Add Kagi search to Firefox and add Kagi key to secrets
This commit is contained in:
parent
b82f9c863d
commit
4528fa19db
5 changed files with 21 additions and 11 deletions
|
@ -73,6 +73,16 @@
|
||||||
force = true;
|
force = true;
|
||||||
order = [ "Ecosia" ];
|
order = [ "Ecosia" ];
|
||||||
engines = {
|
engines = {
|
||||||
|
"Kagi" = {
|
||||||
|
urls = [{
|
||||||
|
template = "https://kagi.com/search";
|
||||||
|
params = [
|
||||||
|
{ name = "token"; value = builtins.readFile /var/run/secrets/kagi_key; }
|
||||||
|
{ name = "q"; value = "{searchTerms}"; }
|
||||||
|
];
|
||||||
|
}];
|
||||||
|
definedAliases = [ "@k" ];
|
||||||
|
};
|
||||||
"Ecosia" = {
|
"Ecosia" = {
|
||||||
urls = [{
|
urls = [{
|
||||||
template = "https://www.ecosia.org/search";
|
template = "https://www.ecosia.org/search";
|
||||||
|
|
|
@ -27,13 +27,6 @@
|
||||||
enableHidpi = true;
|
enableHidpi = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
programs.alvr = {
|
|
||||||
enable = true;
|
|
||||||
openFirewall = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
|
|
||||||
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "thunderbolt" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
|
boot.initrd.availableKernelModules = [ "xhci_pci" "nvme" "thunderbolt" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
|
||||||
boot.initrd.kernelModules = [ ];
|
boot.initrd.kernelModules = [ ];
|
||||||
boot.kernelModules = [ "kvm-intel" "acpi_call" ];
|
boot.kernelModules = [ "kvm-intel" "acpi_call" ];
|
||||||
|
@ -45,6 +38,7 @@
|
||||||
|
|
||||||
# Set your time zone.
|
# Set your time zone.
|
||||||
time.timeZone = "Asia/Tokyo";
|
time.timeZone = "Asia/Tokyo";
|
||||||
|
services.automatic-timezoned.enable = true;
|
||||||
|
|
||||||
# Set the networking hostname:
|
# Set the networking hostname:
|
||||||
networking.hostName = "nixos-desktop";
|
networking.hostName = "nixos-desktop";
|
||||||
|
|
|
@ -32,7 +32,7 @@ in {
|
||||||
};
|
};
|
||||||
|
|
||||||
# Used in home-manager's atuin config
|
# Used in home-manager's atuin config
|
||||||
# Used here instead of home-manager because HM randomly needs to restart sops-nix and I can't
|
# Used here instead of home-manager because HM randomly needs to restart sops-nix and I can't
|
||||||
# find a way to do so
|
# find a way to do so
|
||||||
sops.secrets."atuin_key" = {
|
sops.secrets."atuin_key" = {
|
||||||
sopsFile = ../../../secrets/users/albert.yaml;
|
sopsFile = ../../../secrets/users/albert.yaml;
|
||||||
|
@ -44,6 +44,11 @@ in {
|
||||||
owner = "albert";
|
owner = "albert";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
sops.secrets."kagi_token" = {
|
||||||
|
sopsFile = ../../../secrets/users/albert.yaml;
|
||||||
|
owner = "albert";
|
||||||
|
};
|
||||||
|
|
||||||
# Make this user trusted
|
# Make this user trusted
|
||||||
nix.settings.trusted-users = [ "albert" ];
|
nix.settings.trusted-users = [ "albert" ];
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,13 +1,14 @@
|
||||||
email_password: ENC[AES256_GCM,data:8gSaWe8MVQzd2cm+bqWI0jKhHzWLBe16gXj7+Ymxxj7Yq6eGwYeR+/Pgr5MdYL/Bw8GHZiM6lFticfFBGZcu9ar7tnDjLoI10EuflyvJkxc6pH1cFm4lvI9Y39j3Fc7TOf9EpX5NS74wTyiqAt4jC+sx1p+Uq3mbv6QZzMsI4Qo=,iv:SCpuPI5pd+wnKLrqTwlJkJsnPuOF0l6M92YtsdrwzxA=,tag:kTfu+JfqVIRCzwQhP/7eng==,type:str]
|
email_password: ENC[AES256_GCM,data:8gSaWe8MVQzd2cm+bqWI0jKhHzWLBe16gXj7+Ymxxj7Yq6eGwYeR+/Pgr5MdYL/Bw8GHZiM6lFticfFBGZcu9ar7tnDjLoI10EuflyvJkxc6pH1cFm4lvI9Y39j3Fc7TOf9EpX5NS74wTyiqAt4jC+sx1p+Uq3mbv6QZzMsI4Qo=,iv:SCpuPI5pd+wnKLrqTwlJkJsnPuOF0l6M92YtsdrwzxA=,tag:kTfu+JfqVIRCzwQhP/7eng==,type:str]
|
||||||
atuin_key: ENC[AES256_GCM,data:0qgmIwr+iTtsZC/XRmvqalz+dtF6QlfewCsWliiKLQnrYMDwQDtTi/x9a+mravCUfU/lMrW+uGP/S9+SaFqhivCR04+lhebVzudhSQ==,iv:noX6V2Cqm1yBL5IKIJkHW3sw9ztlOnxCGWoNIaUizEw=,tag:pb/kyV5KGUv8RjsnaZ5l8w==,type:str]
|
atuin_key: ENC[AES256_GCM,data:0qgmIwr+iTtsZC/XRmvqalz+dtF6QlfewCsWliiKLQnrYMDwQDtTi/x9a+mravCUfU/lMrW+uGP/S9+SaFqhivCR04+lhebVzudhSQ==,iv:noX6V2Cqm1yBL5IKIJkHW3sw9ztlOnxCGWoNIaUizEw=,tag:pb/kyV5KGUv8RjsnaZ5l8w==,type:str]
|
||||||
|
kagi_token: ENC[AES256_GCM,data:h/89k36+WjblQPnx5zG+PjNo8XuggLhNiXeghXbWFTxuY/wExtutVJKsWNJFBKdVgimKAYwtgg==,iv:eMXIBVZndlbj9k8Hkqm5b/Y+oBJKXi5BCgkx2bE1TOs=,tag:2qFanmK6/S/YROuZCGeUYg==,type:str]
|
||||||
sops:
|
sops:
|
||||||
kms: []
|
kms: []
|
||||||
gcp_kms: []
|
gcp_kms: []
|
||||||
azure_kv: []
|
azure_kv: []
|
||||||
hc_vault: []
|
hc_vault: []
|
||||||
age: []
|
age: []
|
||||||
lastmodified: "2024-05-07T00:20:08Z"
|
lastmodified: "2024-09-21T11:34:29Z"
|
||||||
mac: ENC[AES256_GCM,data:vnh6/A6wZxUMERGnlgUAIcv8x6VkMI/Ez1put16FcB71FSrYdcGFsJzFKZzqsZtFG0pubiCL83i2bp40lip6hhBeILmJ4TDUwtHBnHZ40l0nP3F0rAItIKQSaXFW2VLkTZbhqghSyVTywEZQ61Pr7B8/wJILmvDJc4+hfRSnBis=,iv:Afq67eyLjcJzvJchdBSLJKdeiFbmcOKpJd+fWVz6u+4=,tag:A81AbLm6ohXl0h6Q9vDkCA==,type:str]
|
mac: ENC[AES256_GCM,data:ZRNHH78+IXkQGZY93w20cxGNEyv2je4WFIkpNiXQG/bYDtRGLMcwFvW8Gttb2DqyUqncQXjQF0mpnlAG67Mvz/jS9WXaWKmC8PT0JyiOSkyn7mFRrDR/dkLnlf7zZvlqo7Sap/+vXrMvZAnJHwKaMzHGYAqH8MZvn0F8d8LUN3g=,iv:tD/yHbM2HT9uArWVPCHVhmZ7BopuMs58P+U6ciPB9FU=,tag:SeI4uninsijvRNBSzAH7ow==,type:str]
|
||||||
pgp:
|
pgp:
|
||||||
- created_at: "2024-07-27T04:10:19Z"
|
- created_at: "2024-07-27T04:10:19Z"
|
||||||
enc: |-
|
enc: |-
|
||||||
|
|
|
@ -1 +1 @@
|
||||||
Subproject commit 26552d8bade6fa39188ebf68e9ffa1a8dcd75108
|
Subproject commit 8ed82c9afaac6359cf4603196f7a5bd4b399a4b5
|
Loading…
Reference in a new issue