diff --git a/configuration.nix b/configuration.nix index da91b746..6dc9df4c 100644 --- a/configuration.nix +++ b/configuration.nix @@ -13,9 +13,6 @@ { lib, config, pkgs, ... }: { imports = [ - # SOPS Shell integration - ./shell.nix - # Desktop Environments ./desktops/gnome.nix diff --git a/shell.nix b/shell.nix deleted file mode 100644 index 66b6fe17..00000000 --- a/shell.nix +++ /dev/null @@ -1,37 +0,0 @@ -# shell.nix -with import {}; -let - sops-nix = builtins.fetchTarball { - url = "https://github.com/Mic92/sops-nix/archive/master.tar.gz"; - }; -in -mkShell { - # imports all files ending in .asc/.gpg - sopsPGPKeyDirs = [ - "${toString ./.}/keys/hosts" - "${toString ./.}/keys/users" - ]; - # Also single files can be imported. - #sopsPGPKeys = [ - # "${toString ./.}/keys/users/mic92.asc" - # "${toString ./.}/keys/hosts/server01.asc" - #]; - - # This hook can also import gpg keys into its own seperate - # gpg keyring instead of using the default one. This allows - # to isolate otherwise unrelated server keys from the user gpg keychain. - # By uncommenting the following lines, it will set GNUPGHOME - # to .git/gnupg. - # Storing it inside .git prevents accedentially commiting private keys. - # After setting this option you will also need to import your own - # private key into keyring, i.e. using a a command like this - # (replacing 0000000000000000000000000000000000000000 with your fingerprint) - # $ (unset GNUPGHOME; gpg --armor --export-secret-key 0000000000000000000000000000000000000000) | gpg --import - #sopsCreateGPGHome = true; - # To use a different directory for gpg dirs set sopsGPGHome - #sopsGPGHome = "${toString ./.}/../gnupg"; - - nativeBuildInputs = [ - (pkgs.callPackage sops-nix {}).sops-import-keys-hook - ]; -} \ No newline at end of file