Compare commits

..

25 commits

Author SHA1 Message Date
b3fdd10c71 Update docker.io/1password/connect-sync Docker tag to v1.7.3
All checks were successful
Build / nix-build (native-aarch64, varda) (pull_request) Successful in 1m31s
Build / nix-build (native-x86_64, telchar) (pull_request) Successful in 6m33s
2024-07-29 12:32:05 +00:00
60776e90c0
Reconfigured 1password as module to integrate with vivaldi browser and moved it to system packages. 2024-07-29 02:32:10 -05:00
3b386222aa
found another way
All checks were successful
Build / nix-build (native-aarch64, varda) (push) Successful in 1m35s
Build / nix-build (native-x86_64, telchar) (push) Successful in 4m36s
2024-07-28 21:38:25 -05:00
903d9fc052
this is it
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 21:37:29 -05:00
c7dcc39138
move along, nothing to see here.
All checks were successful
Build / nix-build (native-aarch64, varda) (push) Successful in 1m30s
Build / nix-build (native-x86_64, telchar) (push) Successful in 15m4s
2024-07-28 20:26:22 -05:00
5418476c30
i'm done
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Successful in 1m34s
Build / nix-build (native-x86_64, telchar) (push) Has been cancelled
2024-07-28 20:18:52 -05:00
0b1f22d1e8
get it
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Successful in 1m29s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 19:32:46 -05:00
d5c4587b18
...
Some checks failed
Build / nix-build (native-x86_64, telchar) (push) Failing after 1m3s
Build / nix-build (native-aarch64, varda) (push) Successful in 1m31s
2024-07-28 19:23:15 -05:00
841fcd3b9f
test
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 19:17:58 -05:00
9a3670fea3
one mor etime
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 19:14:20 -05:00
29779716bf
lets try this again
Some checks failed
Build / nix-build (native-x86_64, telchar) (push) Failing after 1m3s
Build / nix-build (native-aarch64, varda) (push) Successful in 1m30s
2024-07-28 19:08:40 -05:00
a5c2693469
What the heck
Some checks failed
Build / nix-build (native-x86_64, telchar) (push) Failing after 1m2s
Build / nix-build (native-aarch64, varda) (push) Successful in 1m31s
2024-07-28 19:05:41 -05:00
bd7ad0aab3
debug file output
Some checks failed
Build / nix-build (native-x86_64, telchar) (push) Failing after 1m22s
Build / nix-build (native-aarch64, varda) (push) Successful in 1m34s
2024-07-28 19:02:00 -05:00
0797ef3404
act workaround 2024-07-28 19:01:49 -05:00
f0139b2306
debugging
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 3s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 18:40:44 -05:00
aeddc80146
more action debugging
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 18:39:56 -05:00
c9a4d7848f
make file pls
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 12:52:47 -05:00
94e2fe736b
make file
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 3s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 12:48:48 -05:00
3cc2d5ce50
No dir?
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 12:45:00 -05:00
6477aa73f9
don't be dumb
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 2s
Build / nix-build (native-x86_64, telchar) (push) Failing after 4s
2024-07-28 12:43:20 -05:00
abcb730fc5
possible fix for ssh-git not downloading private repo from github
Some checks failed
Build / nix-build (native-aarch64, varda) (push) Failing after 3s
Build / nix-build (native-x86_64, telchar) (push) Failing after 3s
2024-07-28 12:40:53 -05:00
81312eed0f
Add the ability ignore messages for servers that have no state to backup that are production. 2024-07-27 16:27:50 -05:00
218d68e1c1
Statix fix 2024-07-27 14:46:16 -05:00
eb76b566f6
disable empty_pattern on statix 2024-07-27 14:45:59 -05:00
43ff961b41
Add statix, reorganize. 2024-07-27 14:36:36 -05:00
20 changed files with 110 additions and 47 deletions

View file

@ -22,14 +22,7 @@ jobs:
- name: Checkout repository
uses: https://github.com/actions/checkout@v4
with:
fetch-depth: 0
- name: Write ssh key
id: sshkey
uses: https://github.com/timheuer/base64-to-file@v1
with:
encodedString: "${{ secrets.SSH_USER }}"
fileName: id_ed25519
fileDir: ~/.ssh
fetch-depth: 0
- uses: https://github.com/cachix/cachix-action@v15
if: ${{ !github.event.pull_request.head.repo.fork }}
with:

1
.gitignore vendored
View file

@ -4,3 +4,4 @@ age.key
result*
.direnv
.kube
.github

View file

@ -33,7 +33,6 @@ with config;
p7zip
# cli
_1password
bat
dbus
direnv

View file

@ -5,19 +5,20 @@ with config;
./global.nix
];
myHome.programs.firefox.enable = true;
myHome = {
programs.firefox.enable = true;
shell = {
starship.enable = true;
fish.enable = true;
wezterm.enable = true;
atuind.enable = true;
myHome.shell = {
starship.enable = true;
fish.enable = true;
wezterm.enable = true;
atuind.enable = true;
git = {
enable = true;
username = "Joseph Hanson";
email = "joe@veri.dev";
signingKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIDSAmssproxG+KsVn2DfuteBAemHrmmAFzCtldpKl4J";
git = {
enable = true;
username = "Joseph Hanson";
email = "joe@veri.dev";
signingKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIDSAmssproxG+KsVn2DfuteBAemHrmmAFzCtldpKl4J";
};
};
};
@ -26,7 +27,6 @@ with config;
packages = with pkgs;
[
#apps
_1password-gui
discord
flameshot
jetbrains.datagrip

View file

@ -84,6 +84,8 @@ in
samba.extraConfig = import ./config/samba-config.nix { };
resticBackup.local.enable = false;
resticBackup.remote.enable = false;
resticBackup.local.noWarning = true;
resticBackup.remote.noWarning = true;
# Borg
borgbackup = {
enable = true;

View file

@ -46,5 +46,6 @@
mySystem = {
purpose = "Development";
system.motd.networkInterfaces = [ "wlp1s0" ];
security._1password.enable = true;
};
}

View file

@ -68,6 +68,8 @@
system.motd.networkInterfaces = [ "enp2s0" "wlp3s0" ];
system.resticBackup.local.enable = false;
system.resticBackup.remote.enable = false;
system.resticBackup.local.noWarning = true;
system.resticBackup.remote.noWarning = true;
services = {
podman.enable = true;

View file

@ -56,7 +56,7 @@ in
# Enable vscode & addons
environment.systemPackages = with pkgs; [
(vscode-with-extensions.override {
vscode = unstable.vscode;
inherit (unstable) vscode;
# Merge all the extension packages together.
vscodeExtensions =
vscodeCommunityExtensionsPackages ++ nixpkgsExtensionsPackages ++ marketplaceExtensionsPackages;

View file

@ -0,0 +1,10 @@
[Desktop Entry]
Name=1Password
Exec=1password %U --silent
Terminal=false
Type=Application
Icon=1password
StartupWMClass=1Password
Comment=Password manager and secure wallet
MimeType=x-scheme-handler/onepassword;
Categories=Office;

View file

@ -0,0 +1,35 @@
{ config, lib, ... }:
with lib; let
cfg = config.mySystem.security._1password;
user = "jahanson";
in
{
options.mySystem.security._1password = {
enable = mkEnableOption "_1password";
};
config = mkIf cfg.enable {
programs = {
_1password.enable = true;
_1password-gui = {
enable = true;
polkitPolicyOwners = [ "${user}" ];
};
};
home-manager.users.${user} = {
home.file = {
".config/autostart/1password-startup.desktop".source = ./config/1password-startup.desktop;
};
};
environment.etc = {
"1password/custom_allowed_browsers" = {
text = ''
vivaldi-bin
'';
mode = "0755";
};
};
};
}

View file

@ -1,6 +1,7 @@
{ ... }:
{
imports = [
./1password
./acme
];
}

View file

@ -26,7 +26,7 @@ in
services.bind = {
enable = true;
inherit (cfg) package;
extraConfig = cfg.extraConfig;
inherit (cfg) extraConfig;
};
# Clean up journal files

View file

@ -32,7 +32,7 @@ in
services.haproxy = {
enable = true;
inherit (cfg) package;
config = cfg.config;
inherit (cfg) config;
};
};
}

View file

@ -7,6 +7,12 @@ in
options.mySystem.system.resticBackup = {
local = {
enable = mkEnableOption "Local backups" // { default = true; };
noWarning = mkOption
{
type = types.bool;
description = "Disable warning for local backups";
default = false;
};
location = mkOption
{
type = types.str;
@ -16,6 +22,12 @@ in
};
remote = {
enable = mkEnableOption "Remote backups" // { default = true; };
noWarning = mkOption
{
type = types.bool;
description = "Disable warning for remote backups";
default = false;
};
location = mkOption
{
type = types.str;
@ -34,8 +46,8 @@ in
# Warn if backups are disable and machine isnt a dev box
warnings = [
(mkIf (!cfg.local.enable && config.mySystem.purpose != "Development") "WARNING: Local backups are disabled for ${config.system.name}!")
(mkIf (!cfg.remote.enable && config.mySystem.purpose != "Development") "WARNING: Remote backups are disabled for ${config.system.name}!")
(mkIf (!cfg.local.noWarning && !cfg.local.enable && config.mySystem.purpose != "Development") "WARNING: Local backups are disabled for ${config.system.name}!")
(mkIf (!cfg.remote.noWarning && !cfg.remote.enable && config.mySystem.purpose != "Development") "WARNING: Remote backups are disabled for ${config.system.name}!")
];
sops.secrets = mkIf (cfg.local.enable || cfg.remote.enable) {

View file

@ -27,9 +27,9 @@ in
config = lib.mkIf cfg.enable {
services.borgbackup.jobs."borgbackup" = {
paths = cfg.paths;
exclude = cfg.exclude;
repo = cfg.repo;
inherit (cfg) paths;
inherit (cfg) exclude;
inherit (cfg) repo;
encryption = {
mode = "repokey-blake2";
passCommand = "cat ${cfg.repoKeyPath}";

View file

@ -2,7 +2,7 @@
let
finalVersion = "1.22.5";
in
(final: prev: {
final: prev: {
go_1_22 = prev.go_1_22.overrideAttrs (oldAttrs: {
version = finalVersion;
src = prev.fetchurl {
@ -10,4 +10,4 @@ in
hash = "sha256-rJxyPyJJaa7mJLw0/TTJ4T8qIS11xxyAfeZEu0bhEvY=";
};
});
})
}

View file

@ -2,7 +2,7 @@
let
finalVersion = "1.7.5";
in
(final: prev: {
final: prev: {
talosctl = prev.talosctl.overrideAttrs (oldAttrs: {
version = finalVersion;
src = prev.fetchFromGitHub {
@ -16,4 +16,4 @@ in
updateScript = ./update.sh;
};
});
})
}

View file

@ -2,12 +2,12 @@
let
versions = lib.importJSON ./versions.json;
in
(final: prev: {
final: prev: {
warp-terminal = prev.warp-terminal.overrideAttrs (oldAttrs: {
version = versions.linux.version;
inherit (versions.linux) version;
src = prev.fetchurl {
url = "https://releases.warp.dev/stable/v${versions.linux.version}/warp-terminal-v${versions.linux.version}-1-x86_64.pkg.tar.zst";
hash = versions.linux.hash;
inherit (versions.linux) hash;
};
});
})
}

View file

@ -17,15 +17,16 @@ pkgs.mkShell {
NIX_CONFIG = "experimental-features = nix-command flakes";
nativeBuildInputs = with pkgs; [
nix
home-manager
git
nil
nixpkgs-fmt
go-task
sops
pre-commit
gitleaks
cachix
git
gitleaks
go-task
home-manager
nil
nix
nixpkgs-fmt
pre-commit
sops
statix
];
}

6
statix.toml Normal file
View file

@ -0,0 +1,6 @@
disabled = [
"empty_pattern"
]
nix_version = '2.4'
ignore = ['.direnv']