mirror of
https://github.com/alyraffauf/nixcfg.git
synced 2024-11-25 03:51:53 -05:00
aly: autostart keepassxc unlocked
Some checks are pending
flakehub / flakehub-publish (push) Waiting to run
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run
Some checks are pending
flakehub / flakehub-publish (push) Waiting to run
git-mirror / gitlab-sync (push) Waiting to run
nix-build / default-build (push) Waiting to run
nix-build / fallarbor-build (push) Waiting to run
nix-build / lavaridge-build (push) Waiting to run
nix-build / mauville-build (push) Waiting to run
nix-build / petalburg-build (push) Waiting to run
nix-build / rustboro-build (push) Waiting to run
nix-check / fmt-check (push) Waiting to run
nix-check / eval-check (push) Waiting to run
This commit is contained in:
parent
613b565227
commit
a253f41f51
|
@ -88,7 +88,7 @@ in {
|
|||
# Handle newly added monitors
|
||||
added_monitors.each do |monitor|
|
||||
random_background = Dir.glob(File.join(directory, '*.{png,jpg}')).sample
|
||||
pid = spawn("/nix/store/azvrjs0k5ap90dcqw280xrbqlm6nkibv-swaybg-1.2.1/bin/swaybg", '-o', monitor, '-i', random_background, '-m', 'fill')
|
||||
pid = spawn("${lib.getExe pkgs.swaybg}", '-o', monitor, '-i', random_background, '-m', 'fill')
|
||||
current_pids[monitor] = pid
|
||||
last_update_time[monitor] = Time.now
|
||||
known_monitors[monitor] = random_background
|
||||
|
|
|
@ -4,6 +4,7 @@
|
|||
alyraffaufFastmail.file = ../../secrets/aly/mail/alyraffauf_fastmail.age;
|
||||
backblazeKeyId.file = ../../secrets/aly/backblaze/keyId.age;
|
||||
backblazeKey.file = ../../secrets/aly/backblaze/key.age;
|
||||
keepassxc.file = ../../secrets/aly/keepassxc.age;
|
||||
|
||||
transmissionRemote = {
|
||||
file = ../../secrets/aly/transmissionRemote.age;
|
||||
|
|
|
@ -3,7 +3,9 @@
|
|||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}: {
|
||||
}: let
|
||||
keepassxc = "${lib.getExe' pkgs.keepassxc "keepassxc"} --pw-stdin ${config.home.homeDirectory}/sync/Passwords.kdbx < ${config.age.secrets.keepassxc.path}";
|
||||
in {
|
||||
wayland.windowManager = {
|
||||
sway.config = {
|
||||
assigns = {
|
||||
|
@ -17,7 +19,7 @@
|
|||
floating.criteria = [{app_id = "org.keepassxc.KeePassXC";}];
|
||||
|
||||
keybindings = {
|
||||
"${config.wayland.windowManager.sway.config.modifier}+P" = "exec ${lib.getExe' pkgs.keepassxc "keepassxc"}";
|
||||
"${config.wayland.windowManager.sway.config.modifier}+P" = "exec ${keepassxc}";
|
||||
"${config.wayland.windowManager.sway.config.modifier}+N" = "exec ${lib.getExe' pkgs.obsidian "obsidian"}";
|
||||
};
|
||||
|
||||
|
@ -33,7 +35,7 @@
|
|||
};
|
||||
};
|
||||
|
||||
startup = [{command = ''sleep 1 && ${lib.getExe' pkgs.keepassxc "keepassxc"}'';}];
|
||||
startup = [{command = ''sleep 1 && ${keepassxc}'';}];
|
||||
|
||||
window.commands = [
|
||||
{
|
||||
|
@ -47,10 +49,10 @@
|
|||
bind = [
|
||||
"SUPER SHIFT,N,movetoworkspace,special:notes"
|
||||
"SUPER,N,togglespecialworkspace,notes"
|
||||
"SUPER,P,exec,${lib.getExe' pkgs.keepassxc "keepassxc"}"
|
||||
"SUPER,P,exec,${keepassxc}"
|
||||
];
|
||||
|
||||
exec-once = ["sleep 1 && ${lib.getExe' pkgs.keepassxc "keepassxc"}"];
|
||||
exec-once = ["sleep 1 && ${keepassxc}"];
|
||||
|
||||
input.kb_options = "ctrl:nocaps";
|
||||
|
||||
|
|
23
secrets/aly/keepassxc.age
Normal file
23
secrets/aly/keepassxc.age
Normal file
|
@ -0,0 +1,23 @@
|
|||
age-encryption.org/v1
|
||||
-> ssh-ed25519 xIeYNQ jNhPUqxRGL1/AgHEmzbkiVUyjEWwj0YdW05zAIyo1kk
|
||||
5yhF4pbBu1RSxYXZBfr+EO2SZ7jmyilE6rabF6RnPrE
|
||||
-> ssh-ed25519 g+apXg dhEVCLqN3BSJcBmqeWpsXwBFWuKxT78qds3oACPCsVA
|
||||
bq6xG45TiYdLibqINhzZVWzpjAe3nYTbREErU0631Rc
|
||||
-> ssh-ed25519 xZaw4A 6soVrhT7xPJd5Bz8oKtCNANxBdfkFnf6h0Vo7/PsCzk
|
||||
VQmSHXgfLEQLo/eWROfZrIPnan/13cX++cHVp4jUz5I
|
||||
-> ssh-ed25519 GrlIbA dgLoBxYih2VGLXsKoRGlYKB8jxLalsyX+MXV1bqSXBk
|
||||
4/L8Pk39+NnObP57T56qQgg91iIPrKxl7KyiER9vPGw
|
||||
-> ssh-ed25519 STQ5RA qJuOjmwNlQpvLOWljB5hT1M6rFGUy6HONSrRe/DI9EM
|
||||
RSi/QojxNbZn5KTzrfyHJUgXA/xk0Ml0aXEVxv08U+g
|
||||
-> ssh-ed25519 nrny8w 81xJfiA33ew6xXW+uZDFnLae/RJnUcZwuNNTBeX6sWI
|
||||
aQszpGAyAXk+k6cl37/yieDgruq2OaTd+t/aPd0ixGA
|
||||
-> ssh-ed25519 c7E/gQ ABPJ26sXSC6PU7EBv+xCCvNGkeKpkmhKvVaiAkvAKWM
|
||||
/cpZC4H1hdvylEyt2Vh/4WR3s1+sovEQiEJcVSEQ/ho
|
||||
-> ssh-ed25519 IghKlQ GTiXc4wtFZd2eeZHaEtRDtrlIXJHWLNzfp8wORVnoWE
|
||||
g5k2lTqcx5nvAX09rDZkMx9sSIthrwKhjvs3R0vmgpU
|
||||
-> ssh-ed25519 1mX44w xVeaRaqaIVSM7MWsW0TXmzreb5dt5lUbKYJSMrhdNiw
|
||||
5byOZi2QHGStVmWCT/L3p7HpDmnQkD2tfVE1sqYqjEA
|
||||
-> ssh-ed25519 FhVeqQ mXAIr6c4Ipv1p1hfdLDIYj6T7Ia0curJv0Ao+28X+mw
|
||||
iYjxG756GietbM4J7bVjV23qjcOwAXP7Rf1llL6BDgo
|
||||
--- NlASWbMfTtePdKOvTQ1MXypX1iPDymslSLJglpIzfxs
|
||||
ÍÞ—îÄ÷éØÉ<´À<C2B4>)]fAXÍG·åé«œœ$I+åO(¥g™WÐð”Úgéóö[5QôÔ)à¯LÑÄ
|
|
@ -19,13 +19,9 @@ let
|
|||
in {
|
||||
"aly/backblaze/key.age".publicKeys = keys;
|
||||
"aly/backblaze/keyId.age".publicKeys = keys;
|
||||
"cloudflare.age".publicKeys = keys;
|
||||
"lastFM/apiKey.age".publicKeys = keys;
|
||||
"lastFM/secret.age".publicKeys = keys;
|
||||
"aly/keepassxc.age".publicKeys = keys;
|
||||
"aly/mail/achacega_gmail.age".publicKeys = keys;
|
||||
"aly/mail/alyraffauf_fastmail.age".publicKeys = keys;
|
||||
"spotify/clientId.age".publicKeys = keys;
|
||||
"spotify/clientSecret.age".publicKeys = keys;
|
||||
"aly/syncthing/fallarbor/cert.age".publicKeys = keys;
|
||||
"aly/syncthing/fallarbor/key.age".publicKeys = keys;
|
||||
"aly/syncthing/lavaridge/cert.age".publicKeys = keys;
|
||||
|
@ -36,8 +32,13 @@ in {
|
|||
"aly/syncthing/petalburg/key.age".publicKeys = keys;
|
||||
"aly/syncthing/rustboro/cert.age".publicKeys = keys;
|
||||
"aly/syncthing/rustboro/key.age".publicKeys = keys;
|
||||
"aly/transmissionRemote.age".publicKeys = keys;
|
||||
"cloudflare.age".publicKeys = keys;
|
||||
"lastFM/apiKey.age".publicKeys = keys;
|
||||
"lastFM/secret.age".publicKeys = keys;
|
||||
"spotify/clientId.age".publicKeys = keys;
|
||||
"spotify/clientSecret.age".publicKeys = keys;
|
||||
"tailscale/authKeyFile.age".publicKeys = keys;
|
||||
"transmission.age".publicKeys = keys;
|
||||
"aly/transmissionRemote.age".publicKeys = keys;
|
||||
"wifi.age".publicKeys = keys;
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue