{ inputs, config, pkgs, ... }:
let
    scripts = {
        disk_check = import ./utils/disk_check.nix { inherit pkgs; };
        vdirsyncer = {
            when = "*:0/15";
            script = toString (pkgs.writeShellScript "script" '' ${pkgs.vdirsyncer}/bin/vdirsyncer sync imec/pair '');
        };
        mbsync = {
            when = "*-*-* 00:00:00";
            script = toString (pkgs.writeShellScript "script" ''
                BASEDIR=/home/server/Containers/mbsync
                # python3 $BASEDIR/config/oauth2/mutt_oauth2.py $BASEDIR/data/oauth2/credentials.json
                docker exec --user "1000:1000" mbsync-container /home/user/.config/mbsync/run.sh -a
                ${pkgs.notmuch}/bin/notmuch new
            '');
        };
        sync_vault = {
            when = "*-*-* 02:00:00";
            script = toString (pkgs.writeShellScript "script" ''
                source $HOME/.secrets/Backup/env.sh
                for _ in {1..2}; do
                    OUTPUT=$(echo "$ZFS_PASSPHRASE" | ssh 10.4.0.1 zfs load-key Vault/Thomas/Encrypted  2>&1);
                    if [ "$OUTPUT" == "Key load error: Key already loaded for 'Vault/Thomas/Encrypted'." ]; then
                        echo "Key successfully loaded, starting syncoid"
                        syncoid --no-privilege-elevation --no-sync-snap tank/Storage/Thomas/Workspace 10.4.0.1:Vault/Thomas/Encrypted/Storage/Workspace
                        syncoid --no-privilege-elevation --no-sync-snap tank/Storage/Thomas 10.4.0.1:Vault/Thomas/Encrypted/Storage/T
                        syncoid --no-privilege-elevation --no-sync-snap tank/Storage/Niels 10.4.0.1:Vault/Thomas/Encrypted/Storage/N
                        syncoid --no-privilege-elevation --no-sync-snap tank/Storage/Yolande 10.4.0.1:Vault/Thomas/Encrypted/Storage/Y
                        syncoid --no-privilege-elevation --no-sync-snap tank/Containers 10.4.0.1:Vault/Thomas/Encrypted/Containers
                        ssh 10.4.0.1 zfs unload-key Vault/Thomas/Encrypted
                        ${pkgs.curl}/bin/curl https://uptime.thomasave.be/api/push/s39pIIrB0R
                        exit 0
                    fi
                done

                echo "Found output instead: $OUTPUT"
                echo "Failed to load key: $OUTPUT" | sendmail
                exit 1
                '');
                };
        backup = {
            when = "*-*-* 04:00:00";
            script = toString (pkgs.writeShellScript "script" ''
                ${./scripts/files/backup.sh}
                ${pkgs.curl}/bin/curl https://uptime.thomasave.be/api/push/R6iJcWqGp0
            '');
        };
    };
in
    {
    home.username = "server";
    home.homeDirectory = "/home/server";
    nix = {
        package = pkgs.nix;
        settings.use-xdg-base-directories = true;
    };

    xdg.enable = true;

    imports = [
        (import ./utils/common.nix { inherit inputs config pkgs; })
        (import ./utils/services.nix { inherit pkgs; scripts = scripts; })
        ./ssh
    ];
    programs.ssh.matchBlocks."*".identityFile = "/home/server/.secrets/SSH/Mallorea/id_ed25519";

    home.sessionVariables = {
        NIX_PATH = "${config.xdg.stateHome}/nix/profiles/channels/";
        LANG = "en_US.UTF-8";
        XDG_RUNTIME_DIR = "/run/user/$(id -u)";
    };

    programs.zsh.initExtra = pkgs.lib.mkForce ''
      LOCAL_SEARCH_DIRS=(~/.dotfiles/ ~/Containers ~/Workspace ~/Storage/Thomas ~/Storage/Shared)
      REMOTE_SEARCH_DIRS=()
    '';
}