Compare commits

..

No commits in common. "f0fa47639b180754224a0e2e20372082fd7178cc" and "aa8cf61d10c24a477cc85a13ee19fe88da559151" have entirely different histories.

14 changed files with 33 additions and 107 deletions

1
.envrc
View file

@ -1,3 +1,2 @@
use nix use nix
export SOPS_AGE_KEY_FILE="$(expand_path ./age.key)" export SOPS_AGE_KEY_FILE="$(expand_path ./age.key)"
export VAULT_ADDR="http://10.1.1.61:8200"

2
.gitignore vendored
View file

@ -7,5 +7,3 @@ result*
.github .github
.profile .profile
.idea .idea
.secrets
.op

View file

@ -264,16 +264,15 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1726074731, "lastModified": 1725897020,
"narHash": "sha256-FsJQbSW9MGndQr7xz49SHjculvRaJGeqBSOgQjHguBc=", "narHash": "sha256-0mJ37QZpUz44d0uolv9XQKDHwxUwqslz5ZSgwbdxmlo=",
"owner": "ajgon", "owner": "brumhard",
"repo": "krewfile", "repo": "krewfile",
"rev": "05183df6874c2ce479987872083017d7c1ddb546", "rev": "e7773854b19a4288df5502946ccec79c4af57adf",
"type": "github" "type": "github"
}, },
"original": { "original": {
"owner": "ajgon", "owner": "brumhard",
"ref": "feat/indexes",
"repo": "krewfile", "repo": "krewfile",
"type": "github" "type": "github"
} }
@ -438,11 +437,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1725826545, "lastModified": 1725407940,
"narHash": "sha256-L64N1rpLlXdc94H+F6scnrbuEu+utC03cDDVvvJGOME=", "narHash": "sha256-tiN5Rlg/jiY0tyky+soJZoRzLKbPyIdlQ77xVgREDNM=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "f4c846aee8e1e29062aa8514d5e0ab270f4ec2f9", "rev": "6f6c45b5134a8ee2e465164811e451dcb5ad86e3",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -530,11 +529,11 @@
}, },
"nixpkgs-unstable_2": { "nixpkgs-unstable_2": {
"locked": { "locked": {
"lastModified": 1725634671, "lastModified": 1725432240,
"narHash": "sha256-v3rIhsJBOMLR8e/RNWxr828tB+WywYIoajrZKFM+0Gg=", "narHash": "sha256-+yj+xgsfZaErbfYM3T+QvEE2hU7UuE+Jf0fJCJ8uPS0=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "574d1eac1c200690e27b8eb4e24887f8df7ac27c", "rev": "ad416d066ca1222956472ab7d0555a6946746a80",
"type": "github" "type": "github"
}, },
"original": { "original": {

View file

@ -88,8 +88,7 @@
# krewfile - Declarative krew plugin management # krewfile - Declarative krew plugin management
krewfile = { krewfile = {
# url = "github:brumhard/krewfile"; url = "github:brumhard/krewfile";
url = "github:ajgon/krewfile?ref=feat/indexes";
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };

View file

@ -3,6 +3,7 @@ with config;
{ {
imports = [ imports = [
../modules ../modules
inputs.krewfile.homeManagerModules.krewfile
]; ];
config = { config = {
@ -20,6 +21,15 @@ with config;
EDITOR = "vim"; EDITOR = "vim";
}; };
programs.krewfile = {
enable = true;
krewPackage = pkgs.krew;
plugins = [
"resource-capacity"
"rook-ceph"
];
};
home = { home = {
# Install these packages for my user # Install these packages for my user
@ -94,6 +104,9 @@ with config;
# nix tools # nix tools
nvd nvd
# charmbracelet tools
gum
vhs
]; ];
}; };
}; };

View file

@ -3,19 +3,8 @@ with config;
{ {
imports = [ imports = [
./global.nix ./global.nix
inputs.krewfile.homeManagerModules.krewfile
]; ];
# Krewfile management
programs.krewfile = {
enable = true;
krewPackage = pkgs.krew;
plugins = [
"resource-capacity"
"rook-ceph"
];
};
myHome = { myHome = {
programs.firefox.enable = true; programs.firefox.enable = true;
programs.thunderbird.enable = true; programs.thunderbird.enable = true;
@ -36,7 +25,7 @@ with config;
packages = with pkgs; packages = with pkgs;
[ [
#apps #apps
unstable.vesktop discord
inputs.ghostty.packages.${pkgs.system}.default inputs.ghostty.packages.${pkgs.system}.default
obsidian obsidian
parsec-bin parsec-bin
@ -52,7 +41,6 @@ with config;
unstable.talosctl unstable.talosctl
unstable.telegram-desktop unstable.telegram-desktop
unstable.tidal-hifi unstable.tidal-hifi
unstable.vault
vlc vlc
# cli # cli

View file

@ -26,7 +26,7 @@ with lib.hm.gvariant; {
"org/gnome/shell" = { "org/gnome/shell" = {
disabled-extensions = [ "apps-menu@gnome-shell-extensions.gcampax.github.com" "light-style@gnome-shell-extensions.gcampax.github.com" "places-menu@gnome-shell-extensions.gcampax.github.com" "drive-menu@gnome-shell-extensions.gcampax.github.com" "window-list@gnome-shell-extensions.gcampax.github.com" "workspace-indicator@gnome-shell-extensions.gcampax.github.com" ]; disabled-extensions = [ "apps-menu@gnome-shell-extensions.gcampax.github.com" "light-style@gnome-shell-extensions.gcampax.github.com" "places-menu@gnome-shell-extensions.gcampax.github.com" "drive-menu@gnome-shell-extensions.gcampax.github.com" "window-list@gnome-shell-extensions.gcampax.github.com" "workspace-indicator@gnome-shell-extensions.gcampax.github.com" ];
enabled-extensions = [ "appindicatorsupport@rgcjonas.gmail.com" "caffeine@patapon.info" "dash-to-dock@micxgx.gmail.com" "gsconnect@andyholmes.github.io" "Vitals@CoreCoding.com" "sp-tray@sp-tray.esenliyim.github.com" ]; enabled-extensions = [ "appindicatorsupport@rgcjonas.gmail.com" "caffeine@patapon.info" "dash-to-dock@micxgx.gmail.com" "gsconnect@andyholmes.github.io" "Vitals@CoreCoding.com" "sp-tray@sp-tray.esenliyim.github.com" ];
favorite-apps = [ "com.mitchellh.ghostty.desktop" "vivaldi-stable.desktop" "obsidian.desktop" "code.desktop" "vesktop.desktop" ]; favorite-apps = [ "com.mitchellh.ghostty.desktop" "vivaldi-stable.desktop" "obsidian.desktop" "code.desktop" "discord.desktop" ];
}; };
"org/gnome/nautilus/preferences" = { "org/gnome/nautilus/preferences" = {
default-folder-viewer = "list-view"; default-folder-viewer = "list-view";

View file

@ -47,21 +47,11 @@
# System settings and services. # System settings and services.
mySystem = { mySystem = {
purpose = "Development"; purpose = "Development";
# System config
system = { system = {
motd.networkInterfaces = [ "wlp1s0" ]; motd.networkInterfaces = [ "wlp1s0" ];
fingerprint-reader-on-laptop-lid.enable = true; fingerprint-reader-on-laptop-lid.enable = true;
borg.pika-backup.enable = true; borg.pika-backup.enable = true;
}; };
# Services config
services = {
vault = {
enable = false;
};
};
security._1password.enable = true; security._1password.enable = true;
framework_wifi_swap.enable = true; framework_wifi_swap.enable = true;
}; };

View file

@ -27,7 +27,6 @@ let
"tyriar.sort-lines" "tyriar.sort-lines"
"yzhang.markdown-all-in-one" "yzhang.markdown-all-in-one"
"bmalehorn.vscode-fish" "bmalehorn.vscode-fish"
"hashicorp.hcl"
# "github.copilot-chat" # "github.copilot-chat"
]; ];
# Nixpkgs Extensions. These are updated whenver they get around to it. # Nixpkgs Extensions. These are updated whenver they get around to it.

View file

@ -15,6 +15,5 @@
./reboot-required-check.nix ./reboot-required-check.nix
./restic ./restic
./sanoid ./sanoid
./vault
]; ];
} }

View file

@ -1,30 +0,0 @@
{ config, lib, pkgs, ... }:
let
cfg = config.mySystem.services.vault;
in
{
options.mySystem.services.vault = {
enable = lib.mkEnableOption "vault";
address = lib.mkOption {
type = lib.types.str;
default = "127.0.0.1:8200";
description = "Address of the Vault server";
example = "127.0.0.1:8200";
};
};
config = lib.mkIf cfg.enable {
services.vault = {
enable = true;
package = pkgs.unstable.vault;
address = cfg.address;
dev = false;
storageBackend = "raft";
extraConfig = ''
api_addr = "http://127.0.0.1:8200"
cluster_addr = "http://127.0.0.1:8201"
ui = true
'';
};
};
}

View file

@ -1,14 +0,0 @@
listener "tcp" {
address = "0.0.0.0:8200"
tls_disable = true
}
storage "raft" {
path = "/var/lib/vault/data"
node_id = "node1"
}
disable_mlock = true
api_addr = "http://localhost:8200"
cluster_addr = "http://localhost:8201"
ui = true

View file

@ -24,10 +24,10 @@ let
grep -Fxq connected /sys/class/drm/card*-HDMI-*/status) grep -Fxq connected /sys/class/drm/card*-HDMI-*/status)
then then
touch "$lock" touch "$lock"
echo 0 > /dev/fingerprint_sensor/authorized echo 0 > /sys/bus/usb/devices/5-4.1/authorized
elif [ -f "$lock" ] elif [ -f "$lock" ]
then then
echo 1 > /dev/fingerprint_sensor/authorized echo 1 > /sys/bus/usb/devices/5-4.1/authorized
rm "$lock" rm "$lock"
fi fi
''; '';
@ -38,20 +38,10 @@ in
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
services = { services.acpid = {
acpid = {
enable = true; enable = true;
lidEventCommands = "${laptop-lid}"; lidEventCommands = "${laptop-lid}";
}; };
# Add udev rule to create symlink for fingerprint sensor
# when usb device 27c6:609c is connected or disconnected.
# Reason: hubs like caldigit re-orient the device number on each boot.
# May requires a reboot to take effect.
# or sudo udevadm control --reload-rules && sudo udevadm trigger
udev.extraRules = ''
SUBSYSTEM=="usb", ATTRS{idVendor}=="27c6", ATTRS{idProduct}=="609c", RUN+="/bin/sh -c 'ln -sf /sys$devpath /dev/fingerprint_sensor'"
'';
};
# Disable fingerprint reader at login since you can't put in a password when fprintd is running. # Disable fingerprint reader at login since you can't put in a password when fprintd is running.
security.pam.services.login.fprintAuth = false; security.pam.services.login.fprintAuth = false;

View file

@ -21,13 +21,9 @@ with config;
shfmt shfmt
statix statix
# flake imports # bind # for dns utils like named-checkconf
inputs.nix-inspect.packages.${pkgs.system}.default inputs.nix-inspect.packages.${pkgs.system}.default
inputs.talhelper.packages.${pkgs.system}.default inputs.talhelper.packages.${pkgs.system}.default
# charmbracelet tools
gum
vhs
]; ];
programs.direnv = { programs.direnv = {