mirror of
https://github.com/XNM1/linux-nixos-hyprland-config-dotfiles.git
synced 2025-09-15 09:45:58 +03:00
small changes
This commit is contained in:
@@ -33,4 +33,4 @@ display-messages = true
|
|||||||
enable = true
|
enable = true
|
||||||
|
|
||||||
[keys.normal]
|
[keys.normal]
|
||||||
backspace = { w = ":w", c = ":bc", q = ":q", A-q = ":q!" }
|
backspace = { w = ":w", c = ":bc", q = ":q", A-q = ":q!", A-c = ":bc!" }
|
||||||
|
@@ -143,6 +143,7 @@ windowrule = float, title:(Media viewer)
|
|||||||
windowrule = opaque, title:(Media viewer)
|
windowrule = opaque, title:(Media viewer)
|
||||||
windowrule = opaque, title:(YouTube Music)
|
windowrule = opaque, title:(YouTube Music)
|
||||||
windowrule = opaque, title:(qutebrowser)
|
windowrule = opaque, title:(qutebrowser)
|
||||||
|
windowrule = opaque, title:(Slack)
|
||||||
windowrule = opaque, telegram
|
windowrule = opaque, telegram
|
||||||
windowrule = float, mpv
|
windowrule = float, mpv
|
||||||
windowrule = opaque, mpv
|
windowrule = opaque, mpv
|
||||||
|
@@ -4,7 +4,7 @@
|
|||||||
# Bootloader.
|
# Bootloader.
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader.efi.canTouchEfiVariables = true;
|
boot.loader.efi.canTouchEfiVariables = true;
|
||||||
boot.loader.efi.efiSysMountPoint = "/boot";
|
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
||||||
boot.loader.timeout = 2;
|
boot.loader.timeout = 2;
|
||||||
boot.initrd.enable = true;
|
boot.initrd.enable = true;
|
||||||
boot.initrd.systemd.enable = true;
|
boot.initrd.systemd.enable = true;
|
||||||
|
@@ -8,7 +8,6 @@
|
|||||||
enableSSHSupport = true;
|
enableSSHSupport = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
# FIXME Don't forget to create an authorization mapping file for your user (https://nixos.wiki/wiki/Yubikey#pam_u2f)
|
|
||||||
security.pam.services = {
|
security.pam.services = {
|
||||||
login.u2fAuth = true;
|
login.u2fAuth = true;
|
||||||
sudo.u2fAuth = true;
|
sudo.u2fAuth = true;
|
||||||
@@ -24,6 +23,7 @@
|
|||||||
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions"
|
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions"
|
||||||
'';
|
'';
|
||||||
|
|
||||||
|
# FIXME Don't forget to create an authorization mapping file for your user (https://nixos.wiki/wiki/Yubikey#pam_u2f)
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
pam_u2f
|
pam_u2f
|
||||||
];
|
];
|
||||||
|
Reference in New Issue
Block a user