summaryrefslogtreecommitdiff
path: root/profiles
diff options
context:
space:
mode:
authorMike Vink <mike@pionative.com>2024-06-09 12:14:20 +0200
committerMike Vink <mike@pionative.com>2024-06-09 12:14:44 +0200
commit5013daa0e8b7e2db35d30f3c73b552b4f96b58c4 (patch)
tree6fc6d2a6b4090964619e29e6948aea0e8b457d5e /profiles
parenta0d36ed6a666c14c0d92ce2732e23289771778f4 (diff)
fzf-tail
Diffstat (limited to 'profiles')
-rw-r--r--profiles/core/configuration.nix2
-rw-r--r--profiles/core/home.nix30
2 files changed, 23 insertions, 9 deletions
diff --git a/profiles/core/configuration.nix b/profiles/core/configuration.nix
index 7b4fec3..b74c1c8 100644
--- a/profiles/core/configuration.nix
+++ b/profiles/core/configuration.nix
@@ -82,7 +82,7 @@
usbutils
]);
- nix.package = pkgs.nixUnstable;
+ nix.package = pkgs.nixVersions.latest;
nix.extraOptions = ''
experimental-features = nix-command flakes configurable-impure-env
'';
diff --git a/profiles/core/home.nix b/profiles/core/home.nix
index 9434fc5..4010aff 100644
--- a/profiles/core/home.nix
+++ b/profiles/core/home.nix
@@ -82,14 +82,14 @@
};
};
- programs.ssh = {
- enable = true;
- matchBlocks = {
- "*" = {
- identityFile = "${config.ivi.home}/.ssh/id_ed25519_sk";
- };
- };
- };
+ # programs.ssh = {
+ # enable = true;
+ # matchBlocks = {
+ # "*" = {
+ # identityFile = "${config.ivi.home}/.ssh/id_ed25519_sk";
+ # };
+ # };
+ # };
programs.starship.enable = true;
@@ -148,6 +148,19 @@
}
bindkey -s '^o' '^ulfcd\n'
+ fzf-tail () {
+ fzf --tail 100000 --tac --no-sort --exact
+ }
+
+ fzf-stern () {
+ kubectl config set-context --current --namespace "$1"
+ kubectl stern -n "$1" "$2" --color always 2>&1 |
+ fzf --ansi --tail 100000 --tac --no-sort --exact \
+ --bind 'ctrl-o:execute:kubectl logs {1} | nvim -' \
+ --bind 'enter:execute:kubectl exec -it {1} -- bash' \
+ --header '╱ Enter (kubectl exec) ╱ CTRL-O (open log in vim) ╱'
+ }
+
login-to-cloud () {
case $1 in
aws)
@@ -218,6 +231,7 @@
lock-pass = "gpgconf --kill gpg-agent";
use-gpg-ssh = "export SSH_AUTH_SOCK=$(gpgconf --list-dirs agent-ssh-socket)";
use-fido-ssh = "export SSH_AUTH_SOCK=~/.ssh/ssh_auth_sock";
+ sshdo = "ssh -f -q -o 'StrictHostKeyChecking no' ";
};
};