|
10 | 10 | bits = 4096;
|
11 | 11 | path = ./test-assets/ssh-key;
|
12 | 12 | }];
|
13 |
| - sops.defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 13 | + sops.defaultSopsFile = ./test-assets/secrets.yaml; |
14 | 14 | sops.secrets.test_key = { };
|
15 | 15 | };
|
16 | 16 |
|
|
29 | 29 | imports = [ ../../modules/sops ];
|
30 | 30 | sops = {
|
31 | 31 | age.keyFile = ./test-assets/age-keys.txt;
|
32 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 32 | + defaultSopsFile = ./test-assets/secrets.yaml; |
33 | 33 | secrets.test_key.neededForUsers = true;
|
34 | 34 | secrets."nested/test/file".owner = "example-user";
|
35 | 35 | };
|
|
62 | 62 | imports = [ ../../modules/sops ];
|
63 | 63 | sops = {
|
64 | 64 | age.keyFile = ./test-assets/age-keys.txt;
|
65 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 65 | + defaultSopsFile = ./test-assets/secrets.yaml; |
66 | 66 | secrets.test_key = { };
|
67 | 67 | keepGenerations = lib.mkDefault 0;
|
68 | 68 | };
|
|
103 | 103 | imports = [ ../../modules/sops ];
|
104 | 104 | sops = {
|
105 | 105 | age.keyFile = ./test-assets/age-keys.txt;
|
106 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 106 | + defaultSopsFile = ./test-assets/secrets.yaml; |
107 | 107 | secrets.test_key = { };
|
108 | 108 | };
|
109 | 109 | };
|
|
127 | 127 | path = ./test-assets/ssh-ed25519-key;
|
128 | 128 | }];
|
129 | 129 | sops = {
|
130 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 130 | + defaultSopsFile = ./test-assets/secrets.yaml; |
131 | 131 | secrets.test_key = { };
|
132 | 132 | # Generate a key and append it to make sure it appending doesn't break anything
|
133 | 133 | age = {
|
|
157 | 157 | };
|
158 | 158 |
|
159 | 159 | sops.gnupg.home = "/run/gpghome";
|
160 |
| - sops.defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 160 | + sops.defaultSopsFile = ./test-assets/secrets.yaml; |
161 | 161 | sops.secrets.test_key.owner = config.users.users.someuser.name;
|
162 | 162 | sops.secrets."nested/test/file".owner = config.users.users.someuser.name;
|
163 | 163 | sops.secrets.existing-file = {
|
|
208 | 208 | imports = [ ../../modules/sops ];
|
209 | 209 | sops = {
|
210 | 210 | age.keyFile = ./test-assets/age-keys.txt;
|
211 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 211 | + defaultSopsFile = ./test-assets/secrets.yaml; |
212 | 212 | secrets.test_key = { };
|
213 | 213 | };
|
214 | 214 |
|
|
267 | 267 |
|
268 | 268 | sops = {
|
269 | 269 | age.keyFile = ./test-assets/age-keys.txt;
|
270 |
| - defaultSopsFiles = [ ./test-assets/secrets.yaml ]; |
| 270 | + defaultSopsFile = ./test-assets/secrets.yaml; |
271 | 271 | secrets.test_key = {
|
272 | 272 | restartUnits = [ "restart-unit.service" "reload-unit.service" ];
|
273 | 273 | reloadUnits = [ "reload-trigger.service" ];
|
|
0 commit comments