let # set ssh public keys here for your system and user user_hensoko_nitrokey_1 = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAII/58A18EtxnLYHu63c/+AyTSkJQSso/VVdHUFGp1CTk cardno:FFFE34353135"; user_hensoko_harrison = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIEbaQdxp7Flz6ttELe63rn+Nt9g43qJOLih6VCMP4gPb hensoko@harrison"; user_hensoko_norman = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIAqkqMYgncrnczcW/0PY+Z+FmNXXpgw6D9JWTTwiainy hensoko@hensoko-tp-work"; system_giggles = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILwogNjatRZlft4qUFDFKg73kiYB1HNZZ0xGUwfyfTzP root@nixos"; system_cox = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMINORCNhrxSdo2z70GkKrV8vcge2elgNPYzdRve+hI5 root@nixos"; system_companion = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIJu4u9Q36B8acRdBJi2RYU5pYpIMeCh+HKmtInR+IKQs root@nixos"; system_cube = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOSUke0r8PV35PWJ3BsGwFPtc2kWk2xbupbbdnJDc50x root@nixos"; system_chonk = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICt8I4z42DXGL3d6eju3WzSEnJMeaWPn3y+f/82oYBzy root@nixos"; system_ringo = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIE5g8CfSiMxboEJT2U92JoYdnv0nsArBPW/vfTEsUWZO root@nixos"; system_harrison = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIMGsY9APkK11hlcqKXER+iqaJZ/x5HNacQ8FXfLe2SA4 root@nixos"; system_norman = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDFePAtdXP/4J0UdChfRC78Tj/yBZaUNTNnbwXe9HJx6 root@nixos"; system_surfplace = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOAmim1CFeTPPDz/34sDYhF773NquhbqIS6v4mWM4qSd root@nixos"; users = [user_hensoko_nitrokey_1 user_hensoko_harrison user_hensoko_norman]; systems_email_accounts = [system_harrison system_norman system_surfplace]; systems_home_controller = [system_giggles system_cox system_companion system_cube system_ringo]; allKeys = users ++ systems_home_controller; in { "email_gssws_password.age".publicKeys = users ++ systems_email_accounts; "home_controller_giggles_wireguard_key.age".publicKeys = users ++ [system_giggles]; "home_controller_cox_wireguard_key.age".publicKeys = users ++ [system_cox]; "home_controller_companion_wireguard_key.age".publicKeys = users ++ [system_companion]; "cox_backup_restic_htpasswd.age".publicKeys = users ++ [system_cox]; "home_controller_cube_wireguard_key.age".publicKeys = users ++ [system_cube]; "cube_nextcloud_admin_pass.age".publicKeys = users ++ [system_cube]; "cube_nextcloud_db_pass.age".publicKeys = users ++ [system_cube]; "cube_restic_ssh_private_key.age".publicKeys = users ++ [system_cube]; "cube_restic_repository_password.age".publicKeys = users ++ [system_cube]; "cube_drone_exec_runner_config.age".publicKeys = users ++ [system_cube]; "cube_invoiceplane_db_password.age".publicKeys = users ++ [system_cube]; "cube_restic_nextcloud_password.age".publicKeys = users ++ [system_cube]; "chonk_wireguard_key.age".publicKeys = users ++ [system_chonk]; "chonk_nextcloud_admin_pass.age".publicKeys = users ++ [system_chonk]; "chonk_nextcloud_db_pass.age".publicKeys = users ++ [system_chonk]; "chonk_restic_ssh_private_key.age".publicKeys = users ++ [system_chonk]; "chonk_restic_repository_password.age".publicKeys = users ++ [system_chonk]; "chonk_drone_exec_runner_config.age".publicKeys = users ++ [system_chonk]; "chonk_invoiceplane_db_password.age".publicKeys = users ++ [system_chonk]; "chonk_restic_nextcloud_password.age".publicKeys = users ++ [system_chonk]; "chonk_nix_builder_private_key.age".publicKeys = users ++ [system_chonk]; "chonk_invidious_db_password.age".publicKeys = users ++ [system_chonk]; "home_controller_ringo_wireguard_key.age".publicKeys = users ++ [system_ringo]; "home_controller_k3s_server_token.age".publicKeys = users ++ systems_home_controller; }