mirror of
https://github.com/aviallon/nixos-lib.git
synced 2026-04-05 17:27:50 +00:00
[General] fix compatibility with 22.11
This commit is contained in:
parent
38fb142e45
commit
97ab180e3b
8 changed files with 15 additions and 59 deletions
|
|
@ -209,7 +209,7 @@ in {
|
||||||
"spotify"
|
"spotify"
|
||||||
"spotify-unwrapped"
|
"spotify-unwrapped"
|
||||||
|
|
||||||
"steam" "steam-original" "steam-runtime"
|
"steam" "steam-original" "steam-runtime" "steam-run"
|
||||||
];
|
];
|
||||||
|
|
||||||
services.packagekit.enable = mkDefault (!generalCfg.minimal);
|
services.packagekit.enable = mkDefault (!generalCfg.minimal);
|
||||||
|
|
|
||||||
|
|
@ -34,15 +34,18 @@ in {
|
||||||
qemu = {
|
qemu = {
|
||||||
package = pkgs.qemu_full;
|
package = pkgs.qemu_full;
|
||||||
ovmf.enable = true;
|
ovmf.enable = true;
|
||||||
ovmf.package = pkgs.OVMFFull;
|
ovmf.packages = [ pkgs.OVMFFull ];
|
||||||
swtpm.enable = true;
|
swtpm.enable = true;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
virtualisation.spiceUSBRedirection.enable = true; # Quality of life
|
virtualisation.spiceUSBRedirection.enable = true; # Quality of life
|
||||||
security.virtualisation.flushL1DataCache = "never"; # We do not care, we are on a dev platform
|
security.virtualisation.flushL1DataCache = "never"; # We do not care, we are on a dev platform
|
||||||
|
|
||||||
virtualisation.virtualbox.host.enable = true;
|
virtualisation.virtualbox = {
|
||||||
virtualisation.virtualbox.host.enableExtensionPack = true;
|
host.enable = true;
|
||||||
|
host.enableExtensionPack = true;
|
||||||
|
host.enableHardening = false; # Causes kernel build failures
|
||||||
|
};
|
||||||
|
|
||||||
environment.extraOutputsToInstall = [
|
environment.extraOutputsToInstall = [
|
||||||
"doc" "info" "devdoc"
|
"doc" "info" "devdoc"
|
||||||
|
|
|
||||||
10
general.nix
10
general.nix
|
|
@ -138,18 +138,18 @@ in
|
||||||
|
|
||||||
environment.noXlibs = mkIf (cfg.minimal && (!desktopCfg.enable)) true;
|
environment.noXlibs = mkIf (cfg.minimal && (!desktopCfg.enable)) true;
|
||||||
|
|
||||||
nix.buildMachines = [
|
nix.buildMachines = []
|
||||||
(mkBuildMachine {
|
++ optional false (mkBuildMachine {
|
||||||
hostName = "luke-skywalker-nixos.local";
|
hostName = "luke-skywalker-nixos.local";
|
||||||
cores = 8;
|
cores = 8;
|
||||||
threads = 16;
|
threads = 16;
|
||||||
})
|
})
|
||||||
(mkBuildMachine {
|
++ optional false (mkBuildMachine {
|
||||||
hostName = "cachan.lesviallon.fr";
|
hostName = "cachan.lesviallon.fr";
|
||||||
cores = 6;
|
cores = 6;
|
||||||
threads = 6;
|
threads = 6;
|
||||||
})
|
})
|
||||||
];
|
;
|
||||||
|
|
||||||
programs.ssh.extraConfig = ''
|
programs.ssh.extraConfig = ''
|
||||||
Host cachan.lesviallon.fr
|
Host cachan.lesviallon.fr
|
||||||
|
|
@ -166,7 +166,7 @@ in
|
||||||
shell = pkgs.bashInteractive;
|
shell = pkgs.bashInteractive;
|
||||||
};
|
};
|
||||||
users.groups.builder = {};
|
users.groups.builder = {};
|
||||||
nix.trustedUsers = [ "builder" ];
|
nix.settings.trusted-users = [ "builder" ];
|
||||||
nix.distributedBuilds = mkDefault true;
|
nix.distributedBuilds = mkDefault true;
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
2
nix.nix
2
nix.nix
|
|
@ -21,7 +21,7 @@ in
|
||||||
nix.gc.automatic = mkDefault true;
|
nix.gc.automatic = mkDefault true;
|
||||||
nix.gc.dates = mkDefault "Monday,Wednesday,Friday,Sunday 03:00:00";
|
nix.gc.dates = mkDefault "Monday,Wednesday,Friday,Sunday 03:00:00";
|
||||||
nix.gc.randomizedDelaySec = "3h";
|
nix.gc.randomizedDelaySec = "3h";
|
||||||
nix.optimise.automatic = mkDefault (!config.nix.autoOptimiseStore);
|
nix.optimise.automatic = mkDefault (!config.nix.settings.auto-optimise-store);
|
||||||
nix.optimise.dates = mkDefault [ "Tuesday,Thursday,Saturday 03:00:00" ];
|
nix.optimise.dates = mkDefault [ "Tuesday,Thursday,Saturday 03:00:00" ];
|
||||||
nix.settings.auto-optimise-store = mkDefault true;
|
nix.settings.auto-optimise-store = mkDefault true;
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -117,7 +117,7 @@ in
|
||||||
};
|
};
|
||||||
trace = mkEnableOption "trace attributes in overriden derivations";
|
trace = mkEnableOption "trace attributes in overriden derivations";
|
||||||
blacklist = mkOption {
|
blacklist = mkOption {
|
||||||
default = [ "cmocka" "libkrb5" "libidn2" "tpm2-tss" ];
|
default = [ "cmocka" "libkrb5" "libidn2" "tpm2-tss" "libxcrypt" ];
|
||||||
example = [ "bash" ];
|
example = [ "bash" ];
|
||||||
description = "Blacklist specific packages from optimizations";
|
description = "Blacklist specific packages from optimizations";
|
||||||
type = types.listOf types.str;
|
type = types.listOf types.str;
|
||||||
|
|
@ -156,11 +156,6 @@ in
|
||||||
} super.htop;
|
} super.htop;
|
||||||
nano = optimizePkg {level = "unsafe"; recursive = 99; } super.nano;
|
nano = optimizePkg {level = "unsafe"; recursive = 99; } super.nano;
|
||||||
virtmanager = optimizePkg {} super.virtmanager;
|
virtmanager = optimizePkg {} super.virtmanager;
|
||||||
libsForQt5 = super.libsForQt5.overrideScope' (mself: msuper: {
|
|
||||||
plasma5 = msuper.plasma5.overrideScope' (mself: msuper: {
|
|
||||||
kwin = optimizePkg {level = "unsafe"; lto = true; } msuper.kwin;
|
|
||||||
});
|
|
||||||
});
|
|
||||||
#wayland = optimizePkg super.wayland;
|
#wayland = optimizePkg super.wayland;
|
||||||
})
|
})
|
||||||
];
|
];
|
||||||
|
|
|
||||||
41
overlays.nix
41
overlays.nix
|
|
@ -81,47 +81,6 @@ in
|
||||||
|
|
||||||
opensshOptimized = super.opensshOptimized or super.openssh;
|
opensshOptimized = super.opensshOptimized or super.openssh;
|
||||||
|
|
||||||
scribus = super.scribus.overrideAttrs (old: rec {
|
|
||||||
version = "1.5.8";
|
|
||||||
sha256 = "sha256-R4Fuj89tBXiP8WqkSZ+X/yJDHHd6d4kUmwqItFHha3Q=";
|
|
||||||
src = super.fetchurl {
|
|
||||||
url = "mirror://sourceforge/${old.pname}/${old.pname}-devel/${old.pname}-${version}.tar.xz";
|
|
||||||
inherit sha256;
|
|
||||||
};
|
|
||||||
patches = with super; [
|
|
||||||
# For Poppler 22.02
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://github.com/scribusproject/scribus/commit/85c0dff3422fa3c26fbc2e8d8561f597ec24bd92.patch";
|
|
||||||
sha256 = "YR0ii09EVU8Qazz6b8KAIWsUMTwPIwO8JuQPymAWKdw=";
|
|
||||||
})
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://github.com/scribusproject/scribus/commit/f19410ac3b27e33dd62105746784e61e85b90a1d.patch";
|
|
||||||
sha256 = "JHdgntYcioYatPeqpmym3c9dORahj0CinGOzbGtA4ds=";
|
|
||||||
})
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://github.com/scribusproject/scribus/commit/e013e8126d2100e8e56dea5b836ad43275429389.patch";
|
|
||||||
sha256 = "+siPNtJq9Is9V2PgADeQJB+b4lkl5g8uk6zKBu10Jqw=";
|
|
||||||
})
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://github.com/scribusproject/scribus/commit/48263954a7dee0be815b00f417ae365ab26cdd85.patch";
|
|
||||||
sha256 = "1WE9kALFw79bQH88NUafXaZ1Y/vJEKTIWxlk5c+opsQ=";
|
|
||||||
})
|
|
||||||
(fetchpatch {
|
|
||||||
url = "https://github.com/scribusproject/scribus/commit/f2237b8f0b5cf7690e864a22ef7a63a6d769fa36.patch";
|
|
||||||
sha256 = "FXpLoX/a2Jy3GcfzrUUyVUfEAp5wAy2UfzfVA5lhwJw=";
|
|
||||||
})
|
|
||||||
];
|
|
||||||
});
|
|
||||||
# chromium = self.ungoogled-chromium;
|
|
||||||
|
|
||||||
gccgo11 = super.wrapCC (super.gcc11.cc.override {
|
|
||||||
name = "gccgo11";
|
|
||||||
langCC = true;
|
|
||||||
langC = true;
|
|
||||||
langGo = true;
|
|
||||||
profiledCompiler = false;
|
|
||||||
});
|
|
||||||
gccgo = self.gccgo11;
|
|
||||||
|
|
||||||
xwayland = super.xwayland.overrideAttrs (old: {
|
xwayland = super.xwayland.overrideAttrs (old: {
|
||||||
buildInputs = old.buildInputs or [] ++ [ super.makeWrapper ];
|
buildInputs = old.buildInputs or [] ++ [ super.makeWrapper ];
|
||||||
|
|
|
||||||
|
|
@ -13,7 +13,6 @@ let
|
||||||
prefs
|
prefs
|
||||||
);
|
);
|
||||||
in pkgs.wrapFirefox pkgs.firefox-esr-unwrapped {
|
in pkgs.wrapFirefox pkgs.firefox-esr-unwrapped {
|
||||||
forceWayland = true;
|
|
||||||
cfg = {
|
cfg = {
|
||||||
smartcardSupport = true;
|
smartcardSupport = true;
|
||||||
pipewireSupport = true;
|
pipewireSupport = true;
|
||||||
|
|
|
||||||
|
|
@ -139,7 +139,7 @@ in {
|
||||||
Storage = "volatile";
|
Storage = "volatile";
|
||||||
};
|
};
|
||||||
|
|
||||||
services.ananicy.enable = true;
|
services.ananicy.enable = false;
|
||||||
services.ananicy.package = pkgs.ananicy-cpp;
|
services.ananicy.package = pkgs.ananicy-cpp;
|
||||||
services.ananicy.settings = {
|
services.ananicy.settings = {
|
||||||
loglevel = "info";
|
loglevel = "info";
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue