aboutsummaryrefslogtreecommitdiff
path: root/flake.lock
diff options
context:
space:
mode:
authorFranck Cuny <franck@fcuny.net>2023-03-11 13:24:35 -0800
committerFranck Cuny <franck@fcuny.net>2023-03-11 13:41:15 -0800
commit784ac3fd221a477cccc168e90baea2a22509d7c2 (patch)
tree1cac0bfc8ff1e2b8015cbfb547073e2aeee7d3ae /flake.lock
parenthome/gnome: no more keyring (diff)
downloadinfra-784ac3fd221a477cccc168e90baea2a22509d7c2.tar.gz
secrets: use homeage to manage secrets for home-manager
Instead of using agenix for all the secrets, I can use homeage for secrets that are related to my user sessions. Secrets by default will be store under `~/.secrets'. They are encrypted using `age' and to decrypt them, a key is expected to be located under `~/.age/key.txt'. The last place where I was using `pass' (and so GPG too) was for the secrets for `mbsync': this change adds a secret for fastmail to the repository and update `mbsync' configuration to use it.
Diffstat (limited to '')
-rw-r--r--flake.lock21
1 files changed, 21 insertions, 0 deletions
diff --git a/flake.lock b/flake.lock
index 97d2059..3fb2155 100644
--- a/flake.lock
+++ b/flake.lock
@@ -168,6 +168,26 @@
"type": "github"
}
},
+ "homeage": {
+ "inputs": {
+ "nixpkgs": [
+ "nixpkgs"
+ ]
+ },
+ "locked": {
+ "lastModified": 1669234151,
+ "narHash": "sha256-TwT87E3m2TZLgwYJESlype14HxUOrRGojPM5C2akrMg=",
+ "owner": "jordanisaacs",
+ "repo": "homeage",
+ "rev": "02bfe4ca06962d222e522fff0240c93946b20278",
+ "type": "github"
+ },
+ "original": {
+ "owner": "jordanisaacs",
+ "repo": "homeage",
+ "type": "github"
+ }
+ },
"naersk": {
"inputs": {
"nixpkgs": "nixpkgs_2"
@@ -282,6 +302,7 @@
"emacs-overlay": "emacs-overlay",
"futils": "futils",
"home-manager": "home-manager",
+ "homeage": "homeage",
"naersk": "naersk",
"nixpkgs": "nixpkgs_3",
"nur": "nur",