mirror of
https://github.com/alyraffauf/nixcfg.git
synced 2024-11-22 01:33:55 -05:00
aly: autostart keepassxc unlocked
Some checks are pending
flakehub / flakehub-publish (push) Waiting to run
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run
Some checks are pending
flakehub / flakehub-publish (push) Waiting to run
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run
This commit is contained in:
parent
613b565227
commit
a253f41f51
|
@ -88,7 +88,7 @@ in {
|
||||||
# Handle newly added monitors
|
# Handle newly added monitors
|
||||||
added_monitors.each do |monitor|
|
added_monitors.each do |monitor|
|
||||||
random_background = Dir.glob(File.join(directory, '*.{png,jpg}')).sample
|
random_background = Dir.glob(File.join(directory, '*.{png,jpg}')).sample
|
||||||
pid = spawn("/nix/store/azvrjs0k5ap90dcqw280xrbqlm6nkibv-swaybg-1.2.1/bin/swaybg", '-o', monitor, '-i', random_background, '-m', 'fill')
|
pid = spawn("${lib.getExe pkgs.swaybg}", '-o', monitor, '-i', random_background, '-m', 'fill')
|
||||||
current_pids[monitor] = pid
|
current_pids[monitor] = pid
|
||||||
last_update_time[monitor] = Time.now
|
last_update_time[monitor] = Time.now
|
||||||
known_monitors[monitor] = random_background
|
known_monitors[monitor] = random_background
|
||||||
|
|
|
@ -4,6 +4,7 @@
|
||||||
alyraffaufFastmail.file = ../../secrets/aly/mail/alyraffauf_fastmail.age;
|
alyraffaufFastmail.file = ../../secrets/aly/mail/alyraffauf_fastmail.age;
|
||||||
backblazeKeyId.file = ../../secrets/aly/backblaze/keyId.age;
|
backblazeKeyId.file = ../../secrets/aly/backblaze/keyId.age;
|
||||||
backblazeKey.file = ../../secrets/aly/backblaze/key.age;
|
backblazeKey.file = ../../secrets/aly/backblaze/key.age;
|
||||||
|
keepassxc.file = ../../secrets/aly/keepassxc.age;
|
||||||
|
|
||||||
transmissionRemote = {
|
transmissionRemote = {
|
||||||
file = ../../secrets/aly/transmissionRemote.age;
|
file = ../../secrets/aly/transmissionRemote.age;
|
||||||
|
|
|
@ -3,7 +3,9 @@
|
||||||
lib,
|
lib,
|
||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}: {
|
}: let
|
||||||
|
keepassxc = "${lib.getExe' pkgs.keepassxc "keepassxc"} --pw-stdin ${config.home.homeDirectory}/sync/Passwords.kdbx < ${config.age.secrets.keepassxc.path}";
|
||||||
|
in {
|
||||||
wayland.windowManager = {
|
wayland.windowManager = {
|
||||||
sway.config = {
|
sway.config = {
|
||||||
assigns = {
|
assigns = {
|
||||||
|
@ -17,7 +19,7 @@
|
||||||
floating.criteria = [{app_id = "org.keepassxc.KeePassXC";}];
|
floating.criteria = [{app_id = "org.keepassxc.KeePassXC";}];
|
||||||
|
|
||||||
keybindings = {
|
keybindings = {
|
||||||
"${config.wayland.windowManager.sway.config.modifier}+P" = "exec ${lib.getExe' pkgs.keepassxc "keepassxc"}";
|
"${config.wayland.windowManager.sway.config.modifier}+P" = "exec ${keepassxc}";
|
||||||
"${config.wayland.windowManager.sway.config.modifier}+N" = "exec ${lib.getExe' pkgs.obsidian "obsidian"}";
|
"${config.wayland.windowManager.sway.config.modifier}+N" = "exec ${lib.getExe' pkgs.obsidian "obsidian"}";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -33,7 +35,7 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
startup = [{command = ''sleep 1 && ${lib.getExe' pkgs.keepassxc "keepassxc"}'';}];
|
startup = [{command = ''sleep 1 && ${keepassxc}'';}];
|
||||||
|
|
||||||
window.commands = [
|
window.commands = [
|
||||||
{
|
{
|
||||||
|
@ -47,10 +49,10 @@
|
||||||
bind = [
|
bind = [
|
||||||
"SUPER SHIFT,N,movetoworkspace,special:notes"
|
"SUPER SHIFT,N,movetoworkspace,special:notes"
|
||||||
"SUPER,N,togglespecialworkspace,notes"
|
"SUPER,N,togglespecialworkspace,notes"
|
||||||
"SUPER,P,exec,${lib.getExe' pkgs.keepassxc "keepassxc"}"
|
"SUPER,P,exec,${keepassxc}"
|
||||||
];
|
];
|
||||||
|
|
||||||
exec-once = ["sleep 1 && ${lib.getExe' pkgs.keepassxc "keepassxc"}"];
|
exec-once = ["sleep 1 && ${keepassxc}"];
|
||||||
|
|
||||||
input.kb_options = "ctrl:nocaps";
|
input.kb_options = "ctrl:nocaps";
|
||||||
|
|
||||||
|
|
23
secrets/aly/keepassxc.age
Normal file
23
secrets/aly/keepassxc.age
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 xIeYNQ jNhPUqxRGL1/AgHEmzbkiVUyjEWwj0YdW05zAIyo1kk
|
||||||
|
5yhF4pbBu1RSxYXZBfr+EO2SZ7jmyilE6rabF6RnPrE
|
||||||
|
-> ssh-ed25519 g+apXg dhEVCLqN3BSJcBmqeWpsXwBFWuKxT78qds3oACPCsVA
|
||||||
|
bq6xG45TiYdLibqINhzZVWzpjAe3nYTbREErU0631Rc
|
||||||
|
-> ssh-ed25519 xZaw4A 6soVrhT7xPJd5Bz8oKtCNANxBdfkFnf6h0Vo7/PsCzk
|
||||||
|
VQmSHXgfLEQLo/eWROfZrIPnan/13cX++cHVp4jUz5I
|
||||||
|
-> ssh-ed25519 GrlIbA dgLoBxYih2VGLXsKoRGlYKB8jxLalsyX+MXV1bqSXBk
|
||||||
|
4/L8Pk39+NnObP57T56qQgg91iIPrKxl7KyiER9vPGw
|
||||||
|
-> ssh-ed25519 STQ5RA qJuOjmwNlQpvLOWljB5hT1M6rFGUy6HONSrRe/DI9EM
|
||||||
|
RSi/QojxNbZn5KTzrfyHJUgXA/xk0Ml0aXEVxv08U+g
|
||||||
|
-> ssh-ed25519 nrny8w 81xJfiA33ew6xXW+uZDFnLae/RJnUcZwuNNTBeX6sWI
|
||||||
|
aQszpGAyAXk+k6cl37/yieDgruq2OaTd+t/aPd0ixGA
|
||||||
|
-> ssh-ed25519 c7E/gQ ABPJ26sXSC6PU7EBv+xCCvNGkeKpkmhKvVaiAkvAKWM
|
||||||
|
/cpZC4H1hdvylEyt2Vh/4WR3s1+sovEQiEJcVSEQ/ho
|
||||||
|
-> ssh-ed25519 IghKlQ GTiXc4wtFZd2eeZHaEtRDtrlIXJHWLNzfp8wORVnoWE
|
||||||
|
g5k2lTqcx5nvAX09rDZkMx9sSIthrwKhjvs3R0vmgpU
|
||||||
|
-> ssh-ed25519 1mX44w xVeaRaqaIVSM7MWsW0TXmzreb5dt5lUbKYJSMrhdNiw
|
||||||
|
5byOZi2QHGStVmWCT/L3p7HpDmnQkD2tfVE1sqYqjEA
|
||||||
|
-> ssh-ed25519 FhVeqQ mXAIr6c4Ipv1p1hfdLDIYj6T7Ia0curJv0Ao+28X+mw
|
||||||
|
iYjxG756GietbM4J7bVjV23qjcOwAXP7Rf1llL6BDgo
|
||||||
|
--- NlASWbMfTtePdKOvTQ1MXypX1iPDymslSLJglpIzfxs
|
||||||
|
ÍÞ—îÄ÷éØÉ<´À<C2B4>)]fAXÍG·åé«œœ$I+åO(¥g™WÐð”Úgéóö[5QôÔ)à¯LÑÄ
|
|
@ -19,13 +19,9 @@ let
|
||||||
in {
|
in {
|
||||||
"aly/backblaze/key.age".publicKeys = keys;
|
"aly/backblaze/key.age".publicKeys = keys;
|
||||||
"aly/backblaze/keyId.age".publicKeys = keys;
|
"aly/backblaze/keyId.age".publicKeys = keys;
|
||||||
"cloudflare.age".publicKeys = keys;
|
"aly/keepassxc.age".publicKeys = keys;
|
||||||
"lastFM/apiKey.age".publicKeys = keys;
|
|
||||||
"lastFM/secret.age".publicKeys = keys;
|
|
||||||
"aly/mail/achacega_gmail.age".publicKeys = keys;
|
"aly/mail/achacega_gmail.age".publicKeys = keys;
|
||||||
"aly/mail/alyraffauf_fastmail.age".publicKeys = keys;
|
"aly/mail/alyraffauf_fastmail.age".publicKeys = keys;
|
||||||
"spotify/clientId.age".publicKeys = keys;
|
|
||||||
"spotify/clientSecret.age".publicKeys = keys;
|
|
||||||
"aly/syncthing/fallarbor/cert.age".publicKeys = keys;
|
"aly/syncthing/fallarbor/cert.age".publicKeys = keys;
|
||||||
"aly/syncthing/fallarbor/key.age".publicKeys = keys;
|
"aly/syncthing/fallarbor/key.age".publicKeys = keys;
|
||||||
"aly/syncthing/lavaridge/cert.age".publicKeys = keys;
|
"aly/syncthing/lavaridge/cert.age".publicKeys = keys;
|
||||||
|
@ -36,8 +32,13 @@ in {
|
||||||
"aly/syncthing/petalburg/key.age".publicKeys = keys;
|
"aly/syncthing/petalburg/key.age".publicKeys = keys;
|
||||||
"aly/syncthing/rustboro/cert.age".publicKeys = keys;
|
"aly/syncthing/rustboro/cert.age".publicKeys = keys;
|
||||||
"aly/syncthing/rustboro/key.age".publicKeys = keys;
|
"aly/syncthing/rustboro/key.age".publicKeys = keys;
|
||||||
|
"aly/transmissionRemote.age".publicKeys = keys;
|
||||||
|
"cloudflare.age".publicKeys = keys;
|
||||||
|
"lastFM/apiKey.age".publicKeys = keys;
|
||||||
|
"lastFM/secret.age".publicKeys = keys;
|
||||||
|
"spotify/clientId.age".publicKeys = keys;
|
||||||
|
"spotify/clientSecret.age".publicKeys = keys;
|
||||||
"tailscale/authKeyFile.age".publicKeys = keys;
|
"tailscale/authKeyFile.age".publicKeys = keys;
|
||||||
"transmission.age".publicKeys = keys;
|
"transmission.age".publicKeys = keys;
|
||||||
"aly/transmissionRemote.age".publicKeys = keys;
|
|
||||||
"wifi.age".publicKeys = keys;
|
"wifi.age".publicKeys = keys;
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue