Use gpg-agent as ssh agent
This commit is contained in:
parent
9107ce034c
commit
0318ca56f9
|
@ -98,10 +98,6 @@
|
|||
# Support for exotic file systems
|
||||
boot.supportedFilesystems = lib.optional config.sbruder.full "ntfs";
|
||||
|
||||
# Authentication/Encryption agents
|
||||
programs.gnupg.agent.enable = true;
|
||||
programs.ssh.startAgent = true;
|
||||
|
||||
# When this is set to true (default), routing everything through a
|
||||
# wireguard tunnel does not work.
|
||||
networking.firewall.checkReversePath = false;
|
||||
|
|
|
@ -52,4 +52,7 @@ lib.mkIf config.sbruder.gui.enable {
|
|||
mode = "440";
|
||||
};
|
||||
};
|
||||
|
||||
# required for pinentry-gnome3
|
||||
services.dbus.packages = [ pkgs.gcr ];
|
||||
}
|
||||
|
|
|
@ -1,3 +1,5 @@
|
|||
{ nixosConfig, ... }:
|
||||
|
||||
{
|
||||
programs.gpg = {
|
||||
enable = true;
|
||||
|
@ -5,4 +7,17 @@
|
|||
default-key = "47E7559E037A35652DBBF8AA8D3C82F9F309F8EC";
|
||||
};
|
||||
};
|
||||
|
||||
services.gpg-agent = rec {
|
||||
enable = true;
|
||||
enableZshIntegration = true;
|
||||
enableSshSupport = true;
|
||||
|
||||
pinentryFlavor = if nixosConfig.sbruder.gui.enable then "gnome3" else "curses";
|
||||
|
||||
defaultCacheTtl = 300;
|
||||
defaultCacheTtlSsh = defaultCacheTtl;
|
||||
maxCacheTtl = 1800;
|
||||
maxCacheTtlSsh = maxCacheTtl;
|
||||
};
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue