mirror of
https://github.com/aviallon/nixos-lib.git
synced 2026-04-06 01:38:06 +00:00
[General]: Update configuration to NixOS 23.05 beta
This commit is contained in:
parent
786727693f
commit
e7f7c9a669
9 changed files with 46 additions and 27 deletions
1
boot.nix
1
boot.nix
|
|
@ -209,7 +209,6 @@ in {
|
||||||
|
|
||||||
loader.grub.enable = cfg.useGrub;
|
loader.grub.enable = cfg.useGrub;
|
||||||
loader.grub = {
|
loader.grub = {
|
||||||
version = 2;
|
|
||||||
device = mkIf cfg.efi "nodev";
|
device = mkIf cfg.efi "nodev";
|
||||||
efiSupport = cfg.efi;
|
efiSupport = cfg.efi;
|
||||||
configurationLimit = cfg.configurationLimit;
|
configurationLimit = cfg.configurationLimit;
|
||||||
|
|
|
||||||
|
|
@ -21,7 +21,7 @@ in {
|
||||||
description = "Ryujinx Switch emulator package";
|
description = "Ryujinx Switch emulator package";
|
||||||
type = myLib.types.package';
|
type = myLib.types.package';
|
||||||
default = pkgs.unstable.ryujinx;
|
default = pkgs.unstable.ryujinx;
|
||||||
example = literalExample "pkgs.unstable.ryujinx";
|
example = literalExpression "pkgs.unstable.ryujinx";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -88,7 +88,6 @@ in {
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.steam.package = pkgs.steam.override {
|
programs.steam.package = pkgs.steam.override {
|
||||||
withJava = true;
|
|
||||||
extraPkgs = pkgs: [
|
extraPkgs = pkgs: [
|
||||||
pkgs.gamescope
|
pkgs.gamescope
|
||||||
];
|
];
|
||||||
|
|
|
||||||
|
|
@ -56,11 +56,6 @@ in {
|
||||||
alsa.enable = true;
|
alsa.enable = true;
|
||||||
alsa.support32Bit = mkDefault true;
|
alsa.support32Bit = mkDefault true;
|
||||||
wireplumber.enable = true;
|
wireplumber.enable = true;
|
||||||
config.pipewire-pulse = {
|
|
||||||
"context.exec" = [
|
|
||||||
{ path = "pactl"; args = ''load-module module-combine-sink sink_name="Sorties combinées"''; }
|
|
||||||
];
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
environment.etc = {
|
environment.etc = {
|
||||||
"wireplumber/bluetooth.lua.d/51-bluez-config.lua".text = ''
|
"wireplumber/bluetooth.lua.d/51-bluez-config.lua".text = ''
|
||||||
|
|
@ -71,6 +66,16 @@ in {
|
||||||
["bluez5.headset-roles"] = "[ hsp_hs hsp_ag hfp_hf hfp_ag ]"
|
["bluez5.headset-roles"] = "[ hsp_hs hsp_ag hfp_hf hfp_ag ]"
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
|
"pipewire/pipewire-pulse.conf.d/combined-outputs.json".text = ''
|
||||||
|
{
|
||||||
|
"context.exec": [
|
||||||
|
{
|
||||||
|
"args": "load-module module-combine-sink sink_name=\"Sorties combinées\"",
|
||||||
|
"path": "pactl"
|
||||||
|
}
|
||||||
|
]
|
||||||
|
}
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
security.rtkit.enable = true; # Real-time support for pipewire
|
security.rtkit.enable = true; # Real-time support for pipewire
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -34,7 +34,11 @@ in {
|
||||||
enable = true;
|
enable = true;
|
||||||
runUsingSystemd = true;
|
runUsingSystemd = true;
|
||||||
useQtScaling = true;
|
useQtScaling = true;
|
||||||
supportDDC = true;
|
|
||||||
|
# Removed in: https://github.com/NixOS/nixpkgs/pull/172078
|
||||||
|
# and: https://github.com/NixOS/nixpkgs/pull/221721
|
||||||
|
# Once this (https://invent.kde.org/plasma/powerdevil/-/issues/19) is solved, make PR to add it back (prehaps by default?)
|
||||||
|
# supportDDC = true;
|
||||||
};
|
};
|
||||||
|
|
||||||
systemd.tmpfiles.rules = mkAfter [
|
systemd.tmpfiles.rules = mkAfter [
|
||||||
|
|
|
||||||
|
|
@ -120,8 +120,8 @@ in
|
||||||
extraRules = concatStringsSep "\n" cfg.udevRules;
|
extraRules = concatStringsSep "\n" cfg.udevRules;
|
||||||
};
|
};
|
||||||
|
|
||||||
boot.tmpOnTmpfs = true;
|
boot.tmp.useTmpfs = true;
|
||||||
boot.tmpOnTmpfsSize =
|
boot.tmp.tmpfsSize =
|
||||||
let
|
let
|
||||||
hasSwap = length config.swapDevices > 0;
|
hasSwap = length config.swapDevices > 0;
|
||||||
in
|
in
|
||||||
|
|
|
||||||
|
|
@ -49,7 +49,7 @@ in
|
||||||
|
|
||||||
security.sudo.execWheelOnly = true;
|
security.sudo.execWheelOnly = true;
|
||||||
|
|
||||||
services.openssh.permitRootLogin = "prohibit-password";
|
services.openssh.settings.PermitRootLogin = "prohibit-password";
|
||||||
|
|
||||||
security.apparmor.enable = true;
|
security.apparmor.enable = true;
|
||||||
services.dbus.apparmor = "enabled";
|
services.dbus.apparmor = "enabled";
|
||||||
|
|
|
||||||
24
overlays.nix
24
overlays.nix
|
|
@ -1,4 +1,5 @@
|
||||||
{config, pkgs, options, lib, ...}:
|
{config, pkgs, options, lib, ...}:
|
||||||
|
with builtins;
|
||||||
with lib;
|
with lib;
|
||||||
let
|
let
|
||||||
cfg = config.aviallon.overlays;
|
cfg = config.aviallon.overlays;
|
||||||
|
|
@ -89,21 +90,30 @@ in
|
||||||
jetbrains = prev.jetbrains // {
|
jetbrains = prev.jetbrains // {
|
||||||
pycharm-professional-fhs = (
|
pycharm-professional-fhs = (
|
||||||
let
|
let
|
||||||
|
myIsDerivation = x:
|
||||||
|
let
|
||||||
|
tryX = tryEval x;
|
||||||
|
in
|
||||||
|
if tryX.success
|
||||||
|
then
|
||||||
|
isDerivation tryX.value
|
||||||
|
&& !(tryX.value.meta.insecure || tryX.value.meta.broken)
|
||||||
|
else false
|
||||||
|
;
|
||||||
unwrapped = final.jetbrains.pycharm-professional;
|
unwrapped = final.jetbrains.pycharm-professional;
|
||||||
in prev.buildFHSUserEnv rec {
|
in prev.buildFHSUserEnv rec {
|
||||||
name = "pycharm-professional";
|
name = "pycharm-professional";
|
||||||
targetPkgs = pkgs: (with pkgs; [
|
targetPkgs = pkgs: (with pkgs;
|
||||||
|
[
|
||||||
glibc
|
glibc
|
||||||
|
bashInteractive
|
||||||
|
|
||||||
python3Full
|
python3Full
|
||||||
python311
|
|
||||||
python310Full
|
|
||||||
python39Full
|
|
||||||
python38Full
|
|
||||||
python37Full
|
|
||||||
|
|
||||||
jetbrains.pycharm-professional
|
jetbrains.pycharm-professional
|
||||||
]);
|
]
|
||||||
|
++ filter (x: myIsDerivation x) (attrValues pythonInterpreters)
|
||||||
|
);
|
||||||
|
|
||||||
# symlink shared assets, including icons and desktop entries
|
# symlink shared assets, including icons and desktop entries
|
||||||
extraInstallCommands = ''
|
extraInstallCommands = ''
|
||||||
|
|
|
||||||
|
|
@ -40,7 +40,7 @@ in {
|
||||||
package' = mkOption {
|
package' = mkOption {
|
||||||
internal = true;
|
internal = true;
|
||||||
description = "Which base (unwrapped) LibreOffice package to use";
|
description = "Which base (unwrapped) LibreOffice package to use";
|
||||||
default = if cfg.qt then pkgs.libreoffice-qt.libreoffice else pkgs.libreoffice-unwrapped;
|
default = if cfg.qt then pkgs.libreoffice-qt.unwrapped else pkgs.libreoffice.unwrapped;
|
||||||
type = myLib.types.package';
|
type = myLib.types.package';
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
@ -57,7 +57,7 @@ in {
|
||||||
}))
|
}))
|
||||||
;
|
;
|
||||||
in pkgs.libreoffice.override {
|
in pkgs.libreoffice.override {
|
||||||
libreoffice = applyOverrides overridesList cfg.package';
|
unwrapped = applyOverrides overridesList cfg.package';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -48,8 +48,10 @@ in {
|
||||||
# Enable the OpenSSH daemon.
|
# Enable the OpenSSH daemon.
|
||||||
services.openssh = {
|
services.openssh = {
|
||||||
enable = true;
|
enable = true;
|
||||||
permitRootLogin = mkDefault "prohibit-password";
|
settings = {
|
||||||
forwardX11 = mkDefault config.services.xserver.enable;
|
X11Forwarding = mkDefault config.services.xserver.enable;
|
||||||
|
PermitRootLogin = mkDefault "prohibit-password";
|
||||||
|
};
|
||||||
openFirewall = true;
|
openFirewall = true;
|
||||||
startWhenNeeded = true;
|
startWhenNeeded = true;
|
||||||
};
|
};
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue