[General]: Update configuration to NixOS 23.05 beta

This commit is contained in:
Antoine Viallon 2023-05-25 11:38:51 +02:00
parent 786727693f
commit e7f7c9a669
Signed by: aviallon
GPG key ID: 186FC35EDEB25716
9 changed files with 46 additions and 27 deletions

View file

@ -209,7 +209,6 @@ in {
loader.grub.enable = cfg.useGrub;
loader.grub = {
version = 2;
device = mkIf cfg.efi "nodev";
efiSupport = cfg.efi;
configurationLimit = cfg.configurationLimit;

View file

@ -21,7 +21,7 @@ in {
description = "Ryujinx Switch emulator package";
type = myLib.types.package';
default = pkgs.unstable.ryujinx;
example = literalExample "pkgs.unstable.ryujinx";
example = literalExpression "pkgs.unstable.ryujinx";
};
};
};
@ -88,7 +88,6 @@ in {
};
programs.steam.package = pkgs.steam.override {
withJava = true;
extraPkgs = pkgs: [
pkgs.gamescope
];

View file

@ -56,11 +56,6 @@ in {
alsa.enable = true;
alsa.support32Bit = mkDefault true;
wireplumber.enable = true;
config.pipewire-pulse = {
"context.exec" = [
{ path = "pactl"; args = ''load-module module-combine-sink sink_name="Sorties combinées"''; }
];
};
};
environment.etc = {
"wireplumber/bluetooth.lua.d/51-bluez-config.lua".text = ''
@ -71,6 +66,16 @@ in {
["bluez5.headset-roles"] = "[ hsp_hs hsp_ag hfp_hf hfp_ag ]"
}
'';
"pipewire/pipewire-pulse.conf.d/combined-outputs.json".text = ''
{
"context.exec": [
{
"args": "load-module module-combine-sink sink_name=\"Sorties combinées\"",
"path": "pactl"
}
]
}
'';
};
security.rtkit.enable = true; # Real-time support for pipewire

View file

@ -34,7 +34,11 @@ in {
enable = true;
runUsingSystemd = true;
useQtScaling = true;
supportDDC = true;
# Removed in: https://github.com/NixOS/nixpkgs/pull/172078
# and: https://github.com/NixOS/nixpkgs/pull/221721
# Once this (https://invent.kde.org/plasma/powerdevil/-/issues/19) is solved, make PR to add it back (prehaps by default?)
# supportDDC = true;
};
systemd.tmpfiles.rules = mkAfter [

View file

@ -120,8 +120,8 @@ in
extraRules = concatStringsSep "\n" cfg.udevRules;
};
boot.tmpOnTmpfs = true;
boot.tmpOnTmpfsSize =
boot.tmp.useTmpfs = true;
boot.tmp.tmpfsSize =
let
hasSwap = length config.swapDevices > 0;
in

View file

@ -49,7 +49,7 @@ in
security.sudo.execWheelOnly = true;
services.openssh.permitRootLogin = "prohibit-password";
services.openssh.settings.PermitRootLogin = "prohibit-password";
security.apparmor.enable = true;
services.dbus.apparmor = "enabled";

View file

@ -1,4 +1,5 @@
{config, pkgs, options, lib, ...}:
with builtins;
with lib;
let
cfg = config.aviallon.overlays;
@ -89,21 +90,30 @@ in
jetbrains = prev.jetbrains // {
pycharm-professional-fhs = (
let
myIsDerivation = x:
let
tryX = tryEval x;
in
if tryX.success
then
isDerivation tryX.value
&& !(tryX.value.meta.insecure || tryX.value.meta.broken)
else false
;
unwrapped = final.jetbrains.pycharm-professional;
in prev.buildFHSUserEnv rec {
name = "pycharm-professional";
targetPkgs = pkgs: (with pkgs; [
glibc
targetPkgs = pkgs: (with pkgs;
[
glibc
bashInteractive
python3Full
python311
python310Full
python39Full
python38Full
python37Full
jetbrains.pycharm-professional
]);
python3Full
jetbrains.pycharm-professional
]
++ filter (x: myIsDerivation x) (attrValues pythonInterpreters)
);
# symlink shared assets, including icons and desktop entries
extraInstallCommands = ''

View file

@ -40,7 +40,7 @@ in {
package' = mkOption {
internal = true;
description = "Which base (unwrapped) LibreOffice package to use";
default = if cfg.qt then pkgs.libreoffice-qt.libreoffice else pkgs.libreoffice-unwrapped;
default = if cfg.qt then pkgs.libreoffice-qt.unwrapped else pkgs.libreoffice.unwrapped;
type = myLib.types.package';
};
};
@ -57,7 +57,7 @@ in {
}))
;
in pkgs.libreoffice.override {
libreoffice = applyOverrides overridesList cfg.package';
unwrapped = applyOverrides overridesList cfg.package';
};

View file

@ -48,8 +48,10 @@ in {
# Enable the OpenSSH daemon.
services.openssh = {
enable = true;
permitRootLogin = mkDefault "prohibit-password";
forwardX11 = mkDefault config.services.xserver.enable;
settings = {
X11Forwarding = mkDefault config.services.xserver.enable;
PermitRootLogin = mkDefault "prohibit-password";
};
openFirewall = true;
startWhenNeeded = true;
};