Use mitmproxy cask for macos

This commit is contained in:
Dave Gallant
2024-10-09 13:19:39 -04:00
parent 56e19b8d99
commit d51f4c78a0
4 changed files with 31 additions and 68 deletions

6
flake.lock generated
View File

@@ -422,11 +422,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1728377658, "lastModified": 1728409405,
"narHash": "sha256-omXE+zNAIz++2sX5PG4AkkecXN66uu0JZJzjCTeT5o0=", "narHash": "sha256-kk530XBUGDpt0DQbyUb3yDpSddPqF9PA5KTo/nsmmg0=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "a2eacc0c62c0537bd1a7a60c1f91d1f3a59fd013", "rev": "1366d1af8f58325602280e43ed6233849fb92216",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@@ -1,11 +1,4 @@
{ { config, lib, modulesPath, pkgs, unstable, ... }:
config,
lib,
modulesPath,
pkgs,
unstable,
...
}:
let let
gnomeExtensions = with pkgs.gnomeExtensions; [ gnomeExtensions = with pkgs.gnomeExtensions; [
appindicator appindicator
@@ -19,16 +12,17 @@ let
tailscale-status tailscale-status
tray-icons-reloaded tray-icons-reloaded
]; ];
in in {
{
imports = [ (modulesPath + "/installer/scan/not-detected.nix") ]; imports = [ (modulesPath + "/installer/scan/not-detected.nix") ];
stylix = { stylix = {
enable = true; enable = true;
base16Scheme = "${unstable.base16-schemes}/share/themes/tokyo-night-dark.yaml"; base16Scheme =
"${unstable.base16-schemes}/share/themes/tokyo-night-dark.yaml";
image = pkgs.fetchurl { image = pkgs.fetchurl {
url = "https://github.com/davegallant/nix-config/blob/main/nixos-wallpaper.png?raw=true"; url =
"https://github.com/davegallant/nix-config/blob/main/nixos-wallpaper.png?raw=true";
sha256 = "Ztqn9+CHslr6wZdnOTeo/YNi/ICerpcFLyMArsZ/PIY="; sha256 = "Ztqn9+CHslr6wZdnOTeo/YNi/ICerpcFLyMArsZ/PIY=";
}; };
polarity = "dark"; polarity = "dark";
@@ -51,29 +45,18 @@ in
}; };
}; };
supportedFilesystems = [ supportedFilesystems = [ "ntfs" "zfs" ];
"ntfs"
"zfs"
];
initrd = { initrd = {
availableKernelModules = [ availableKernelModules =
"ahci" [ "ahci" "nvme" "sd_mod" "usb_storage" "usbhid" "xhci_pci" ];
"nvme"
"sd_mod"
"usb_storage"
"usbhid"
"xhci_pci"
];
luks.devices."root" = { luks.devices."root" = {
allowDiscards = true; allowDiscards = true;
device = "/dev/disk/by-uuid/21cd166c-1528-49a4-b31b-0d408d48aa80"; device = "/dev/disk/by-uuid/21cd166c-1528-49a4-b31b-0d408d48aa80";
preLVM = true; preLVM = true;
keyFile = "./keyfile0.bin"; keyFile = "./keyfile0.bin";
}; };
secrets = { secrets = { "keyfile0.bin" = "/etc/secrets/initrd/keyfile0.bin"; };
"keyfile0.bin" = "/etc/secrets/initrd/keyfile0.bin";
};
}; };
}; };
@@ -82,8 +65,7 @@ in
keyMap = "us"; keyMap = "us";
}; };
environment.systemPackages = environment.systemPackages = with pkgs;
with pkgs;
[ [
android-tools android-tools
bitwarden bitwarden
@@ -104,6 +86,7 @@ in
libation libation
lm_sensors lm_sensors
logseq logseq
mitmproxy
mullvad-vpn mullvad-vpn
netdata netdata
nfs-utils nfs-utils
@@ -130,8 +113,7 @@ in
wine wine
wine64 wine64
wireshark-qt wireshark-qt
] ] ++ gnomeExtensions;
++ gnomeExtensions;
fileSystems = { fileSystems = {
"/" = { "/" = {
@@ -154,21 +136,20 @@ in
device = "192.168.1.178:/volume1/Backups"; device = "192.168.1.178:/volume1/Backups";
fsType = "nfs"; fsType = "nfs";
}; };
"/mnt/zfs/backups" = "/mnt/zfs/backups" = {
{ device = "zpool/backups"; device = "zpool/backups";
fsType = "zfs"; fsType = "zfs";
}; };
}; };
swapDevices = [ { device = "/dev/disk/by-uuid/5d6d0388-2b15-4ff1-9f0f-391818a76090"; } ]; swapDevices =
[{ device = "/dev/disk/by-uuid/5d6d0388-2b15-4ff1-9f0f-391818a76090"; }];
nixpkgs = { nixpkgs = {
hostPlatform = "x86_64-linux"; hostPlatform = "x86_64-linux";
config = { config = {
allowUnfree = true; allowUnfree = true;
permittedInsecurePackages = [ permittedInsecurePackages = [ "electron-27.3.11" ];
"electron-27.3.11"
];
}; };
}; };
@@ -176,9 +157,7 @@ in
iproute2.enable = true; iproute2.enable = true;
hostName = "hephaestus"; hostName = "hephaestus";
hostId = "0e8aad53"; hostId = "0e8aad53";
interfaces.enp34s0 = { interfaces.enp34s0 = { useDHCP = true; };
useDHCP = true;
};
firewall = { firewall = {
allowPing = false; allowPing = false;
enable = true; enable = true;
@@ -187,27 +166,18 @@ in
}; };
}; };
systemd.services = { systemd.services = { NetworkManager-wait-online.enable = false; };
NetworkManager-wait-online.enable = false;
};
system = { system = {
autoUpgrade.enable = true; autoUpgrade.enable = true;
stateVersion = "24.05"; stateVersion = "24.05";
}; };
nix = { nix = { extraOptions = "experimental-features = nix-command flakes"; };
extraOptions = "experimental-features = nix-command flakes";
};
users.users.dave = { users.users.dave = {
isNormalUser = true; isNormalUser = true;
extraGroups = [ extraGroups = [ "docker" "wheel" "libvirtd" "corectrl" ];
"docker"
"wheel"
"libvirtd"
"corectrl"
];
shell = pkgs.zsh; shell = pkgs.zsh;
}; };
@@ -222,7 +192,8 @@ in
hardware = { hardware = {
opengl.enable = true; opengl.enable = true;
cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; cpu.amd.updateMicrocode =
lib.mkDefault config.hardware.enableRedistributableFirmware;
pulseaudio.enable = true; pulseaudio.enable = true;
# Vulkan # Vulkan
opengl.driSupport = true; opengl.driSupport = true;

View File

@@ -91,6 +91,7 @@ in {
"librewolf" "librewolf"
"logseq" "logseq"
"lulu" "lulu"
"mitmproxy"
"notunes" "notunes"
"postman" "postman"
"raycast" "raycast"

View File

@@ -1,14 +1,6 @@
{ { config, lib, pkgs, unstable, ... }:
config, let inherit (pkgs) stdenv;
lib, in {
pkgs,
unstable,
...
}:
let
inherit (pkgs) stdenv;
in
{
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
# essentials # essentials
curl curl
@@ -66,7 +58,6 @@ in
# monitoring # monitoring
htop htop
procs procs
mitmproxy
# golang # golang
gofumpt gofumpt