Compare commits

...

2 Commits

Author SHA1 Message Date
1a1a85aeda chore: update lockfile 2026-04-20 22:32:14 +02:00
0569a6d7d7 refactor(secrets): simplify secrets 2026-04-20 22:32:00 +02:00
2 changed files with 13 additions and 13 deletions

24
flake.lock generated
View File

@@ -121,11 +121,11 @@
},
"locked": {
"dir": "pkgs/firefox-addons",
"lastModified": 1776398575,
"narHash": "sha256-WArU6WOdWxzbzGqYk4w1Mucg+bw/SCl6MoSp+/cZMio=",
"lastModified": 1776657773,
"narHash": "sha256-GgExKCDspgASVM6sRH0VcVyixQznxuR4tjiAA7MfKxs=",
"owner": "rycee",
"repo": "nur-expressions",
"rev": "05815686caf4e3678f5aeb5fd36e567886ab0d30",
"rev": "986236cd6fad0979233ae5e73456a365f79ff198",
"type": "gitlab"
},
"original": {
@@ -342,11 +342,11 @@
]
},
"locked": {
"lastModified": 1776373306,
"narHash": "sha256-iAJIzHngGZeLIkjzuuWI6VBsYJ1n89a/Esq0m8R1vjs=",
"lastModified": 1776701552,
"narHash": "sha256-CCRzOEFg6JwCdZIR5dLD0ypah5/e2JQVuWQ/l3rYrPY=",
"owner": "nix-community",
"repo": "home-manager",
"rev": "d401492e2acd4fea42f7705a3c266cea739c9c36",
"rev": "c81775b640d4507339d127f5adb4105f6015edf2",
"type": "github"
},
"original": {
@@ -398,10 +398,10 @@
"nix-secrets": {
"flake": false,
"locked": {
"lastModified": 1776422417,
"narHash": "sha256-9R4MePj/UT0tqkWEq4Afg7Lp/zdfYHkW+qmpVGchKIs=",
"lastModified": 1776716353,
"narHash": "sha256-4gmunPEtk1oOK/77YP7M5N0rO9mSPYPrEZbELMKkZDE=",
"ref": "main",
"rev": "75759a14e8d46421fca4306393a38b5ad5240f09",
"rev": "13b5d656e0bef196f40d1be8581a97569f7a7eb9",
"shallow": true,
"type": "git",
"url": "ssh://git@github.com/hektor/nix-secrets"
@@ -467,11 +467,11 @@
},
"nixpkgs": {
"locked": {
"lastModified": 1776169885,
"narHash": "sha256-l/iNYDZ4bGOAFQY2q8y5OAfBBtrDAaPuRQqWaFHVRXM=",
"lastModified": 1776548001,
"narHash": "sha256-ZSK0NL4a1BwVbbTBoSnWgbJy9HeZFXLYQizjb2DPF24=",
"owner": "nixos",
"repo": "nixpkgs",
"rev": "4bd9165a9165d7b5e33ae57f3eecbcb28fb231c9",
"rev": "b12141ef619e0a9c1c84dc8c684040326f27cdcc",
"type": "github"
},
"original": {

View File

@@ -66,7 +66,7 @@ in
};
nix.settings.secret-key-files = lib.mkIf cfg.nixSigningKey.enable [
config.sops.secrets.nix/signing-key.path
config.sops.secrets."nix/signing-key".path
];
services = {