From 993b35139d8ffdcd95e952bae0e27bf35af68182 Mon Sep 17 00:00:00 2001 From: noe Date: Fri, 16 May 2025 14:31:25 -0700 Subject: [PATCH] you -> doll --- log/002-soppy-wet-nix.doll | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/log/002-soppy-wet-nix.doll b/log/002-soppy-wet-nix.doll index 64e44b7..56ee965 100644 --- a/log/002-soppy-wet-nix.doll +++ b/log/002-soppy-wet-nix.doll @@ -5,7 +5,7 @@ description: how it stores secrets alongside its code &soppy wet nix (16MAY2025) ^a - what if you read [code:/secrets/dont_leak] but it said [codeblock:: + what if that one read [code:/secrets/dont_leak] but it said [codeblock:: dont_leak: ENC[AES256_GCM,data:psyelHNBMy+xglw=,iv:UhxfqAqVbCgMRMqRMA1MmvgIO18zTrVtQdFywupZyYA=,tag:Legj+njC3z8jX16n1pZszg==,type:str] ] @@ -16,7 +16,7 @@ description: how it stores secrets alongside its code most of the time, handling these manually once somewhere, dropping it in a file somewhere on a remote machine or UI and that's the end of it. - but what if you're like. the type of lazy that doing a lot of work now means not doing the work a second time? + but what if that one's like. the type of lazy that doing a lot of work now means not doing the work a second time? [em:that's like this doll.] lets talk about our bestie [em(b):[link(https://github.com/Mic92/sops-nix):sops-nix]] @@ -25,12 +25,12 @@ description: how it stores secrets alongside its code sops-nix is based on [link(https://github.com/getsops/sops):sops], so unfortunately we need to start there. - [em(b):sops] is a way to automate encryption and decryption of secret data you might want tightly coupled to a use case. + [em(b):sops] is a way to automate encryption and decryption of secret data doll might want tightly coupled to a use case. irl, one might pair this to AWS KMS or another type of distributed keystore; and that's cool. but. this isn't irl. this is a video game, dolly. - instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys you already use (right?) + instead we'll focus on sops's [link(https://github.com/FiloSottile/age):age] encryption method, which is based on ed25519 SSH keys doll already use (right?) [quote:: it can hear those thoughts, @@ -117,7 +117,7 @@ description: how it stores secrets alongside its code &how old is one's encryption - age answers that question by letting doll use ed25519 keys to encrypt and decrypt your data. + age answers that question by letting doll use ed25519 keys to encrypt and decrypt doll's data. [quote:ed25519 would be a good name for a doll... ^n]