,data:a7zP7tV+w4gdWh5Z8TCqs6T9cF4GZGny07gDsry5LdRHCSvMePjDmhTl3oPUT6IdxEQX0oMR7QsWGkuopSIiJ5FcY4Hbzp88ivSHCddaZCbSza9MeiQDU2XXCC1zaBFWFA75VF0Gkd/y4jwDHOpE+a9DERVJwgUuZMf1NaWVCOc=,iv:KDVtlwtnvX7HmA4T4x3sF9cicZzJGKuBHSBEom1tues=,tag:w3jfLi1poBTWFVkETPkt6Q==,type:str]
|
||||
lastmodified: "2023-05-17T04:43:37Z"
|
||||
mac: ENC[AES256_GCM,data:Ya+AhSZyqjbSCa6hnDV48wrWfDSa0XZwsHWAAsJ97rOmZctz53Xt3EjfShKLEoAF3J9I1UtluwB3YZ0XfiQX5oJmwqKOuNZFl8EsXNddbljP+HzJaG02YwOfWhBGBvfYwSjXsd7EG97r7u+KjuQxI6MYY8mr6fdXL6hC5wXWOoQ=,iv:oy6zIvQ/DzLMeOJ47TZS4r4RzUVbOnHRGVxKxmuC/7A=,tag:fQ6oQpXIFQFMyK4DQLyO0g==,type:str]
|
||||
pgp:
|
||||
- created_at: "2023-05-15T04:03:54Z"
|
||||
- created_at: "2023-05-17T04:43:32Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA82rPM2mSf/aARAAm2r/Vj8f2eHl2waxwn+GYEPyq8CYlJjCenIP0K/6UPyg
|
||||
/+rcWcqm1Ip6CxgPm5MrZA/8b2+hep/H7IsSIG1EHyLfuKEROMMUFFh8jt6ZzRJX
|
||||
W3UzLqRiYsZz98pd7UBgPs4q0vXCuUHIy2pjsXWy5SNIs5lPxfqW7Voh2K/XKGKd
|
||||
Op8p+GeSsieVKoTnPqldHF6cBuUmxcLy8G5fqf5oG6bYwoW05e21aLBb0N4KCSRY
|
||||
SJHnd03KOoqEGmdBw8sL8ob2Kj+AfUa2lqF5uKH8GrwP3fbXCXLbiukeyTbGOCkR
|
||||
DdUp5h5Ik80nhkDJ4Te3Vq52U+p8AWO2sUJvgs4pmDdDW5ZOwRs1MiGs4Q4TIO32
|
||||
cBq8mGtL57yyTCtSw0FJE3rjFEAdUMmldNOqkkwPsybDpTzfYWjRkFQBestC4cvM
|
||||
0qtxHNk1EZLYgiw8tlZNhxz/Q7LQFjaOffU3r7IFjJxoWrpUlzrxEX0Ech79XzRl
|
||||
mnXSvaYyboI/CZGuxqMN+fdxiY4BctT3c+PN7yDE+UNpUFI410637QTCpgKTwls5
|
||||
5Gy0pBMDDf5WtGNq1ZkYajhqPe0VfOb72HzqWbrq3k5xVj7t9eXQHIgb04MnRQNF
|
||||
Y9zT5yaK6pUQ4vN1PiCEycKZWMwJbvU7IfDIyCintCcEReCXRyjyG4A4t5PPAtDS
|
||||
UQEiTfYS2piR7+fwqHAH/rehhmAO3Bi4HUJsY8ynhTD94pZhA+zPgLgMRlcGQNx/
|
||||
G6a7kA6+8t79HekNHvnvpjDe/JpXSBvTEX/Dpq8e7ry3HA==
|
||||
=ukHh
|
||||
wcFMA82rPM2mSf/aAQ/8D+TfIfpJnsUOBeJVQVjociaoJ6oo2xbGc/B6nfxOP5Iu
|
||||
Tf17Ab0M/FUwzCsQt65jxcO7F1i6jgO4R4xqB6vlj1y1a9tOvFW5Ky79zp2BEVnz
|
||||
n2JQKe67P3U/heNgl0w4Cfda4Xyopn+wgXj4q2T4MWXxrP635QSu8NLcMpzBcmZB
|
||||
3BVlwFfZcsOmVcglkiUaFozMQbm2aaUJUuQlE/T1aZCVoEnmFHbOYDeC2Hj+Ld2c
|
||||
fRdR+GiM1GmBPUqdOFm3lb0uy5xwviLcoU1piQfxdxviCzGRFwYahcQ6JAFRcv+9
|
||||
7nGEjXTd0RYM7AUMAZ2lwl7VUF/Dn6CYa0ilgqbOYD8U1x8seyjp4wKhQSohkdKO
|
||||
pD4ZjGvF4VJAK0s4j0lmV1NB4iBlsARWHJDe5ImeDfZ1qRWtX848CdFcIHPxMwcQ
|
||||
tKVpV3c89AMnpgrDQAF65OUk5N8WwNMtTteDQMpisrw5FUhlzqfhdqmx/L5qYzW+
|
||||
QWQUVffDhA4RkdhD3xEiO8+Ds137u18QY3l8oUoC2bOG4VARZPxNugxZJw6wcezp
|
||||
YmoSAGI7A2E72OMcgaV2LQeyBEvwI6RTEujQXzyvmGNpkLKEYjAM6ns+F8W5+qxZ
|
||||
nFxgCuj+F6Uh9kGbJRXZFVOw7FHfujZxGAGbjPiRiKLjUr1qLhFrPkh4UoErNKXS
|
||||
UQFXDIJOuD6FbKsM5igbpSltsFUuCSsr1bx52TlujpbRAbWP5NTJ3QdwrLiE6S1c
|
||||
iYBI8+PnXIcql2nicv0aTZGSaDli+8RPXGPcZXDqU9Le2w==
|
||||
=psjV
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 6B61ECD76088748C70590D55E90A401336C8AAA9
|
||||
- created_at: "2023-05-15T04:03:54Z"
|
||||
- created_at: "2023-05-17T04:43:32Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMAw95Vf08z8oUARAAz+6T9zi2NzeoUAJjCCntvgiBeXvNr8bF+NycE0bxWbmA
|
||||
DRkEQAC1N6mj2XJSSVrBkXro+L3yKrtvxDIWj09BefushoX+5J+xJAjTb8viSGzV
|
||||
V6TLVnHI8slPMKxohog23qFXTKj8iHFJTLkqtpDhA6xfOc2l0GfUobD4sz5MLKqv
|
||||
tMHlb4xhB4BM6VDfsJc2R1H1WxS2sLm9RI+eXZE4DypwAYwy1T+b5AIITuzXY0Vf
|
||||
c8HHCt/Rk06yg+lQ6KiHjEBT8xZTmrcPARzXBx0TmHLXK9ICmXpsfbsMQYxudyGo
|
||||
Aqmnxq7V1hKvjg5y/94+H4BBslcA77C1fRzLCMFtDZAN9zdZ2HFAxttr+O+Nf/zK
|
||||
m5DAO7P+O41DQOgBKh67xoqH2dY1Srim0R4Tt0x5FZHW1mNKDv63MBPBWVMW7CvA
|
||||
RZJ6KKSlhc92sG/NaJyYC5oLhjAdv9JmC+/yArNLhXzvzOwnDWVSKN+N8I+D67bl
|
||||
qJQWAQD1PPJjJzY6+MTfjl0Xq5BuwcAEIv9E25NDpPw2Bkb9HmPk8/ufFKc/l4iV
|
||||
Bsh8mJz2nIM9M8NxZWZ2D7n1NpHvl6nUN6khkXqLcMtyZhcCsNiJLRSW/5Du3zxV
|
||||
CT3Y/fGG3XmSdyg1pylFPImtvsPMQFQhZGY7LHkUUnScQJD2eRQi2KYvHkET8FHS
|
||||
UQGZFsF3U5xWYQdiQ2ih0q4muK9z0+HkP+hVr528nXSWdQWM5RgIER1LlR/bEsRa
|
||||
0eAq9SZcQcvRMJqBpE8edQ1z1YsoX7nmTv/ERE5MQvc5eg==
|
||||
=tGMv
|
||||
wcFMAw95Vf08z8oUARAAuUw8Cs2X6xRKGYjbIRfXlocUeW0I654rWYEYStFA4PVp
|
||||
B+Wk5zi7UBvXx2lREapkjVYxwmckIHW4d+zxIiBb0i6ecLuOouUuQQZHjNY1MLNV
|
||||
HugZyrLzOv7TftE1fdWvj/plu3YOAX2pMqPakaJ3BylG3LrOnJEcqtml2OXMEsXA
|
||||
qS55r8tj1SiVYYiG1Dvqq3/kryzKKtiUz4HIojypASiQT6sS9mIpKWpGkctGDGUd
|
||||
VrIT1tW25BKCqILkQ+41sZDRNe4N0PQUWZRD8aIiWI2d1AECkIHRLglC9O4arkxS
|
||||
ShXCCXz1OOt/f9pbyABoJbWKZe5pcdeX/7glJFjxQ+hbc94jqKum/VaG0ml3GkUc
|
||||
YUq4xfDMqxQz1QchLrAgaj1QCmUHaPvpxB3kyZhzB1CZL0ghvYxiIwALyvYQMDqD
|
||||
EgvzoUh4sub++uGgXT0Lhfu68Lr5DpGc3FC3pzPw9jsnbXOnnQW5zQrnSODVMYMV
|
||||
XdtvI67zJnJxgSRnMMmvAH5R8bWb/WT4k+ezTDUBHGC8mz+NnldGZWctQSUwCvoq
|
||||
MygNgbuO35yq/R5P7ZU0SPQve+dBYxm+825CdHfQLYI0j0GLIb+4iYL4z5G536II
|
||||
Tv/JpdPO+1PeTKkrgSvU2BC+8uyWHAPwAeYWLIgL9RqDlkF0jej4tHVOLOItvNvS
|
||||
UQGoo0XiAD7eUVCmqMnAztxcKpyT6m+c3QD9AjKFEQ7Q3uTujEHTHNWfFlXwI5/G
|
||||
ml/NQyHGbekl1nOrzyehE1dOaqfldFDmSjJRwWBjlX9ZvQ==
|
||||
=NGdA
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 88823A75ECAA786B0FF38B148E401478A3FBEF72
|
||||
- created_at: "2023-05-15T04:03:54Z"
|
||||
- created_at: "2023-05-17T04:43:32Z"
|
||||
enc: |-
|
||||
-----BEGIN PGP MESSAGE-----
|
||||
|
||||
wcFMA0/D4ws+/KPtAQ//V19wzb2oNiTG7tsO2BzpcgFiY4TO5l3Xnc5meQE6kgGh
|
||||
CCktTlqToK5GrgpHbxogIElwsCyqmsKvHf7Y0smMdQV+dymHrjhm8/BMIsHw6oy0
|
||||
SGSNLaLgJQxxYwRXMufVCsBEIg8iFJSWGUydNd2KPhQZjQo+hR6ki8ijLUASkdeQ
|
||||
IUtFz0nxvtnKz3PUCzE0yCArxIP6joWTxwMp8uQB1kj86lfpQWFKX2JlOqurydo7
|
||||
QDPXHYTMgzRuAHnuDoEeQREbagC97VhdvCcH1PjCwgef2AcU8o/mhddNiEdLpmeX
|
||||
YPqgY2CBBzbICdL00KhVUu2dcw5+aIG/q0R70+R7eX+783cj3QwjHUcEyGdEDTo/
|
||||
AUclqSpePP3okpVyQAWNtrYrC3uMx6/bUgSLVeFwpmVmkHyX3mhPnC9fHcE/pnnN
|
||||
+jSjRawHDP+GnnfHEwppHl1F16+cjJzBbO8KZe7WTWzRzfYCcqv0REQ9SmKhaouE
|
||||
C+wiBFewtyaKKBr9eEdOUPg07YAqU+9FWPyyPDv5dqdljvLH0N4JaWH2S/83WNbb
|
||||
y/atJiRcOP5dhHbPZ1PbG5sLkPBmyHiFy3E8AZLcWEwkXlXttFvdKYcULaDh3O/x
|
||||
vXsDWO1S6ezQ0Z4TZqLfATSzvqzSuSazRVCXsG0b6MK2nvorT5xFsANhhRGYi0bS
|
||||
UQEmqP6gs7PzX3FLuAnLMTbIts3NdkHjGJIYIGb82AiO4eoSUp0h13vrJchEr2XR
|
||||
NIszME07Iy+yE8eeX7yMIlbDZRaZ1t4nDQU/UT7xmCHYVQ==
|
||||
=bXHz
|
||||
wcFMA0/D4ws+/KPtARAAwoIzwkPTsDmWBG/FZ8oMfxlCIWFkGKlat8gfwuvkz/J7
|
||||
hyoST5K4AcsyLBSEEH3VbTEm5ZpQkkDj7BjjNWvagZJ/swKngF2a4Df3YBeLIg00
|
||||
z5M4YNNzr7LiP4wUUxSYsOp9TbraZk4LvkP6iyHnbHNfID0F8KWMskIZIdhXAqnf
|
||||
mLw8Tqm7+8X81LRqpDHjRVuD+zocqmz3Q/PsTE5Y9A3hCUP6PiuPiL1Os4KKVz3/
|
||||
r4Qve8F8IilCejGXIsWhRoxW/ng7naXHCA/yx93dFYohNAig8rZeVOxKwqlOYEWr
|
||||
cfLs8L7WjOHbSJbxCPo3IJLQm1BcCroDCs2dCXSQZM5SSaasYOjmy1armZbXo1mr
|
||||
xiPwblDMR9X1wE5rF8400P2haRNZ5B069B1L/bUV6ZGQndvcIkL/eFAxJ9mE6FbI
|
||||
enwFzM7kDB3eFvD6WSAcisyLDECekW6VBEdc/GqT5cFJhjOHS0vXXSnFoSBYOSfI
|
||||
cI8HRTLr/NQGb+F2Le9q30bvwfkzxDQMwA3XDlSt0aqronlYBqTC5N7tYYAZkbTd
|
||||
ITzuNYRk4QlI1g5LaIYoePiuutvjdQ2aiHrk+UuezYVeGaR/payVtnYNCYiyByEj
|
||||
y0U2hR1zqsGZ/bCB31Kxi1nxDPemNS0SnMDEFC5cE3dxk4Geb0dNgh3Pc9T60N3S
|
||||
UQHJQYjzRZLZeOcM8fBVOzdZ0uU8qjI7FZb9lC92F4W4eoRjxdb4ngcNUwg4Z2cq
|
||||
BhapahM2wSKEBuudGA8HaRVv4JqTDNP6aSl6BMQmEp1N8g==
|
||||
=ksGJ
|
||||
-----END PGP MESSAGE-----
|
||||
fp: 3D7C8D39E8C4DF771583D3F0A8A091FD346001CA
|
||||
encrypted_regex: ^(data|stringData)$
|
||||
|
|
File diff suppressed because it is too large
Load Diff
|
@ -1,27 +1,27 @@
|
|||
{
|
||||
"data": "ENC[AES256_GCM,data:k2fv2V1Yvd1OxYHD0XMQhdpEM997tl6CZq2hZhaVT9jSqjNcW3EdzVShREyLXg1KxXwh8YgB7T5+APx58snsVewa6l/UwIl7ziOkHu5sNQzfi1qCfE7UA4aREAsbIeJI93nNWDoPAiKTX/5bK/wN4/bZgrboPJC30dKDNgvLgfBb3Pk0laGGVExAjJyoJ+8iDUQyt/Xk2XUrZG/lJt0yzbcCczOKTlqR8wGI3V6gZPgCLvUG3kNgf5huK8E+INDdGGyx9RUX9QdNsHcvJXVmfr54jHlfCfMZi+Bkj1oBwvyCtrYQtg8PB6bDDfG0mHgaQTr0Ih7H4IxMkPf1dA552Rzztr/pglM6Vs96fNxM/jQiM39AdMUw+KbI+rm4tg0cRQMMh5ib9OW7wNLovsqDpen2P7/Y+cOfwFeol74J9hLzL9YjosffViea9XcBJeHPqmrSgLDed8xqcZMckqis6rbnTU97wJi4rL6+dFdwmCP6A3Ovi8Fdf30B1iMCVTOshkCy7ZuNmf4qfKD+XtE9AKU7wpA8J13XioObe+ODePtKU1xuYeRIXPH7ZEPsZpmmGt9qYX1Fnjjw7lbNMnxN2OsmjHQnI3k4eqrDvaqmwFZ31Fx0Z9BODayIiqOWI2Hq7OtBqU4bwqVVBwttBYa3mfz6thd02OVBDiFiDx07r7RVRsEV0BB4ipdi1Vy6lDDDjWU0ZvqvT0e4qmXB4dGAZCrs1IthwqSdCkE9kAPWqf+aXlh2/0teFHlve/2F0OByBh6lweszKivT+exkObHKHZqFv1vtUsdgcuUNpk5iLDd4DgpcjAckxPKI66jU5QxbNeKF58lmji/TiRrk4ZYa0mEGbw5G+QLzmAYzfFQzAKOrDf3oLsIZYpD4QTXoaAVs/neZdETIc5D5YGUcCwvWozVRVT6Uezd//GXDK0n3Ef2ow3BjsjfsQ7+uJLEs+UN8TRdZbmp5TGEy4NA6tPJDHwnUSK08cVBYgh04OFSFjhmgAGyqwwHhz+WjVmEbyNxyB59ths0xI04TXepu8ntDzALXBBSTdYrDfkEfEdArO18KOKNmsYA8AzC4q5mu5xmCiPkdrpk7xOgS6rBa4mUQ53QVmaAsTDXzXy7hReBCGpEJeBp6Djyt5+QupD4kBjS8IgrxPNH2PrhyCfMb/re/3UixTz7d4uWCF8siVbBnqwLYIEIcyusd57Vr9ICZqxKZrXvSMFhmDeKDU1XtDnwNJLkSUa7L4yD7cHXtIHK4vfHIjnTXNrg4vOxPw9IcEGOcYCsqmGAG+Ze7GSgm1es6ldrAzxBL7NLbIET1/1NbPkteIcDcLroFM8dvZwHwIIOL1LDME+rA3oryr6sNO1/u5CnP+/h56jWErGDSlpAmDHmKndEQHxwbFCnAL1kBBKMD8vU4/86fTDPsyZ7rS7LWnVvIdPluDbi81Rfml1bq14Il85uFbEoQRb/br68Km78AvMT+das6ZEQriSRjV872aLxblgX13u1Vv7ZoS/w0o6RC6Jev49+Msp0wEgZWdtPjxLjn9D4/BVrhuAxVAPicAekl+c2zAm6sz+VPIHnK4LxH815AOB4HK0MjuKTt2ywx7aq3G8xNA40Xnp1/A3D8mm9gZpfytd/esPCe52mV3KqXPgm3zoJgQeKMuox1hwOn1nq5HdsWd27ozb5e0CaXTH3XC+zfGm3hSX4ytOmdUMX7HaeOHbYvo5kqaIpNtKMKg6PX7Y/cJNirf6N5vcIvNMlJAb3d3F16QJzE4X8/eLXxGw3I1Ibydo1nseMw5nIWa8lBAlgJZTVKHtyufIMP7fKWZhGj+cY1OXlDwb1MCP+vSHVeoJtji6BG/WuhSvMDTi+//uOTjvAuHa4cAvNRTwHTwtYofnw/JIc4e+MmHPV6o5wsmk5CEFavGQ2VlHk1Bt+SMTt0YOYyVSkIuTieOnAjzKThF8kYJ1IlFOCwI9N0DYUS6jh1IRYydLlubzwUcz1ggMzxZL8JOL8MmO/iusMnVdG70fjZnMCbqvpOjzuQ2+IoLVJwUsFZJzJNPwf6GGD3B0qOVnw97z1+YDOgy1bmiG25CqUwuD1iMbZdR6gqDDAWedzTxbRQ861SU9lxoS4gbmMw07Ri0W18z/V2ZRPbhUEilRmymyCeFTW8693ojENxzc2JILvTEOOtK4XK/YdJSbaigIjwEzb5nWqKKlxNLWRaja9x6fn1boQvJpGzj+SlnU1OQT3NXsvyJsOp6jutew1rHyB6egk/0IjeruFNKZqQl0EFc2wT3wIdZiTpFvIue6iBh6wH9sMU0qk0DmIwMMgOabBpAjLGYo1sINoqMOL/TEUKu/TN4AJFlqHNVBJFcJjZ2m8SQmL3sFkQ+ESrREzStnTklKCeB1fZkAtcIAiMFCQRmjcgTzDwlbcKHWSfbyDtra7WqRIGAyx8ZiXIobVKAkAVv3PxV38tf24qO+/+zXfDKcI+GLQ2ylOYy/sbRGxGIqPH+lg8zqfwIk0ME/uyqL18Nb9ewz15Oaj3RzihNkde7ixJmp7Z+pyMx5eokSyHfr6bJ64Sx7d3WihujeEFf+U0KI84SgwEw5FUYNBfuSrtyWJyA8KtKRqlVg5u7rlqmGowBPuEnebYL5hlsL/gPqRO5AHKcTKPX/4joYnfwX+4eY1vafJo3S+TwofXi0cei6jNqq52PXNo4MCcf2rIRLb3fye6PZzu/6fvD/HhC0lFehVnxuDhlCtB72K2opMYbFlSsaiYVYFCwcG7OZeMVMpMrKn2+pj7H6Z62Z6aXIKSypDL4ZXOalPKmPT7nXjBmEqcR/vbdciGZHHNJOp6tM+e18Lwa7gAQQcnb5pqUmYKZ+LtRpfv1YjQTM4Ta5V66duoXlfca3vy+P+Nk1dMgNIwgfHLu3zedb7EiwIwm2hSc3IocZ/VMPKTDhHX2rxKRz2PZc27vRTTT/MJgMszLvlw1pjDDQy4MVIAAwQoYs9bIjBEaGzllM7O4rN47faW1D2roZpABoBboNA=,iv:VhVgrRsepAwXluyCGUMNYoVZ/keTPvkXLNHbf8wDFew=,tag:jgELpKne/BCoKBkd7fSc4Q==,type:str]",
|
||||
"data": "ENC[AES256_GCM,data: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,iv:Jh35HfEzpjSOHVATn81jArsnjX1f+CViZZdwngJWp9A=,tag:AuCQNC35S9U3DgyWp1MjfQ==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": null,
|
||||
"lastmodified": "2023-05-13T04:53:04Z",
|
||||
"mac": "ENC[AES256_GCM,data:H4qzeU73C+X0t+WdtJTCEhGhgIFaa+twEHlMaNK4+6NxQXN0OJcbztht9ufk6Gp6B2Q3jaFBd6QQp/2R/U3RV1R8nn/w/NvV+sAle3CoJDlaxOlwdTCZsR1u0AC76lVS5vi9B3IxOmMSu9qVPvWqeFEuGWWnZbLknEDb3mSbh+Y=,iv:oUR+ru4ns17YJmChp34lWdtcdL1vrhaxEFZie1YXJ6s=,tag:8szQe1sU+CXQPAymw0TaVg==,type:str]",
|
||||
"lastmodified": "2023-05-17T02:28:37Z",
|
||||
"mac": "ENC[AES256_GCM,data:aL/a8y2g5+maOSWg3QnhbNQPMlQnoI1fg0PKb4o5F9mUMWJdXHoNkXDUGfI3w8J+zgH8lm2M2hsYuVwcyX5Tyllbq+NHYWvDrK+34oRxAkdP6JDK2ZOgn+SofjKtN2y6EVfnU66I1UnAZcmzfoANFVfy2qvbZdw8j2+K3cxBS/I=,iv:8U4CvwSmR5rN2yE+l+idJ/sjUTNgoTgxut70iJU6mD0=,tag:7N5VK1T1JXJLEkeBS6tgfw==,type:str]",
|
||||
"pgp": [
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:03Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\n+NFsXIeGG6sKHyfqLZWdAXX2ZYv0JIFLBjLhW8ezBGnvSQ==\n=yc+H\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:35Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nY4WFZvxI03cxVxyigkCB8y6Y757j8gPb2ldaGyYf1q+uTA==\n=LY2V\n-----END PGP MESSAGE-----",
|
||||
"fp": "6B61ECD76088748C70590D55E90A401336C8AAA9"
|
||||
},
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:03Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nbdriG1ZtxUkfc6/B8HkwY5/TJZfbtm5pJpgmVwGPQMKNjQ==\n=O1BS\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:35Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nfjhzSsoKGMa1x4kslSZqXNowCUB/ISbcU7y5WlNgYdQ8uw==\n=uV5k\n-----END PGP MESSAGE-----",
|
||||
"fp": "88823A75ECAA786B0FF38B148E401478A3FBEF72"
|
||||
},
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:03Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nj4frRpmdoZXwBnZ57bcCZoQ4WUqDXOJCMS4FGYpP8psN4A==\n=tOB7\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:35Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n\nwcFMA0/D4ws+/KPtARAAsqV6EQGRFC20Lo9NhLzh2NEzdXN+m96Tk4F9EOKY8J3Z\nBw66zVLi88XbKYmKanseWEn0Tack9EsrUz9ZTI+u7hNe1kJzopV5ehjHt5raXQvy\nLlDNEombcpLDO2jRZQmSB5nrhrBZFBxZLPKpAY1nixTchTiXVDVa1XwCh5A33u2I\n9dqTY7ZzQHg91IR7eaIIOtAC2E0hpPvDxAZdAe1CFCD8Nj7+t9sq4X14UkMbCLF/\n+WUxspmrW/QC4AeLaWL+DkhT13U+tRzVqI/WvwrvsRb0S8WLW2pfmcAO27ohABcd\navhPGIZB7Lpx5J5pcf6EzM45F99gj93SuleT+u+Ty8AOMYclBIn3CF0w3RknadQf\nmgjrbeSVAIEsDTx0PEbMpxT55JPMLoiuQ3ZYZhcFzPNpmtGDABz+9c/Hso4i6s92\njvmM/6lkgUZelLPcVUi+uhpfVUzp6pl4iRGH99eU3tKA1BJk0M1GAN2l7fQr2j0c\nRvAEsIFgvK7P5FyoyhdgOAMwnVe6Jfdc7BuU7LQ9qHpSjLmQcBLHpWAbOhUfZkfn\nGMTzMZ8BDw7QgTJtcYDtjVFHRrjZ25SNmjKyjwviyzJvXw9YXAGSOqCkD3v+2vKL\neu/ecWakXQ8qP1EPVehIyrrHt6Wr8UHheVmpdOAirOKqP7aNPu/aDvRi0A1LsyXS\nUQGEj0DmQAkBigG5lmLgcn/pOArFiNUx8b9avBcWMUcwVEcMTJDaA6HFW4ZSxsfG\nkBycUaSB7um3B6HrIBD4MMBh7ByooN1/zlg5HeM5OpF19w==\n=YQtU\n-----END PGP MESSAGE-----",
|
||||
"fp": "3D7C8D39E8C4DF771583D3F0A8A091FD346001CA"
|
||||
}
|
||||
],
|
||||
|
|
|
@ -1,27 +1,27 @@
|
|||
{
|
||||
"data": "ENC[AES256_GCM,data:LMSAPI1MMRAB/Qoj+N1sS5+zss1YDxAlHFckRk3IWNnKuX2IBe39JhA6gsjQ0MyMaJLWrzu0QLud3XTw+P2y3m8l6dCSCoBQBS+ApIr+tgW31aBnHJyWeVfy/WaQhFOXIYjyuTIxXtj2zUu1vOZEEs1eI0vzefStSdh/8tsv99tuQ56exwGfTfzZNspaEkYiHivpmd0C7e7PX7g6ESX7CQzV/AIupPNNR2cTanVwuJkn3helTf1UpFMFKVY7J3FzGcd9jEyWaKUp+agzDtL0ewWdoyDJ5edrsKVmqId5EIy+1VVyEvNpUp5WZhTpfB67qZxSphewgb+PQuuSpZN/0LqKa3pJKSAkqqdms7lbpVkPS/w3ZlsP5L6YMe3QvAdbmwZ1os0qUSfF+k0tl49idpSrC+O0cTTINi6J1a7xE6wJAjuMoBAhxdVqx61+xIG28rZwA3qtF/Eo3n4HAYkRVKylRixLrkd9/Nt9ViqbTLAg7r+0jQ3gTeKO0JJoOd0hwJY+bhOOzTTOjgX+Jwek4roSi8dVp5nHrCGcTRoddZFc6POzkmu3Axtmjj0MCHk+M5hePIp1opFSvYHkB2yWyJvyBSUM65NfQUsKIWLgjhpGvBOalGSn09OrHqu4j19eHHr/1xTO1wra7hqIFQK0wpJARdGVzKP4c+DyaKhbD8IvethfnRfif6BFFfDJ8d87l25o2D7QzGURagiIXGKgFAEd9WZhXhb9cr4WnPKoFXE50Had7Q8yD/Zs3dicGZ1D+SBnBnU4N3IxY/hY3YP5DaflYuPUAna94uvU12wvlW1NPekK+592zcc62WSq/5dQJO+JhbLI2/fzCdwHsl6wGE97Xn9+wYFtK+bEAUUhi766VX+jyEnqkC0UKcQZlSnQBWCZ4xjqjECo5Vdd3ZPIF3PSTimuI0dkd9RHSag40OnLKoHFNOzTwOq6EjZNVWq1fvgdsnNDemAXBxgerhwzEKRPEbXCJ0BDpHBtQlwpZ0lyBm3ivDR9okgo0PraJmB4Y8bgJXIGnXYLDIPsVXU0GL9VZN/qu/xKuGXU+EuFwKCzAK3+QXxLAO1qR8JctlgjFDYKJ0Z1V3VRMTXBVBPy9UiQzO8LxRMoUFV0dB+CHX+XqIwlTyZt6xLS6KkAVAu+w+0GUj9NGMcrzRnF9VX7vW2o37YE/du9htdd5P9oSWtAmIj/WM4he2u6lGjxq5oYWQ7cwSp0OUrtR+ob0PLPM/X3dNFPAZ/MFM2JA1YycPwP08ghZqftkgscc4Q0OtHILLZ2HtX6hGaoJ3WxzwyjyxV7LeemCnxAmBNXZlGtXm60tNxiRrEP/ZgX3Zoj+2JREGcr3pUVwN+Cue1s8zdXvNDUcsVwi+7mCYNiXjsuQNTAw3t0WxuwHmFP9fYAcwoR6PhzkZsLA6T6WdUz16Q9AfcRgazlNd5auP6gXYBYSCY1990AYTG4lvjs5WovrW/hPu9fkm8S0hq/vFYy2cvWC3ktgcZExXHB0W6xH6Z0hYqP5zpaQshY9ODxFQCOfbT8HswQAGEPdG0y/weRWl3IG8u6qFaRz82aHyI8UgPKkPV9YuJxavUjawuNG0oP2RzYwdSuJw0VMEn06uerYEQ0W/BL2MxrlefQrxwE2R6J0TR8CvEpyNRpiXNGQDUX8MpVYORiHp1Rai94YwWZq0C2bEEpUUBCFlWXAdKV+R6HFl0rYez0eJ2U9hPViEieeD3zUMisLTMd8KO+HfuTG52KdM+XnweEEgBTVwAYo2mhYINb4irvlJLoTdZ44ICIIYZxw9QgxYhpaYzuTfdD8sZVNHod+rMKBjrSuPSEAMbzBcLIe0Eh7WO7dbGBj4uWcK4NFeVjTtsuFYj+JuRn96+lCDqjeXX/unSxplL3PBUjZqU2NZWlQgIVZxSf0GOvphjuqRUS1B+XgfYezrmC3M4ts53KwPltGVIHz2SsmPXXd1/A1bWIKSdGSLgUGGpeaFj+OOAOi6iEW1jLr/ofSKAiiIyF1p3iRYk0lDHV1Hrl2uHwCV9k6zq4QUizDWlGv/4/uPau71TcrxmEZ7I+sc7OkSEioaGMOjVEVDepCA+dVtdKC2oSYiTdX55OH+dASkpiX2Om9E1aLIDDSOMPTbzDfBU++cmOPIJeuC7V6zyW1g0D2gjbRC/UHxtwQKLHzh3nM6Mk9LKdftVNRIDdPbBtnvMGfWOQrn+gZp84dwZJjNKh7XpZQE8BOBk1oHoXD1Yd4/bAHwYMy7M5Rw3SiA==,iv:TiC+GsaEnLlv2w7UfIQ2BbKvbwesYTPL62lQhsgUjho=,tag:J8PVfThSkw1O4nOQwPcuig==,type:str]",
|
||||
"data": "ENC[AES256_GCM,data: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,iv:+Ur82pTHNCfCIC1KFnzqckimXA6uli6+L6mdaZWK/qE=,tag:YxJU68hCM4a+yq01wnRCgQ==,type:str]",
|
||||
"sops": {
|
||||
"kms": null,
|
||||
"gcp_kms": null,
|
||||
"azure_kv": null,
|
||||
"hc_vault": null,
|
||||
"age": null,
|
||||
"lastmodified": "2023-05-13T04:53:03Z",
|
||||
"mac": "ENC[AES256_GCM,data:xftk6tugkSaNg+ewVl29pF29ll28tCAez12wV6J9GFbIUb8xa2ERuWWHaVkD0/u2KmECGVga/y5pfVzVGS8DtMn89cdYTv1SXE48IgQwkrU3PWACt6zyqHPrcqbVNmJb5H2iEaLKsXh9QU7zljBhWrvKgomfUGkrd68PgxiL90Y=,iv:YJum5JvZwcJIGJykGKnOrHsayM7Wt6gsApm2F8JcVvA=,tag:ykuMq0Hwd+sHf03MtQhjGA==,type:str]",
|
||||
"lastmodified": "2023-05-17T02:28:35Z",
|
||||
"mac": "ENC[AES256_GCM,data:3yKNE+tLIsHJpnWPj1Wtf9jczDZ86lO4iTyPjcKuBzPfQZVaFTH8Hq2qqbD9ACOGxPsJoow2JdZt71uj3E+UUZo9C9ukHcLkasIQGiduc7vp/UIr/PfEVJBPanQqGKhrS1W1XxI6c2htMaUROexOxMynqzsa1Vl0YHabk4Byqos=,iv:H6gZTkIcuCqVpyGqVhty9CA7ta5ZSGVAKtBXvUhKfRU=,tag:AUuV1BUN1mjVkNKI0HJc7g==,type:str]",
|
||||
"pgp": [
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:02Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n\nwcFMA82rPM2mSf/aAQ//S9hfjyuGnveSa8iFITWcQ2qHJmnFP/8CwXL6tcHDWGmA\n2EevClc+wPkq9TDvnoTxU0ri+msWLWHvFiJBZ+1JLE0+vrQgT5GjhqzpGDm9uCDY\ns3cuHoy8f0ZznacrL/Nml/2GYxF3pVPQX6UUaZ53iGLNwDlEubzv5B4F8+aYKSy8\nbKwqjVkSgHBw7H2XxxC+ya2FVB1QL7hPSlI6bEAeScoSoqIeCl2kNxP3teN+yyhX\nMjYosxvVb7ZLVWDHQV3zx2OORA8HQBXeUct+bjAAFqaDTHwUeGhkeCTm+9tQqdYD\nW5JZZ1zoiHs3DMpNGKm8oL6+O641/CPZE1VsRE7hN//fI04YAgIgUmtt2M3V6dkT\n2yOcp6OIXFElNz1nBv2dYfxzutIHmTckJmEGp9uQcxGf+Ok4QCNBY9irUBXIlYsq\narUM3d1ZNIC+uu3IYue3Xobsr+j8xiQ+KbKaPm8eRa1SYAlurIdZEa74HlEFBcDq\nu0hGbNUYsRqu4xNB+Gfi27C6CrkZQE+sn/Z9VIKBiryjlixAvzUlnEozTbsz44+F\nPnk+GuGGMISCP8Jbh4C4LZe0MYOAKAG8bcUsL9ptlMVtSX1BmQiax94ByfbA9FEf\nWIfgAHsBP6PM4ZIwDbxYf2K37nU4hSaEs5AJSfzG7G/zvLvp9qghcAbIzFpLcFXS\nUQEIyTZmlYojAVl41KO9XiSOEpvXGhsn6DbwsrDrPjQD+u8vxNPtDlkJa4GlxMuZ\nCVw0j5spqYiKPtBWn4UbQZRyjX6vnEIp4qIJcmMQofKbhQ==\n=WA0O\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:34Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nDB1JuHVyCETsNJ+qWpr8BLUAmaoQ9B3XCENSfR2FKZKDUw==\n=QrHX\n-----END PGP MESSAGE-----",
|
||||
"fp": "6B61ECD76088748C70590D55E90A401336C8AAA9"
|
||||
},
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:02Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nX/jGH+K/T2A1ReG3cgiaYwo8XEgFDSuLwLL7/Roe01zsdg==\n=R+nF\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:34Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nIddiTi6xRtW4QBe3wd5V+FcJci5D7tZtD0hLmJdiaz9JuA==\n=P5LB\n-----END PGP MESSAGE-----",
|
||||
"fp": "88823A75ECAA786B0FF38B148E401478A3FBEF72"
|
||||
},
|
||||
{
|
||||
"created_at": "2023-05-13T04:53:02Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nFBHvnfNvL0/xZV5K1FdIaoonjEwM/NVANzbQd825viA4Og==\n=OsnH\n-----END PGP MESSAGE-----",
|
||||
"created_at": "2023-05-17T02:28:34Z",
|
||||
"enc": "-----BEGIN PGP MESSAGE-----\n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\nn1QQmcNbH9pRaKZENhz3NEt3zVji69ZSA7/Xau3nhEduDQ==\n=r8jA\n-----END PGP MESSAGE-----",
|
||||
"fp": "3D7C8D39E8C4DF771583D3F0A8A091FD346001CA"
|
||||
}
|
||||
],
|
||||
|
|
File diff suppressed because it is too large
Load Diff
Loading…
Reference in New Issue