diff --git a/hosts/mu/default.nix b/hosts/mu/default.nix index 3dadd68..e450882 100644 --- a/hosts/mu/default.nix +++ b/hosts/mu/default.nix @@ -1,6 +1,10 @@ { ... }: { imports = [ ./hardware.nix + ./fish.nix + ./hosts.nix + ./k9s.nix + ./packages.nix ./sway.nix ../../overlays ../../modules/base diff --git a/hosts/mu/fish.nix b/hosts/mu/fish.nix new file mode 100644 index 0000000..ab0cd61 --- /dev/null +++ b/hosts/mu/fish.nix @@ -0,0 +1,7 @@ +{ home-manager, ... }: { + home-manager.users.caspervk = { + programs.fish.shellAliases = { + sm = "gcloud --project magenta-os2mo-production compute ssh --tunnel-through-iap saltmaster"; + }; + }; +} diff --git a/hosts/mu/hosts.nix b/hosts/mu/hosts.nix new file mode 100644 index 0000000..1053d28 --- /dev/null +++ b/hosts/mu/hosts.nix @@ -0,0 +1,7 @@ +{ ... }: { + networking.hosts = { + "127.0.0.1" = [ + # not in git + ]; + }; +} diff --git a/hosts/mu/k9s.nix b/hosts/mu/k9s.nix new file mode 100644 index 0000000..d276d81 --- /dev/null +++ b/hosts/mu/k9s.nix @@ -0,0 +1,28 @@ +{ home-manager, pkgs, ... }: { + home-manager.users.caspervk = { + programs.k9s = { + enable = true; + settings = { + k9s = { + refreshRate = 1; + logger = { + tail = 500; + sinceSeconds = -1; + textWrap = true; + showTime = true; + }; + }; + }; + }; + }; + + # Allow port-forward to 443 + security.wrappers = { + k9s = { + source = "${pkgs.k9s}/bin/k9s"; + owner = "root"; + group = "root"; + capabilities = "cap_net_bind_service+ep"; + }; + }; +} diff --git a/hosts/mu/packages.nix b/hosts/mu/packages.nix new file mode 100644 index 0000000..26af12a --- /dev/null +++ b/hosts/mu/packages.nix @@ -0,0 +1,17 @@ +{ pkgs, ... }: { + environment.systemPackages = with pkgs; [ + azure-cli + fluxcd + (google-cloud-sdk.withExtraComponents [ + google-cloud-sdk.components.gke-gcloud-auth-plugin + ]) + kind + kubectl + kubernetes-helm + kustomize + poetry + pre-commit + sops + terraform + ]; +}