Compare commits
2 commits
07d8ed6fc4
...
b6c0175bf3
Author | SHA1 | Date | |
---|---|---|---|
Gabriel Simmer | b6c0175bf3 | ||
Gabriel Simmer | e33d45bb13 |
17
flake.nix
17
flake.nix
|
@ -37,9 +37,9 @@
|
||||||
set +o allexport
|
set +o allexport
|
||||||
'';
|
'';
|
||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
jq opentofu kubectl awscli2
|
jq opentofu kubectl
|
||||||
nodePackages.yaml-language-server
|
k9s terraform-ls kubernetes-helm
|
||||||
k9s terraform-ls kubernetes-helm nil
|
nil
|
||||||
];
|
];
|
||||||
buildInputs = [ ];
|
buildInputs = [ ];
|
||||||
};
|
};
|
||||||
|
@ -64,6 +64,12 @@
|
||||||
};
|
};
|
||||||
apps = nixinate.nixinate.x86_64-linux self // {
|
apps = nixinate.nixinate.x86_64-linux self // {
|
||||||
x86_64-linux = {
|
x86_64-linux = {
|
||||||
|
kube-apply = {
|
||||||
|
type = "app";
|
||||||
|
program = toString (pkgs.writers.writeBash "diff" ''
|
||||||
|
${pkgs.kubectl}/bin/kubectl apply -f ${self.packages.x86_64-linux.kubernetes}
|
||||||
|
'');
|
||||||
|
};
|
||||||
kube-diff = {
|
kube-diff = {
|
||||||
type = "app";
|
type = "app";
|
||||||
program = toString (pkgs.writers.writeBash "diff" ''
|
program = toString (pkgs.writers.writeBash "diff" ''
|
||||||
|
@ -122,11 +128,6 @@
|
||||||
|
|
||||||
# use it as an overlay
|
# use it as an overlay
|
||||||
nixpkgs.overlays = [ nixpkgs-wayland.overlay ];
|
nixpkgs.overlays = [ nixpkgs-wayland.overlay ];
|
||||||
|
|
||||||
# or, pull specific packages (built against inputs.nixpkgs, usually `nixos-unstable`)
|
|
||||||
environment.systemPackages = [
|
|
||||||
nixpkgs-wayland.packages.x86_64-linux.waybar
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
|
|
|
@ -62,11 +62,13 @@
|
||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
tree
|
tree
|
||||||
];
|
];
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = let
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILIztwQxt+jqroFONSgq+xzPMuE2I5Dq/zWPQ8RcTYJr"
|
authorizedKeys = pkgs.fetchurl {
|
||||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAICCc6k8tl2ahB3HtjpGK403Wkk+nQKgIhSgdBXxmXdsEAAAABHNzaDo="
|
url = "https://gmem.ca/ssh";
|
||||||
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMO7u+6hBN3XJfRFZCxADyLJfI8zGO2pj9AxkF0FecSR8GFuzP77wyUzmHosQcxe/P/N1TeNdfIDCatogqft9w4="
|
hash = "sha256-7PpFDgWVfp26c9PuW+2s3O8MBAODtHr4q7WU/l3BoG4=";
|
||||||
];
|
};
|
||||||
|
in pkgs.lib.splitString "\n" (builtins.readFile
|
||||||
|
authorizedKeys);
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
|
@ -61,11 +61,13 @@
|
||||||
packages = with pkgs; [
|
packages = with pkgs; [
|
||||||
tree
|
tree
|
||||||
];
|
];
|
||||||
openssh.authorizedKeys.keys = [
|
openssh.authorizedKeys.keys = let
|
||||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILIztwQxt+jqroFONSgq+xzPMuE2I5Dq/zWPQ8RcTYJr"
|
authorizedKeys = pkgs.fetchurl {
|
||||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAICCc6k8tl2ahB3HtjpGK403Wkk+nQKgIhSgdBXxmXdsEAAAABHNzaDo="
|
url = "https://gmem.ca/ssh";
|
||||||
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMO7u+6hBN3XJfRFZCxADyLJfI8zGO2pj9AxkF0FecSR8GFuzP77wyUzmHosQcxe/P/N1TeNdfIDCatogqft9w4="
|
hash = "sha256-7PpFDgWVfp26c9PuW+2s3O8MBAODtHr4q7WU/l3BoG4=";
|
||||||
];
|
};
|
||||||
|
in pkgs.lib.splitString "\n" (builtins.readFile
|
||||||
|
authorizedKeys);
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
|
|
Loading…
Reference in a new issue