Add mini's password to shorthair system

Before this Minion was unable to sudo on @shorthair, this change fixes
this.

Change-Id: I2c1f0f568ef9662104be9143ff43165930836438
Reviewed-on: https://git.clicks.codes/c/Chimera/NixFiles/+/504
Tested-by: Skyler Grey <minion@clicks.codes>
Reviewed-by: Skyler Grey <minion@clicks.codes>
diff --git a/systems/x86_64-linux/shorthair/users/default.nix b/systems/x86_64-linux/shorthair/users/default.nix
index b305f99..24e854a 100644
--- a/systems/x86_64-linux/shorthair/users/default.nix
+++ b/systems/x86_64-linux/shorthair/users/default.nix
@@ -3,6 +3,9 @@
   users.users.coded.hashedPasswordFile =
     config.sops.secrets."systems/x86_64-linux/shorthair/users/passwords.sops.coded.json:coded".path;
 
+  users.users.minion.hashedPasswordFile =
+    config.sops.secrets."systems/x86_64-linux/shorthair/users/passwords.sops.coded.json:minion".path;
+
   sops.secrets."systems/x86_64-linux/shorthair/users/passwords.sops.coded.json:coded" = {
     mode = "0400";
     owner = config.users.users.root.name;
@@ -12,4 +15,14 @@
     key = "coded";
     neededForUsers = true;
   };
+
+  sops.secrets."systems/x86_64-linux/shorthair/users/passwords.sops.coded.json:minion" = {
+    mode = "0400";
+    owner = config.users.users.root.name;
+    group = config.users.users.root.group;
+    sopsFile = ./passwords.sops.coded.json;
+    format = "json";
+    key = "minion";
+    neededForUsers = true;
+  };
 }
diff --git a/systems/x86_64-linux/shorthair/users/passwords.sops.coded.json b/systems/x86_64-linux/shorthair/users/passwords.sops.coded.json
index 829dba9..a4673b6 100644
--- a/systems/x86_64-linux/shorthair/users/passwords.sops.coded.json
+++ b/systems/x86_64-linux/shorthair/users/passwords.sops.coded.json
@@ -1,13 +1,14 @@
 {
-	"coded": "ENC[AES256_GCM,data:QDdaWHPHSsNZTLMQRbedYRDShLXcsbeCcwtD1WJmuEdL8zh10itf8VdoaohNPeogCUY2/1K+v/fxinEW,iv:1ijH0F3RWSutrk+6pd7ZIByY4NFe6LpdchoIe6BdpJA=,tag:rBM1nT204lZOzWyTPCmdDg==,type:str]",
+	"coded": "ENC[AES256_GCM,data:HbydDoeYX+hoOMijjLFJCwWUl68rpZUHnXL9M0JJLUCMwFTcTWfzgL8hIP9dzU7VVbUCh4dB4VNT0YFQ,iv:dqZf+/aFAb4Zrw09gmO1PKPtY8NJ7oLam3Few6c6zzs=,tag:m+xTA5ZcINVRP7oI+ZLHVA==,type:str]",
+	"minion": "ENC[AES256_GCM,data:cBHPHsscUgu6RKP9cX3wcdCp1CmkDdOGvqI8pkigqfMypQO9J1KcBaPAT9cRqNrVt2QiBNtm0y87pRZz,iv:4THhdRdpNM7oXuMgOkoqO5vSWs6ie2VAhIrl6C6u02s=,tag:X2ym5nZRp10sQZsxXmcM+g==,type:str]",
 	"sops": {
 		"kms": null,
 		"gcp_kms": null,
 		"azure_kv": null,
 		"hc_vault": null,
 		"age": null,
-		"lastmodified": "2024-02-23T18:16:34Z",
-		"mac": "ENC[AES256_GCM,data:5iVohVG0QQPqWpV54UaxvkUsVxw31kDQVDWhLk/Qsudrpd1AdiZh5G4YSR6RdzZ4V4ny9IvMLyYK5GMPn6pEnBhq/JaqkxUzcm856wrNrjHy0dNaGLTouGhqU9gwGDgmRpCTC92xn+Fih3qvh3DgMC6UEoky5uCcXLg5cBc4qRA=,iv:JiPhf7hyNKOnHdxJii9rZ6u9b5zWywzYGtYAu33/N8Q=,tag:HGVTLd+8a86ppcEIBfbwxw==,type:str]",
+		"lastmodified": "2024-02-28T21:08:28Z",
+		"mac": "ENC[AES256_GCM,data:YMx0vuYkybmGCPNqkpu51HX5B3cVkIjLjMDgqpOfp9a/6aQtBzbc4F8p2/+irAnpOVblYd4iPUqMODvLunaS8g9UyaoVycXBmLJvx476WfQbAQG9aRpWItMcWX1s+ktEcofeEs6q5yJyuK2PprzLnPJdQecg1/SgqaJmgb5yejA=,iv:VEGSzVkXAk1ju6BBHwCHajKVzJnCHWbuI6rJ2iBWnfg=,tag:2zFnK52hn7+75b81dIQ/sg==,type:str]",
 		"pgp": [
 			{
 				"created_at": "2024-02-23T18:09:34Z",