Do not use gpg-agent for ssh on headless systems

This commit is contained in:
Simon Bruder 2024-04-26 11:41:42 +02:00
parent 6e7782b479
commit 6b31c22be7
Signed by: simon
GPG key ID: 347FF8699CDA0776
2 changed files with 4 additions and 2 deletions

View file

@ -110,6 +110,8 @@
# Support for exotic file systems # Support for exotic file systems
boot.supportedFilesystems = lib.optional config.sbruder.full "ntfs"; boot.supportedFilesystems = lib.optional config.sbruder.full "ntfs";
programs.ssh.startAgent = lib.mkDefault (!config.sbruder.gui.enable);
# When this is set to true (default), routing everything through a # When this is set to true (default), routing everything through a
# wireguard tunnel does not work. # wireguard tunnel does not work.
networking.firewall.checkReversePath = false; networking.firewall.checkReversePath = false;

View file

@ -2,7 +2,7 @@
# #
# SPDX-License-Identifier: AGPL-3.0-or-later # SPDX-License-Identifier: AGPL-3.0-or-later
{ nixosConfig, pkgs, ... }: { lib, nixosConfig, pkgs, ... }:
{ {
programs.gpg = { programs.gpg = {
@ -18,7 +18,7 @@
services.gpg-agent = rec { services.gpg-agent = rec {
enable = true; enable = true;
enableZshIntegration = true; enableZshIntegration = true;
enableSshSupport = true; enableSshSupport = lib.mkDefault nixosConfig.sbruder.gui.enable;
pinentryFlavor = if nixosConfig.sbruder.gui.enable then "gnome3" else "curses"; pinentryFlavor = if nixosConfig.sbruder.gui.enable then "gnome3" else "curses";