Compare commits
2 commits
07d8ed6fc4
...
b6c0175bf3
Author | SHA1 | Date | |
---|---|---|---|
Gabriel Simmer | b6c0175bf3 | ||
Gabriel Simmer | e33d45bb13 |
17
flake.nix
17
flake.nix
|
@ -37,9 +37,9 @@
|
|||
set +o allexport
|
||||
'';
|
||||
nativeBuildInputs = [
|
||||
jq opentofu kubectl awscli2
|
||||
nodePackages.yaml-language-server
|
||||
k9s terraform-ls kubernetes-helm nil
|
||||
jq opentofu kubectl
|
||||
k9s terraform-ls kubernetes-helm
|
||||
nil
|
||||
];
|
||||
buildInputs = [ ];
|
||||
};
|
||||
|
@ -64,6 +64,12 @@
|
|||
};
|
||||
apps = nixinate.nixinate.x86_64-linux self // {
|
||||
x86_64-linux = {
|
||||
kube-apply = {
|
||||
type = "app";
|
||||
program = toString (pkgs.writers.writeBash "diff" ''
|
||||
${pkgs.kubectl}/bin/kubectl apply -f ${self.packages.x86_64-linux.kubernetes}
|
||||
'');
|
||||
};
|
||||
kube-diff = {
|
||||
type = "app";
|
||||
program = toString (pkgs.writers.writeBash "diff" ''
|
||||
|
@ -122,11 +128,6 @@
|
|||
|
||||
# use it as an overlay
|
||||
nixpkgs.overlays = [ nixpkgs-wayland.overlay ];
|
||||
|
||||
# or, pull specific packages (built against inputs.nixpkgs, usually `nixos-unstable`)
|
||||
environment.systemPackages = [
|
||||
nixpkgs-wayland.packages.x86_64-linux.waybar
|
||||
];
|
||||
};
|
||||
}
|
||||
)
|
||||
|
|
|
@ -62,11 +62,13 @@
|
|||
packages = with pkgs; [
|
||||
tree
|
||||
];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILIztwQxt+jqroFONSgq+xzPMuE2I5Dq/zWPQ8RcTYJr"
|
||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAICCc6k8tl2ahB3HtjpGK403Wkk+nQKgIhSgdBXxmXdsEAAAABHNzaDo="
|
||||
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMO7u+6hBN3XJfRFZCxADyLJfI8zGO2pj9AxkF0FecSR8GFuzP77wyUzmHosQcxe/P/N1TeNdfIDCatogqft9w4="
|
||||
];
|
||||
openssh.authorizedKeys.keys = let
|
||||
authorizedKeys = pkgs.fetchurl {
|
||||
url = "https://gmem.ca/ssh";
|
||||
hash = "sha256-7PpFDgWVfp26c9PuW+2s3O8MBAODtHr4q7WU/l3BoG4=";
|
||||
};
|
||||
in pkgs.lib.splitString "\n" (builtins.readFile
|
||||
authorizedKeys);
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
|
|
@ -61,11 +61,13 @@
|
|||
packages = with pkgs; [
|
||||
tree
|
||||
];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAILIztwQxt+jqroFONSgq+xzPMuE2I5Dq/zWPQ8RcTYJr"
|
||||
"sk-ssh-ed25519@openssh.com AAAAGnNrLXNzaC1lZDI1NTE5QG9wZW5zc2guY29tAAAAICCc6k8tl2ahB3HtjpGK403Wkk+nQKgIhSgdBXxmXdsEAAAABHNzaDo="
|
||||
"ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBMO7u+6hBN3XJfRFZCxADyLJfI8zGO2pj9AxkF0FecSR8GFuzP77wyUzmHosQcxe/P/N1TeNdfIDCatogqft9w4="
|
||||
];
|
||||
openssh.authorizedKeys.keys = let
|
||||
authorizedKeys = pkgs.fetchurl {
|
||||
url = "https://gmem.ca/ssh";
|
||||
hash = "sha256-7PpFDgWVfp26c9PuW+2s3O8MBAODtHr4q7WU/l3BoG4=";
|
||||
};
|
||||
in pkgs.lib.splitString "\n" (builtins.readFile
|
||||
authorizedKeys);
|
||||
};
|
||||
|
||||
environment.systemPackages = with pkgs; [
|
||||
|
|
Loading…
Reference in a new issue