Don't configure k9s through home-manager

k9s doesn't really work with a read-only config file.
This commit is contained in:
Casper V. Kristensen 2023-10-09 13:45:53 +02:00
parent 41aa87f8cc
commit 4883b41a73
3 changed files with 11 additions and 29 deletions

View file

@ -3,7 +3,6 @@
./hardware.nix ./hardware.nix
./fish.nix ./fish.nix
./hosts.nix ./hosts.nix
./k9s.nix
./packages.nix ./packages.nix
./sway.nix ./sway.nix
../../overlays ../../overlays

View file

@ -1,28 +0,0 @@
{ home-manager, pkgs, ... }: {
home-manager.users.caspervk = {
programs.k9s = {
enable = true;
settings = {
k9s = {
refreshRate = 1;
logger = {
tail = 500;
sinceSeconds = -1;
textWrap = true;
showTime = true;
};
};
};
};
};
# Allow port-forward to 443
security.wrappers = {
k9s = {
source = "${pkgs.k9s}/bin/k9s";
owner = "root";
group = "root";
capabilities = "cap_net_bind_service+ep";
};
};
}

View file

@ -5,6 +5,7 @@
(google-cloud-sdk.withExtraComponents [ (google-cloud-sdk.withExtraComponents [
google-cloud-sdk.components.gke-gcloud-auth-plugin google-cloud-sdk.components.gke-gcloud-auth-plugin
]) ])
k9s
kind kind
kubectl kubectl
kubernetes-helm kubernetes-helm
@ -14,4 +15,14 @@
sops sops
terraform terraform
]; ];
# Allow port-forward to 443
security.wrappers = {
k9s = {
source = "${pkgs.k9s}/bin/k9s";
owner = "root";
group = "root";
capabilities = "cap_net_bind_service+ep";
};
};
} }