Compare commits

...

2 commits

7 changed files with 24 additions and 7 deletions

View file

@ -1,7 +1,6 @@
{
inputs,
stateVersion,
pkgs,
...
}: {
nix = {

View file

@ -11,4 +11,7 @@
RUSTUP_HOME = "${XDG_DATA_HOME}/rustup";
WINEPREFIX = "${XDG_DATA_HOME}/wine";
};
nix.extraOptions = ''
use-xdg-base-directories = true
'';
}

View file

@ -1,8 +1,8 @@
{pkgs, ...}: {
home.packages = [pkgs.pwndbg];
home.enableDebugInfo = true;
home.file.gdbinit = {
target = ".gdbinit";
xdg.configFile.gdbinit = {
target = "gdb/gbdinit";
text = ''
set auto-load safe-path /
set debuginfod enabled on

View file

@ -1,4 +1,9 @@
{pkgs, ...}: {
{
pkgs,
lib,
nixosConfig,
...
}: {
services.gpg-agent = {
enable = true;
enableSshSupport = true;
@ -71,4 +76,10 @@
#list-options show-unusable-subkeys
};
};
# Make sure the keygrips exist, otherwise we'd need to run `gpg --card-status`
# before being able to use the yubikey.
home.activation.installKeygrips = lib.hm.dag.entryAfter ["writeBoundary"] ''
run mkdir -p "$HOME/.gnupg/private-keys-v1.d"
run ${lib.getExe pkgs.gnutar} xvf ${lib.escapeShellArg nixosConfig.age.secrets."my-gpg-yubikey-keygrip.tar".path} -C "$HOME/.gnupg/private-keys-v1.d/"
'';
}

View file

@ -46,6 +46,12 @@ lib.optionalAttrs (!minimal) {
rekeyFile = ../../secrets/smb.cred.age;
};
};
age.secrets."my-gpg-yubikey-keygrip.tar" = {
rekeyFile = ./secrets/gpg-keygrip.tar.age;
group = "patrick";
mode = "640";
};
programs.dconf.enable = true;
home-manager.users.patrick = {

View file

@ -11,9 +11,6 @@
"Zotero"
"invokeai"
".textgen"
".ollama"
".config/Mumble"
".config/xournalpp"
@ -43,6 +40,7 @@
".config/spotify"
".cache/spotify"
".local/share/cargo"
];
};
"/panzer/state".directories =

Binary file not shown.