A subset of keys in secrets.yaml can be marked as unencrypted by suffixing them with _unencryprted. This is useful for things like SSH public (not private) keys.
Can sops-nix expose these unencrypted values during evaluation? Not as .path (which points to /run/... path, accessible only during runtime), but as .text (accessible during evaluation time)?
I could then store public keys in secrets.yaml (along with the encrypted private keys) and use them to set options like users.user.<name>.authorizedKeys in a say container (that has no access to the host's /run directory).