1
1
Fork 0

Compare commits

..

No commits in common. "1dbd2b876c7d3992464314d2f771a11af79a3cc4" and "a6e13a12533bbd1c4412676ba6bba754733746e3" have entirely different histories.

5 changed files with 6 additions and 26 deletions

View file

@ -10,5 +10,6 @@ in {
config = mkIf cfg.enable { config = mkIf cfg.enable {
programs.seahorse.enable = true; programs.seahorse.enable = true;
services.gnome.gnome-keyring.enable = true;
}; };
} }

View file

@ -47,7 +47,6 @@ with lib; {
swaync.enable = true; swaync.enable = true;
swayosd.enable = true; swayosd.enable = true;
#// xembed-sni-proxy.enable = true; #// xembed-sni-proxy.enable = true;
zerotierone.enable = true;
}) })
]; ];
} }

View file

@ -8,10 +8,9 @@ with lib; let
in { in {
options.custom.services.gnome-keyring.enable = mkOption {default = false;}; options.custom.services.gnome-keyring.enable = mkOption {default = false;};
config = mkIf cfg.enable { config.home-manager.users.${config.custom.username} = mkIf cfg.enable {
# https://wiki.archlinux.org/title/GNOME/Keyring # https://wiki.archlinux.org/title/GNOME/Keyring
# https://gitlab.gnome.org/GNOME/gnome-keyring # https://gitlab.gnome.org/GNOME/gnome-keyring
services.gnome.gnome-keyring.enable = true; services.gnome-keyring.enable = true;
home-manager.users.${config.custom.username}.services.gnome-keyring.enable = true;
}; };
} }

View file

@ -33,9 +33,6 @@ in {
}; };
}; };
# Use password at login to unlock keyring
security.pam.services.greetd.fprintAuth = false;
# Attempt to prevent bootlogs from polluting the tty # Attempt to prevent bootlogs from polluting the tty
# https://github.com/apognu/tuigreet/issues/68 # https://github.com/apognu/tuigreet/issues/68
systemd.services.greetd.serviceConfig = { systemd.services.greetd.serviceConfig = {
@ -47,5 +44,8 @@ in {
TTYVHangup = true; TTYVHangup = true;
TTYVTDisallocate = true; TTYVTDisallocate = true;
}; };
# FIXME: Does not unlock at login
security.pam.services.greetd.enableGnomeKeyring = true; # Allow PAM unlocking
}; };
} }

View file

@ -1,19 +0,0 @@
{
config,
lib,
...
}:
with lib; let
cfg = config.custom.services.zerotierone;
in {
options.custom.services.zerotierone.enable = mkOption {default = false;};
config = mkIf cfg.enable {
#!! Configuration is imperative
# https://www.zerotier.com/
# https://github.com/zerotier/ZeroTierOne
services.zerotierone = {
enable = true;
};
};
}