1
1
Fork 1
mirror of https://github.com/oddlama/nix-config.git synced 2025-10-11 07:10:39 +02:00

feat: add gpg agent settings; add kitty

This commit is contained in:
oddlama 2023-02-09 02:31:36 +01:00
parent 8d0c068e53
commit 3fb61b585b
No known key found for this signature in database
GPG key ID: 14EFE510775FE39A
16 changed files with 194 additions and 35 deletions

View file

@ -8,6 +8,7 @@ with lib; {
users.groups.myuser.gid = config.users.users.myuser.uid;
users.users.myuser = {
uid = 1000;
hashedPassword = "$6$YogAnKRz8qW2Gz.I$chgMKKrpPAfV0WuGN6ChOgUJistpCzFsHOT6mhHyj07mwI1kSfDJvnMB13frMvkpv2aGpXHVH.yxk5fYHeeET/";
createHome = true;
group = "myuser";
extraGroups =
@ -22,13 +23,7 @@ with lib; {
#impermanence.home-manager.impermanence
../common
./dev.nix
#]
#++ optionals config.programs.sway.enable [
# ./graphical
# ./graphical/sway
#] ++ optionals config.services.xserver.windowManager.i3.enable [
# ./graphical
# ./graphical/i3
./gpg.nix
];
home = {

View file

@ -7,11 +7,7 @@
set auto-load safe-path /
'';
};
packages = with pkgs; [
git-lfs
nix-update
nixpkgs-review
];
packages = with pkgs; [git-lfs];
};
programs = {

78
users/myuser/gpg.nix Normal file
View file

@ -0,0 +1,78 @@
{lib, ...}: {
programs.gpg = {
enable = true;
scdaemonSettings.disable-ccid = true;
settings = {
# https://github.com/drduh/config/blob/master/gpg.conf
# https://www.gnupg.org/documentation/manuals/gnupg/GPG-Configuration-Options.html
# https://www.gnupg.org/documentation/manuals/gnupg/GPG-Esoteric-Options.html
# Use AES256, 192, or 128 as cipher
personal-cipher-preferences = "AES256 AES192 AES";
# Use SHA512, 384, or 256 as digest
personal-digest-preferences = "SHA512 SHA384 SHA256";
# Use ZLIB, BZIP2, ZIP, or no compression
personal-compress-preferences = "ZLIB BZIP2 ZIP Uncompressed";
# Default preferences for new keys
default-preference-list = "SHA512 SHA384 SHA256 AES256 AES192 AES ZLIB BZIP2 ZIP Uncompressed";
# SHA512 as digest to sign keys
cert-digest-algo = "SHA512";
# SHA512 as digest for symmetric ops
s2k-digest-algo = "SHA512";
# AES256 as cipher for symmetric ops
s2k-cipher-algo = "AES256";
# UTF-8 support for compatibility
charset = "utf-8";
# Show Unix timestamps
fixed-list-mode = true;
# No comments in signature
no-comments = true;
# No version in signature
no-emit-version = true;
# Disable banner
no-greeting = true;
# Long hexidecimal key format
keyid-format = "0xlong";
# Display UID validity
list-options = "show-uid-validity";
verify-options = "show-uid-validity";
# Display all keys and their fingerprints
with-fingerprint = true;
# Display key origins and updates
#with-key-origin
# Cross-certify subkeys are present and valid
require-cross-certification = true;
# Disable caching of passphrase for symmetrical ops
no-symkey-cache = true;
# Enable smartcard
use-agent = true;
# Disable recipient key ID in messages
throw-keyids = true;
# Default/trusted key ID to use (helpful with throw-keyids)
#default-key 0xFF3E7D88647EBCDB
#trusted-key 0xFF3E7D88647EBCDB
# Group recipient keys (preferred ID last)
#group keygroup = 0xFF00000000000001 0xFF00000000000002 0xFF3E7D88647EBCDB
# Keyserver URL
#keyserver hkps://keys.openpgp.org
#keyserver hkps://keyserver.ubuntu.com:443
#keyserver hkps://hkps.pool.sks-keyservers.net
#keyserver hkps://pgp.ocf.berkeley.edu
# Proxy to use for keyservers
#keyserver-options http-proxy=socks5-hostname://127.0.0.1:9050
# Verbose output
#verbose
# Show expired subkeys
#list-options show-unusable-subkeys
};
# TODO publicKeys = [
# TODO {
# TODO source = ./yubikey.gpg;
# TODO trust = 5;
# TODO }
# TODO ];
};
services.gpg-agent = {
enable = true;
enableSshSupport = true;
};
}

Binary file not shown.