Do not use gpg-agent for ssh on headless systems
This commit is contained in:
parent
83f5264243
commit
5e122fcef7
|
@ -110,6 +110,8 @@
|
|||
# Support for exotic file systems
|
||||
boot.supportedFilesystems = lib.optional config.sbruder.full "ntfs";
|
||||
|
||||
programs.ssh.startAgent = lib.mkDefault (!config.sbruder.gui.enable);
|
||||
|
||||
# When this is set to true (default), routing everything through a
|
||||
# wireguard tunnel does not work.
|
||||
networking.firewall.checkReversePath = false;
|
||||
|
|
|
@ -2,7 +2,7 @@
|
|||
#
|
||||
# SPDX-License-Identifier: AGPL-3.0-or-later
|
||||
|
||||
{ nixosConfig, pkgs, ... }:
|
||||
{ lib, nixosConfig, pkgs, ... }:
|
||||
|
||||
{
|
||||
programs.gpg = {
|
||||
|
@ -18,7 +18,7 @@
|
|||
services.gpg-agent = rec {
|
||||
enable = true;
|
||||
enableZshIntegration = true;
|
||||
enableSshSupport = true;
|
||||
enableSshSupport = lib.mkDefault nixosConfig.sbruder.gui.enable;
|
||||
|
||||
pinentryFlavor = if nixosConfig.sbruder.gui.enable then "gnome3" else "curses";
|
||||
|
||||
|
|
Loading…
Reference in a new issue