From e973d044d6279068a829171ed490ce8bf8289c31 Mon Sep 17 00:00:00 2001 From: sinavir Date: Tue, 7 Jan 2025 11:35:06 +0100 Subject: [PATCH] chore(nixfmt): Format all files since nixfmt version changed --- default.nix | 35 +++++----- hive.nix | 5 +- lib/netconf-junos/protocols.nix | 6 +- lib/nix-lib/nixpkgs.nix | 10 +-- machines/liminix/ap01/wlan.nix | 2 +- machines/nixos/bridge01/secrets/secrets.nix | 8 ++- .../compute01/kanidm/secrets/secrets.nix | 10 +-- machines/nixos/compute01/librenms/module.nix | 3 +- machines/nixos/compute01/outline.nix | 3 +- machines/nixos/compute01/secrets/secrets.nix | 66 ++++++++++--------- machines/nixos/geo01/secrets/secrets.nix | 8 ++- machines/nixos/geo02/secrets/secrets.nix | 8 ++- .../nixos/hypervisor01/secrets/secrets.nix | 6 +- .../nixos/hypervisor02/secrets/secrets.nix | 6 +- .../nixos/hypervisor03/secrets/secrets.nix | 6 +- machines/nixos/rescue01/secrets/secrets.nix | 10 +-- machines/nixos/storage01/secrets/secrets.nix | 48 +++++++------- machines/nixos/tower01/secrets/secrets.nix | 6 +- machines/nixos/vault01/networking.nix | 14 ++-- machines/nixos/vault01/secrets/secrets.nix | 26 ++++---- machines/nixos/web01/redirections.nix | 5 +- machines/nixos/web01/secrets/secrets.nix | 24 +++---- machines/nixos/web01/wordpress/default.nix | 3 +- machines/nixos/web02/secrets/secrets.nix | 14 ++-- machines/nixos/web03/secrets/secrets.nix | 40 +++++------ modules/nixos/dgn-backups/keys/secrets.nix | 14 ++-- 26 files changed, 212 insertions(+), 174 deletions(-) diff --git a/default.nix b/default.nix index 653c978..a35dbdf 100644 --- a/default.nix +++ b/default.nix @@ -177,24 +177,27 @@ in devShell = pkgs.mkShell { name = "dgnum-infra"; - packages = [ - (pkgs.nixos-generators.overrideAttrs (_: { - version = "1.8.0-unstable"; - src = sources.nixos-generators; - })) - pkgs.npins + packages = + [ + (pkgs.nixos-generators.overrideAttrs (_: { + version = "1.8.0-unstable"; + src = sources.nixos-generators; + })) + pkgs.npins - # SSO testing - pkgs.kanidm - pkgs.freeradius - pkgs.picocom # for serial access + # SSO testing + pkgs.kanidm + pkgs.freeradius + pkgs.picocom # for serial access - (pkgs.callPackage ./lib/colmena { - colmena = pkgs.callPackage "${sources.colmena}/package.nix" { }; - }) - (pkgs.callPackage "${sources.agenix}/pkgs/agenix.nix" { }) - (pkgs.callPackage "${sources.lon}/nix/packages/lon.nix" { }) - ] ++ git-checks.enabledPackages ++ (builtins.attrValues scripts); + (pkgs.callPackage ./lib/colmena { + colmena = pkgs.callPackage "${sources.colmena}/package.nix" { }; + }) + (pkgs.callPackage "${sources.agenix}/pkgs/agenix.nix" { }) + (pkgs.callPackage "${sources.lon}/nix/packages/lon.nix" { }) + ] + ++ git-checks.enabledPackages + ++ (builtins.attrValues scripts); shellHook = builtins.concatStringsSep "\n" [ git-checks.shellHook diff --git a/hive.nix b/hive.nix index 63db5c0..2999cb0 100644 --- a/hive.nix +++ b/hive.nix @@ -8,8 +8,9 @@ let sources' = import ./npins; # Patch sources directly - sources = builtins.mapAttrs (patch.base { pkgs = import sources'.nixos-unstable { }; }) - .applyPatches' sources'; + sources = + builtins.mapAttrs (patch.base { pkgs = import sources'.nixos-unstable { }; }).applyPatches' + sources'; nix-lib = import ./lib/nix-lib; inherit (nix-lib) mapSingleFuse; diff --git a/lib/netconf-junos/protocols.nix b/lib/netconf-junos/protocols.nix index 484c46c..e78aa92 100644 --- a/lib/netconf-junos/protocols.nix +++ b/lib/netconf-junos/protocols.nix @@ -28,9 +28,9 @@ in config.netconf.xmls.protocols = '' - ${ - concatMapStringsSep "" (intf: "${intf}") config.protocols.rstp - } + ${concatMapStringsSep "" ( + intf: "${intf}" + ) config.protocols.rstp} ''; diff --git a/lib/nix-lib/nixpkgs.nix b/lib/nix-lib/nixpkgs.nix index 8121112..c5d15b4 100644 --- a/lib/nix-lib/nixpkgs.nix +++ b/lib/nix-lib/nixpkgs.nix @@ -79,10 +79,12 @@ rec { f here values ); in - f [ ] [ - rhs - lhs - ]; + f + [ ] + [ + rhs + lhs + ]; /** A recursive variant of the update operator ‘//’. The recursion diff --git a/machines/liminix/ap01/wlan.nix b/machines/liminix/ap01/wlan.nix index e643017..aede645 100644 --- a/machines/liminix/ap01/wlan.nix +++ b/machines/liminix/ap01/wlan.nix @@ -89,7 +89,7 @@ in hostap-2 = mkWifiSta ( baseParams // clientRadius // externalRadius // radiusKeyMgmt // modernParams ) config.hardware.networkInterfaces.wlan1 secrets-2; - # Oneshot that waits until the hostapd has set the interface in operational state. + # Oneshot that waits until the hostapd has set the interface in operational state. hostap-2-ready = svc.hostapd-ready.build { interface = config.hardware.networkInterfaces.wlan1; }; diff --git a/machines/nixos/bridge01/secrets/secrets.nix b/machines/nixos/bridge01/secrets/secrets.nix index b7eef77..78adcca 100644 --- a/machines/nixos/bridge01/secrets/secrets.nix +++ b/machines/nixos/bridge01/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "bridge01" ] [ - # List of secrets for bridge01 -] +(import ../../../../keys).mkSecrets + [ "bridge01" ] + [ + # List of secrets for bridge01 + ] diff --git a/machines/nixos/compute01/kanidm/secrets/secrets.nix b/machines/nixos/compute01/kanidm/secrets/secrets.nix index 2bd3f8c..c424c1b 100644 --- a/machines/nixos/compute01/kanidm/secrets/secrets.nix +++ b/machines/nixos/compute01/kanidm/secrets/secrets.nix @@ -2,7 +2,9 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../../keys).mkSecrets [ "compute01" ] [ - "kanidm-password_admin" - "kanidm-password_idm_admin" -] +(import ../../../../../keys).mkSecrets + [ "compute01" ] + [ + "kanidm-password_admin" + "kanidm-password_idm_admin" + ] diff --git a/machines/nixos/compute01/librenms/module.nix b/machines/nixos/compute01/librenms/module.nix index 1f273ad..a8727e0 100644 --- a/machines/nixos/compute01/librenms/module.nix +++ b/machines/nixos/compute01/librenms/module.nix @@ -401,7 +401,8 @@ in "distributed_billing" = cfg.distributedPoller.distributedBilling; "distributed_poller_memcached_host" = cfg.distributedPoller.memcachedHost; "distributed_poller_memcached_port" = cfg.distributedPoller.memcachedPort; - "rrdcached" = "${cfg.distributedPoller.rrdcachedHost}:${toString cfg.distributedPoller.rrdcachedPort}"; + "rrdcached" = + "${cfg.distributedPoller.rrdcachedHost}:${toString cfg.distributedPoller.rrdcachedPort}"; }) // (lib.optionalAttrs cfg.useDistributedPollers { "distributed_poller" = true; diff --git a/machines/nixos/compute01/outline.nix b/machines/nixos/compute01/outline.nix index 65e6a1e..9cd676f 100644 --- a/machines/nixos/compute01/outline.nix +++ b/machines/nixos/compute01/outline.nix @@ -45,7 +45,8 @@ in dgn-web.simpleProxies.outline = { inherit host port; - vhostConfig.locations."/robots.txt".return = ''200 "User-agent: *\nDisallow: /s/demarches-normaliennes/\n"''; + vhostConfig.locations."/robots.txt".return = + ''200 "User-agent: *\nDisallow: /s/demarches-normaliennes/\n"''; }; age-secrets.autoMatch = [ "outline" ]; diff --git a/machines/nixos/compute01/secrets/secrets.nix b/machines/nixos/compute01/secrets/secrets.nix index 02ecf67..421be13 100644 --- a/machines/nixos/compute01/secrets/secrets.nix +++ b/machines/nixos/compute01/secrets/secrets.nix @@ -2,35 +2,37 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "compute01" ] [ - # List of secrets for compute01 - "arkheon-env_file" - "bupstash-put_key" - "dgsi-email_host_password_file" - "dgsi-kanidm_auth_token_file" - "dgsi-kanidm_secret_file" - "dgsi-secret_key_file" - "dgsi-x509_cert_file" - "dgsi-x509_key_file" - "ds-fr-secret_file" - "grafana-oauth_client_secret_file" - "grafana-smtp_password_file" - "hedgedoc-environment_file" - "librenms-database_password_file" - "librenms-environment_file" - "mastodon-extra_env_file" - "mastodon-smtp-password" - "nextcloud-adminpass_file" - "nextcloud-s3_secret_file" - "outline-oidc_client_secret_file" - "outline-smtp_password_file" - "outline-storage_secret_key_file" - "plausible-admin_user_password_file" - "plausible-secret_key_base_file" - "plausible-smtp_password_file" - "satosa-env_file" - "signal-irc-bridge-config" - "telegraf-environment_file" - "vaultwarden-environment_file" - "zammad-secret_key_base_file" -] +(import ../../../../keys).mkSecrets + [ "compute01" ] + [ + # List of secrets for compute01 + "arkheon-env_file" + "bupstash-put_key" + "dgsi-email_host_password_file" + "dgsi-kanidm_auth_token_file" + "dgsi-kanidm_secret_file" + "dgsi-secret_key_file" + "dgsi-x509_cert_file" + "dgsi-x509_key_file" + "ds-fr-secret_file" + "grafana-oauth_client_secret_file" + "grafana-smtp_password_file" + "hedgedoc-environment_file" + "librenms-database_password_file" + "librenms-environment_file" + "mastodon-extra_env_file" + "mastodon-smtp-password" + "nextcloud-adminpass_file" + "nextcloud-s3_secret_file" + "outline-oidc_client_secret_file" + "outline-smtp_password_file" + "outline-storage_secret_key_file" + "plausible-admin_user_password_file" + "plausible-secret_key_base_file" + "plausible-smtp_password_file" + "satosa-env_file" + "signal-irc-bridge-config" + "telegraf-environment_file" + "vaultwarden-environment_file" + "zammad-secret_key_base_file" + ] diff --git a/machines/nixos/geo01/secrets/secrets.nix b/machines/nixos/geo01/secrets/secrets.nix index 6559cbf..fb7ffd4 100644 --- a/machines/nixos/geo01/secrets/secrets.nix +++ b/machines/nixos/geo01/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "geo01" ] [ - # List of secrets for geo01 -] +(import ../../../../keys).mkSecrets + [ "geo01" ] + [ + # List of secrets for geo01 + ] diff --git a/machines/nixos/geo02/secrets/secrets.nix b/machines/nixos/geo02/secrets/secrets.nix index 30cf2a1..a4b84cb 100644 --- a/machines/nixos/geo02/secrets/secrets.nix +++ b/machines/nixos/geo02/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "geo02" ] [ - # List of secrets for geo02 -] +(import ../../../../keys).mkSecrets + [ "geo02" ] + [ + # List of secrets for geo02 + ] diff --git a/machines/nixos/hypervisor01/secrets/secrets.nix b/machines/nixos/hypervisor01/secrets/secrets.nix index 3943938..02ef5f5 100644 --- a/machines/nixos/hypervisor01/secrets/secrets.nix +++ b/machines/nixos/hypervisor01/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifer: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "hypervisor01" ] [ +(import ../../../../keys).mkSecrets + [ "hypervisor01" ] + [ -] + ] diff --git a/machines/nixos/hypervisor02/secrets/secrets.nix b/machines/nixos/hypervisor02/secrets/secrets.nix index 90c0541..1c3dae5 100644 --- a/machines/nixos/hypervisor02/secrets/secrets.nix +++ b/machines/nixos/hypervisor02/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifer: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "hypervisor02" ] [ +(import ../../../../keys).mkSecrets + [ "hypervisor02" ] + [ -] + ] diff --git a/machines/nixos/hypervisor03/secrets/secrets.nix b/machines/nixos/hypervisor03/secrets/secrets.nix index a66cb2b..ad06613 100644 --- a/machines/nixos/hypervisor03/secrets/secrets.nix +++ b/machines/nixos/hypervisor03/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifer: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "hypervisor03" ] [ +(import ../../../../keys).mkSecrets + [ "hypervisor03" ] + [ -] + ] diff --git a/machines/nixos/rescue01/secrets/secrets.nix b/machines/nixos/rescue01/secrets/secrets.nix index b7bea41..f270805 100644 --- a/machines/nixos/rescue01/secrets/secrets.nix +++ b/machines/nixos/rescue01/secrets/secrets.nix @@ -2,7 +2,9 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "rescue01" ] [ - # List of secrets for rescue01 - "stateless-uptime-kuma-password" -] +(import ../../../../keys).mkSecrets + [ "rescue01" ] + [ + # List of secrets for rescue01 + "stateless-uptime-kuma-password" + ] diff --git a/machines/nixos/storage01/secrets/secrets.nix b/machines/nixos/storage01/secrets/secrets.nix index 6e9e7e4..528c1f0 100644 --- a/machines/nixos/storage01/secrets/secrets.nix +++ b/machines/nixos/storage01/secrets/secrets.nix @@ -2,26 +2,28 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "storage01" ] [ - # List of secrets for storage01 - "bupstash-put_key" - "forgejo-mailer_password_file" - "forgejo_runners-token_file" - "garage-environment_file" - "influxdb2-grafana_token_file" - "influxdb2-initial_password_file" - "influxdb2-initial_token_file" - "influxdb2-telegraf_token_file" - "netbird-data_store_encryption_key_file" - "netbird-relay_environment_file" - "netbird-relay_secret_file" - "nginx-tvix-store-password" - "nginx-tvix-store-password-ci" - "peertube-secrets_file" - "peertube-service_environment_file" - "peertube-smtp_password_file" - "prometheus-garage_api" - "prometheus-uptime-kuma-apikey" - "prometheus-web_config_file" - "tvix-store-infra-signing-key" -] +(import ../../../../keys).mkSecrets + [ "storage01" ] + [ + # List of secrets for storage01 + "bupstash-put_key" + "forgejo-mailer_password_file" + "forgejo_runners-token_file" + "garage-environment_file" + "influxdb2-grafana_token_file" + "influxdb2-initial_password_file" + "influxdb2-initial_token_file" + "influxdb2-telegraf_token_file" + "netbird-data_store_encryption_key_file" + "netbird-relay_environment_file" + "netbird-relay_secret_file" + "nginx-tvix-store-password" + "nginx-tvix-store-password-ci" + "peertube-secrets_file" + "peertube-service_environment_file" + "peertube-smtp_password_file" + "prometheus-garage_api" + "prometheus-uptime-kuma-apikey" + "prometheus-web_config_file" + "tvix-store-infra-signing-key" + ] diff --git a/machines/nixos/tower01/secrets/secrets.nix b/machines/nixos/tower01/secrets/secrets.nix index cd9456c..f9af9a5 100644 --- a/machines/nixos/tower01/secrets/secrets.nix +++ b/machines/nixos/tower01/secrets/secrets.nix @@ -2,6 +2,8 @@ # # SPDX-License-Identifer: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "tower01" ] [ +(import ../../../../keys).mkSecrets + [ "tower01" ] + [ -] + ] diff --git a/machines/nixos/vault01/networking.nix b/machines/nixos/vault01/networking.nix index b11352c..6342c17 100644 --- a/machines/nixos/vault01/networking.nix +++ b/machines/nixos/vault01/networking.nix @@ -277,15 +277,13 @@ in ]; script = '' if ping -c 1 8.8.8.8 > /dev/null || ping -c 1 1.1.1.1 > /dev/null; then - ${ - lib.concatMapStringsSep "\n " ({ interfaceName, ... }: "networkctl up ${interfaceName}") userVlans - } + ${lib.concatMapStringsSep "\n " ( + { interfaceName, ... }: "networkctl up ${interfaceName}" + ) userVlans} else - ${ - lib.concatMapStringsSep "\n " ( - { interfaceName, ... }: "networkctl down ${interfaceName}" - ) userVlans - } + ${lib.concatMapStringsSep "\n " ( + { interfaceName, ... }: "networkctl down ${interfaceName}" + ) userVlans} fi ''; }; diff --git a/machines/nixos/vault01/secrets/secrets.nix b/machines/nixos/vault01/secrets/secrets.nix index 9cc24bb..5453626 100644 --- a/machines/nixos/vault01/secrets/secrets.nix +++ b/machines/nixos/vault01/secrets/secrets.nix @@ -2,15 +2,17 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "vault01" ] [ - # List of secrets for vault01 - "radius-auth_token_file" - "radius-ca_pem_file" - "radius-cert_pem_file" - "radius-dh_pem_file" - "radius-key_pem_file" - "radius-private_key_password_file" - "eatonmon-password_file" - "radius-ap-radius-secret_file" - "wg-key" -] +(import ../../../../keys).mkSecrets + [ "vault01" ] + [ + # List of secrets for vault01 + "radius-auth_token_file" + "radius-ca_pem_file" + "radius-cert_pem_file" + "radius-dh_pem_file" + "radius-key_pem_file" + "radius-private_key_password_file" + "eatonmon-password_file" + "radius-ap-radius-secret_file" + "wg-key" + ] diff --git a/machines/nixos/web01/redirections.nix b/machines/nixos/web01/redirections.nix index bd5611a..c17c817 100644 --- a/machines/nixos/web01/redirections.nix +++ b/machines/nixos/web01/redirections.nix @@ -35,9 +35,8 @@ in "www.interq.ens.fr" = "interq.ens.fr"; }; - temporary = - { - }; + temporary = { + }; retired = mkSubs { "ens.fr" = [ diff --git a/machines/nixos/web01/secrets/secrets.nix b/machines/nixos/web01/secrets/secrets.nix index 7afebf8..7935c7c 100644 --- a/machines/nixos/web01/secrets/secrets.nix +++ b/machines/nixos/web01/secrets/secrets.nix @@ -2,14 +2,16 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "web01" ] [ - # List of secrets for web01 - "acme-certs_secret" - "bupstash-put_key" - "matterbridge-config_file" - "named-bind_dnskeys_conf" - "netbox-environment_file" - "ntfy_sh-environment_file" - "castopod-environment_file" - "kahulm-session_secret" -] +(import ../../../../keys).mkSecrets + [ "web01" ] + [ + # List of secrets for web01 + "acme-certs_secret" + "bupstash-put_key" + "matterbridge-config_file" + "named-bind_dnskeys_conf" + "netbox-environment_file" + "ntfy_sh-environment_file" + "castopod-environment_file" + "kahulm-session_secret" + ] diff --git a/machines/nixos/web01/wordpress/default.nix b/machines/nixos/web01/wordpress/default.nix index 6247b95..a08306d 100644 --- a/machines/nixos/web01/wordpress/default.nix +++ b/machines/nixos/web01/wordpress/default.nix @@ -66,5 +66,6 @@ in dgn-backups.jobs.containers.settings.paths = [ "/var/lib/nixos-containers" ]; - services.nginx.virtualHosts."bds.ens.fr".locations."/gestion2".return = "301 https://gestion.bds.ens.fr"; + services.nginx.virtualHosts."bds.ens.fr".locations."/gestion2".return = + "301 https://gestion.bds.ens.fr"; } diff --git a/machines/nixos/web02/secrets/secrets.nix b/machines/nixos/web02/secrets/secrets.nix index 38f8c73..43ffc58 100644 --- a/machines/nixos/web02/secrets/secrets.nix +++ b/machines/nixos/web02/secrets/secrets.nix @@ -2,9 +2,11 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "web02" ] [ - # List of secrets for web02 - "cas_eleves-secret_key_file" - "kadenios-secret_key_file" - "kadenios-email_password_file" -] +(import ../../../../keys).mkSecrets + [ "web02" ] + [ + # List of secrets for web02 + "cas_eleves-secret_key_file" + "kadenios-secret_key_file" + "kadenios-email_password_file" + ] diff --git a/machines/nixos/web03/secrets/secrets.nix b/machines/nixos/web03/secrets/secrets.nix index de57072..2bd599e 100644 --- a/machines/nixos/web03/secrets/secrets.nix +++ b/machines/nixos/web03/secrets/secrets.nix @@ -2,22 +2,24 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ "web03" ] [ - # List of secrets for web03 - "bupstash-put_key" - "dj_annuaire-secret_key_file" - "dj_bocal-secret_key_file" - "dj_ernestophone-secret_key_file" - "dj_ernestophone-password_file" - "dj_ernestophone-admins_file" - "dj_gestiojeux-secret_key_file" - "dj_interludes-email_host_password_file" - "dj_interludes-secret_key_file" - "dj_wikiens-secret_key_file" - "webhook-annuaire_token" - "webhook-bocal_token" - "webhook-ernestophone_token" - "webhook-gestiojeux_token" - "webhook-interludes_token" - "webhook-wikiens_token" -] +(import ../../../../keys).mkSecrets + [ "web03" ] + [ + # List of secrets for web03 + "bupstash-put_key" + "dj_annuaire-secret_key_file" + "dj_bocal-secret_key_file" + "dj_ernestophone-secret_key_file" + "dj_ernestophone-password_file" + "dj_ernestophone-admins_file" + "dj_gestiojeux-secret_key_file" + "dj_interludes-email_host_password_file" + "dj_interludes-secret_key_file" + "dj_wikiens-secret_key_file" + "webhook-annuaire_token" + "webhook-bocal_token" + "webhook-ernestophone_token" + "webhook-gestiojeux_token" + "webhook-interludes_token" + "webhook-wikiens_token" + ] diff --git a/modules/nixos/dgn-backups/keys/secrets.nix b/modules/nixos/dgn-backups/keys/secrets.nix index 6227cb5..64f7d42 100644 --- a/modules/nixos/dgn-backups/keys/secrets.nix +++ b/modules/nixos/dgn-backups/keys/secrets.nix @@ -2,9 +2,11 @@ # # SPDX-License-Identifier: EUPL-1.2 -(import ../../../../keys).mkSecrets [ ] [ - "compute01.key" - "storage01.key" - "web01.key" - "web03.key" -] +(import ../../../../keys).mkSecrets + [ ] + [ + "compute01.key" + "storage01.key" + "web01.key" + "web03.key" + ]