chore: System updates and config tweaks
Updated all flake inputs and applied srveral improvements to the system configurations. *** Updates - Ran =flake update= to bring all dependencies to their latest versions. - Pinned =lix-module= to the stable =release-2.93= branch to prevent breakages from its main branch. *** System Configuration - ssh: Reworked the client configuration to use a global =*= match block for secure defaults. Disabled the default home-manager config for removing nixpkgs' wrannings. - intel-vaapi-driver: Enabled =enableHybridCodec= override to avoid to build whole package from scratch. - kde: Forced the Qt platform theme to =kde= to fix a visual bug with Stylix. - onnxruntime: Disabled CUDA/NCCL support to avoid to build the whole package from scratch. *** Application Changes - firefox: Switched the default browser package to =firefox-beta= across the entire configuration (NixOS, home-manager, and niri). - editor: Removed =hurl= and =cmake-language-server= from the editor runtime environment for broken packages.
This commit is contained in:
parent
dca4a1c944
commit
d6380773b3
10 changed files with 115 additions and 89 deletions
|
|
@ -17,14 +17,26 @@ in
|
|||
(lib.mkIf cfg.enable {
|
||||
programs.ssh = {
|
||||
enable = true;
|
||||
hashKnownHosts = true;
|
||||
extraOptionOverrides = {
|
||||
HostKeyAlgorithms = "ssh-ed25519-cert-v01@openssh.com,ssh-rsa-cert-v01@openssh.com,ssh-ed25519,ssh-rsa,ecdsa-sha2-nistp521-cert-v01@openssh.com,ecdsa-sha2-nistp384-cert-v01@openssh.com,ecdsa-sha2-nistp256-cert-v01@openssh.com,ecdsa-sha2-nistp521,ecdsa-sha2-nistp384,ecdsa-sha2-nistp256";
|
||||
KexAlgorithms = "curve25519-sha256@libssh.org,ecdh-sha2-nistp521,ecdh-sha2-nistp384,ecdh-sha2-nistp256,diffie-hellman-group-exchange-sha256";
|
||||
MACs = "hmac-sha2-512-etm@openssh.com,hmac-sha2-256-etm@openssh.com,umac-128-etm@openssh.com,hmac-sha2-512,hmac-sha2-256,umac-128@openssh.com";
|
||||
Ciphers = "chacha20-poly1305@openssh.com,aes256-gcm@openssh.com,aes128-gcm@openssh.com,aes256-ctr,aes192-ctr,aes128-ctr";
|
||||
};
|
||||
enableDefaultConfig = false;
|
||||
matchBlocks = {
|
||||
"*" = {
|
||||
forwardAgent = false;
|
||||
addKeysToAgent = "no";
|
||||
compression = false;
|
||||
serverAliveInterval = 0;
|
||||
serverAliveCountMax = 3;
|
||||
hashKnownHosts = false;
|
||||
userKnownHostsFile = "~/.ssh/known_hosts";
|
||||
controlMaster = "no";
|
||||
controlPath = "~/.ssh/master-%r@%n:%p";
|
||||
controlPersist = "no";
|
||||
};
|
||||
"github.com" = {
|
||||
hostname = "ssh.github.com";
|
||||
port = 443;
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue