From 40c2bd666bb2eb9a75a234f70af26e0498bcbf4b Mon Sep 17 00:00:00 2001 From: xnm Date: Mon, 5 Feb 2024 17:45:40 +0200 Subject: [PATCH] small changes --- home/.config/helix/config.toml | 2 +- home/.config/hypr/hyprland.conf | 1 + nixos/bootloader.nix | 2 +- nixos/yubikey.nix | 2 +- 4 files changed, 4 insertions(+), 3 deletions(-) diff --git a/home/.config/helix/config.toml b/home/.config/helix/config.toml index bfa0a2c..7cd152d 100644 --- a/home/.config/helix/config.toml +++ b/home/.config/helix/config.toml @@ -33,4 +33,4 @@ display-messages = true enable = true [keys.normal] -backspace = { w = ":w", c = ":bc", q = ":q", A-q = ":q!" } +backspace = { w = ":w", c = ":bc", q = ":q", A-q = ":q!", A-c = ":bc!" } diff --git a/home/.config/hypr/hyprland.conf b/home/.config/hypr/hyprland.conf index 0d89be5..a519331 100644 --- a/home/.config/hypr/hyprland.conf +++ b/home/.config/hypr/hyprland.conf @@ -143,6 +143,7 @@ windowrule = float, title:(Media viewer) windowrule = opaque, title:(Media viewer) windowrule = opaque, title:(YouTube Music) windowrule = opaque, title:(qutebrowser) +windowrule = opaque, title:(Slack) windowrule = opaque, telegram windowrule = float, mpv windowrule = opaque, mpv diff --git a/nixos/bootloader.nix b/nixos/bootloader.nix index f16adcf..c865c09 100644 --- a/nixos/bootloader.nix +++ b/nixos/bootloader.nix @@ -4,7 +4,7 @@ # Bootloader. boot.loader.systemd-boot.enable = true; boot.loader.efi.canTouchEfiVariables = true; - boot.loader.efi.efiSysMountPoint = "/boot"; + boot.loader.efi.efiSysMountPoint = "/boot/efi"; boot.loader.timeout = 2; boot.initrd.enable = true; boot.initrd.systemd.enable = true; diff --git a/nixos/yubikey.nix b/nixos/yubikey.nix index d486e37..8889568 100644 --- a/nixos/yubikey.nix +++ b/nixos/yubikey.nix @@ -8,7 +8,6 @@ enableSSHSupport = true; }; - # FIXME Don't forget to create an authorization mapping file for your user (https://nixos.wiki/wiki/Yubikey#pam_u2f) security.pam.services = { login.u2fAuth = true; sudo.u2fAuth = true; @@ -24,6 +23,7 @@ RUN+="${pkgs.systemd}/bin/loginctl lock-sessions" ''; + # FIXME Don't forget to create an authorization mapping file for your user (https://nixos.wiki/wiki/Yubikey#pam_u2f) environment.systemPackages = with pkgs; [ pam_u2f ];