{ lib, config, inputs, pkgs, pkgs-unstable, ... } : let pathToKeys = ../common/keys/yubi; yubiKeys = lib.lists.forEach (builtins.attrNames (builtins.readDir pathToKeys)) (key: lib.substring 0 (lib.stringLength key - lib.stringLength ".pub") key); # Remove .pub suffix. yubikeyPublicKeyEntries = lib.attrsets.mergeAttrsList ( lib.lists.map (key: { ".ssh/${key}.pub".source = "${pathToKeys}/${key}.pub"; }) yubiKeys ); in { imports = [ # TODO: Move all hyprland related config to its own module. ../../home-modules/hyprland ../../home-modules/direnv.nix ../../home-modules/ghostty-config.nix ../../home-modules/git.nix ../../home-modules/lazygit.nix ../../home-modules/nvim.nix ../../home-modules/sops.nix ../../home-modules/ssh-client.nix ../../home-modules/starship.nix ../../home-modules/tmux.nix ../../home-modules/zsh.nix ]; ghostty.font-size = "14"; ghostty.window-decoration = false; home = { username = "jmug"; homeDirectory = "/home/jmug"; packages = with pkgs; [ # Media loupe vlc # Audio wireplumber spotify-player # Screen management brightnessctl # Secret management. age sops # Browsers ungoogled-chromium # Coms (webcord.override { electron = inputs.nixpkgs-electron-32.legacyPackages."aarch64-linux".electron; }) whatsie obs-studio # Dev tools flyctl pkgs-unstable.claude-code # AWS tools awscli2 (callPackage ../../nixos-modules/shell-apps/aws-cli-mfa.nix {}) ]; pointerCursor = { gtk.enable = true; x11.enable = true; hyprcursor.enable = true; name = "Posy_Cursor_Black"; package = pkgs."posy-cursors"; }; file = {} // yubikeyPublicKeyEntries; stateVersion = "25.05"; # Do not change!!! }; home.activation.aws-cli-mfa-config = lib.hm.dag.entryAfter ["writeBoundary"] '' mkdir -p ~/.config/aws-cli-mfa cat > ~/.config/aws-cli-mfa/config.yaml << EOF mfa_serial: $(cat ${config.sops.secrets."aws/jmug_ace_mfa_serial".path}) role_arn: $(cat ${config.sops.secrets."aws/role_arn".path}) session_duration: 43200 EOF ''; gtk = { enable = true; gtk3 = { extraConfig = { gtk-application-prefer-dark-theme = 1; }; }; gtk4 = { extraConfig = { gtk-application-prefer-dark-theme = 1; }; }; theme = { name = "palenight"; package = pkgs.palenight-theme; }; }; qt = { enable = true; platformTheme = "gtk"; }; dconf.settings = { "org/gnome/desktop/interface" = { color-scheme = "prefer-dark"; }; }; xdg.configFile = { "gtk-4.0/assets".source = "${config.gtk.theme.package}/share/themes/${config.gtk.theme.name}/gtk-4.0/assets"; "gtk-4.0/gtk.css".source = "${config.gtk.theme.package}/share/themes/${config.gtk.theme.name}/gtk-4.0/gtk.css"; "gtk-4.0/gtk-dark.css".source = "${config.gtk.theme.package}/share/themes/${config.gtk.theme.name}/gtk-4.0/gtk-dark.css"; }; programs.ssh = { enable = true; addKeysToAgent = "yes"; matchBlocks = { "git" = { host = "github.com"; user = "git"; identityFile = [ "/home/jmug/.ssh/id_yubikey" # Auto updated symlik that matches all yubikeys. "/home/jmug/.ssh/id_jmug" # Fallback key with passphrase. ]; }; "forgejo" = { host = "code.jmug.me"; user = "git"; identityFile = [ "/home/jmug/.ssh/id_yubikey" # Auto updated symlik that matches all yubikeys. "/home/jmug/.ssh/id_jmug" # Fallback key with passphrase. ]; }; wsl = { user = "jmug"; hostname = "192.168.10.241"; port = 69; forwardAgent = true; identityFile = [ "/home/jmug/.ssh/id_yubikey" # Auto updated symlik that matches all yubikeys. ]; }; ws = { user = "jmug"; hostname = "98.59.213.212"; port = 69; forwardAgent = true; identityFile = [ "/home/jmug/.ssh/id_yubikey" # Auto updated symlik that matches all yubikeys. ]; }; }; }; programs.zsh.shellAliases = { # TODO BEGIN Interpolate the name of the host here. # flakeconf = "sudo nvim /etc/nixos/flake.nix"; # nosconf = "sudo nvim /etc/nixos/hosts/devbox/configuration.nix"; # homeconf = "sudo nvim /etc/nixos/hosts/devbox/home.nix"; # nvconf = "sudo nvim /etc/nixos/home-modules/explicit-configs/nvim/init.lua"; # TODO END Interpolate the name of the host here. rshellconf = "source ~/.zshrc"; fly = "flyctl"; # TODO: Interpolate the name of the host here. nrsw = "sudo nixos-rebuild switch --flake /home/jmug/nixos#asahi"; # parametrize this as home dir. awsmfa = "eval $(aws-cli-mfa)"; uawsmfa = "eval $(aws-cli-mfa --unset)"; }; # Let Home Manager install and manage itself. programs.home-manager.enable = true; }