-{ lib, config, nixosConfig, ... }:
+{
+ pkgs,
+ lib,
+ config,
+ nixosConfig,
+ ...
+}:
{
/*
home.activation.gnupg = lib.hm.dag.entryAfter ["writeBoundary"] ''
enable = true;
enableSshSupport = true;
enableExtraSocket = true;
- pinentryFlavor = lib.mkDefault (if nixosConfig.services.xserver.enable then "gtk2" else "curses");
+ pinentryPackage = lib.mkDefault (
+ if nixosConfig.services.xserver.enable then pkgs.pinentry-gtk2 else pkgs.pinentry-curses
+ );
};
programs.gpg.enable = true;
programs.gpg.settings = {
};
home.file."${config.programs.gpg.homedir}/dirmngr.conf".text = ''
allow-ocsp
- hkp-cacert ${gnupg/keyserver.pem}
- keyserver hkps://keys.mayfirst.org
+ keyserver hkps://keys.openpgp.org
#use-tor
#log-file dirmngr.log
#standard-resolver
'';
+ home.packages = lib.mkIf config.programs.gpg.enable [
+ (pkgs.pass.withExtensions (
+ ext: with ext; [
+ pass-audit
+ pass-checkup
+ #pass-file
+ pass-genphrase
+ pass-import
+ pass-otp
+ pass-tomb
+ pass-update
+ ]
+ ))
+ ];
}