update and some gaming stuff

This commit is contained in:
Dmitriy Kholkin 2023-05-16 21:56:54 +03:00
parent 410783092b
commit e9cafecd13
8 changed files with 150 additions and 47 deletions

50
flake.lock generated
View File

@ -1,5 +1,26 @@
{ {
"nodes": { "nodes": {
"aagl": {
"inputs": {
"flake-compat": "flake-compat",
"nixpkgs": [
"nixpkgs"
]
},
"locked": {
"lastModified": 1683991514,
"narHash": "sha256-VPQD1EbTCCr+fBjucjhDDVqVsT9VlDMVXTD4nUU7tKM=",
"owner": "ezKEa",
"repo": "aagl-gtk-on-nix",
"rev": "3cdbeeb2b40d2035aa1beb61c515c38a27265d5b",
"type": "github"
},
"original": {
"owner": "ezKEa",
"repo": "aagl-gtk-on-nix",
"type": "github"
}
},
"arkenfox-userjs": { "arkenfox-userjs": {
"flake": false, "flake": false,
"locked": { "locked": {
@ -168,6 +189,22 @@
} }
}, },
"flake-compat_6": { "flake-compat_6": {
"flake": false,
"locked": {
"lastModified": 1673956053,
"narHash": "sha256-4gtG9iQuiKITOjNQQeQIpoIB6b16fm+504Ch3sNKLd8=",
"owner": "edolstra",
"repo": "flake-compat",
"rev": "35bb57c0c8d8b62bbfd284272c928ceb64ddbde9",
"type": "github"
},
"original": {
"owner": "edolstra",
"repo": "flake-compat",
"type": "github"
}
},
"flake-compat_7": {
"flake": false, "flake": false,
"locked": { "locked": {
"lastModified": 1668681692, "lastModified": 1668681692,
@ -543,7 +580,7 @@
}, },
"nix": { "nix": {
"inputs": { "inputs": {
"flake-compat": "flake-compat", "flake-compat": "flake-compat_2",
"lowdown-src": "lowdown-src", "lowdown-src": "lowdown-src",
"nixpkgs": "nixpkgs_3", "nixpkgs": "nixpkgs_3",
"nixpkgs-regression": "nixpkgs-regression" "nixpkgs-regression": "nixpkgs-regression"
@ -564,7 +601,7 @@
}, },
"nix-alien": { "nix-alien": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_2", "flake-compat": "flake-compat_3",
"flake-utils": "flake-utils_3", "flake-utils": "flake-utils_3",
"nix-index-database": "nix-index-database", "nix-index-database": "nix-index-database",
"nixpkgs": [ "nixpkgs": [
@ -627,7 +664,7 @@
}, },
"nix-vscode-marketplace": { "nix-vscode-marketplace": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_3", "flake-compat": "flake-compat_4",
"flake-utils": "flake-utils_5", "flake-utils": "flake-utils_5",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
@ -859,7 +896,7 @@
}, },
"pre-commit-hooks": { "pre-commit-hooks": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_5", "flake-compat": "flake-compat_6",
"flake-utils": [ "flake-utils": [
"prismlauncher", "prismlauncher",
"flake-utils" "flake-utils"
@ -887,7 +924,7 @@
}, },
"prismlauncher": { "prismlauncher": {
"inputs": { "inputs": {
"flake-compat": "flake-compat_4", "flake-compat": "flake-compat_5",
"flake-utils": "flake-utils_6", "flake-utils": "flake-utils_6",
"libnbtplusplus": "libnbtplusplus", "libnbtplusplus": "libnbtplusplus",
"nixpkgs": "nixpkgs_6", "nixpkgs": "nixpkgs_6",
@ -932,6 +969,7 @@
}, },
"root": { "root": {
"inputs": { "inputs": {
"aagl": "aagl",
"arkenfox-userjs": "arkenfox-userjs", "arkenfox-userjs": "arkenfox-userjs",
"base16": "base16", "base16": "base16",
"base16-tokyonight-scheme": "base16-tokyonight-scheme", "base16-tokyonight-scheme": "base16-tokyonight-scheme",
@ -977,7 +1015,7 @@
"simple-nixos-mailserver": { "simple-nixos-mailserver": {
"inputs": { "inputs": {
"blobs": "blobs", "blobs": "blobs",
"flake-compat": "flake-compat_6", "flake-compat": "flake-compat_7",
"nixpkgs": [ "nixpkgs": [
"nixpkgs" "nixpkgs"
], ],

View File

@ -15,6 +15,10 @@
inputs.nixpkgs.follows = "nixpkgs"; inputs.nixpkgs.follows = "nixpkgs";
}; };
impermanence.url = "github:AtaraxiaSjel/impermanence"; impermanence.url = "github:AtaraxiaSjel/impermanence";
aagl = {
url = "github:ezKEa/aagl-gtk-on-nix";
inputs.nixpkgs.follows = "nixpkgs";
};
arkenfox-userjs = { arkenfox-userjs = {
url = "github:arkenfox/user.js"; url = "github:arkenfox/user.js";
flake = false; flake = false;
@ -107,13 +111,14 @@
nixosRoles = import ./roles; nixosRoles = import ./roles;
sharedPatches = patchesPath [ sharedPatches = patchesPath [
"mullvad-exclude-containers.patch"
"ydotoold.patch"
"gitea-208605.patch" "gitea-208605.patch"
"waydroid-1.4.0.patch"
"ivpn-ui.patch" "ivpn-ui.patch"
"ivpn.patch"
"mullvad-exclude-containers.patch"
"vaultwarden.patch" "vaultwarden.patch"
"waydroid-1.4.0.patch"
"webhooks.patch" "webhooks.patch"
"ydotoold.patch"
]; ];
channelsConfig = { allowUnfree = true; }; channelsConfig = { allowUnfree = true; };
channels.unstable.input = nixpkgs; channels.unstable.input = nixpkgs;

View File

@ -7,7 +7,8 @@
# nixosProfiles.stable-diffusion # nixosProfiles.stable-diffusion
nixosProfiles.a2ln-server nixosProfiles.a2ln-server
nixosProfiles.cassowary nixosProfiles.cassowary
# nixosProfiles.sunshine nixosProfiles.hoyo
nixosProfiles.sunshine
]; ];
virtualisation.libvirt.guests = { virtualisation.libvirt.guests = {
@ -47,7 +48,7 @@
programs.nix-ld.enable = true; programs.nix-ld.enable = true;
secrets.files-veracrypt = {}; secrets.files-veracrypt = { };
environment.etc.crypttab = { environment.etc.crypttab = {
text = '' text = ''
files-veracrypt /dev/disk/by-partuuid/15fa11a1-a6d8-4962-9c03-74b209d7c46a /var/secrets/files-veracrypt tcrypt-veracrypt files-veracrypt /dev/disk/by-partuuid/15fa11a1-a6d8-4962-9c03-74b209d7c46a /var/secrets/files-veracrypt tcrypt-veracrypt

View File

@ -1,17 +1,6 @@
From 0683c927678c97d998d9363b1a0b997db5cabae3 Mon Sep 17 00:00:00 2001
From: Dmitriy Kholkin <ataraxiadev@ataraxiadev.com>
Date: Sun, 16 Apr 2023 22:24:20 +0300
Subject: [PATCH] ivpn-ui: init at 3.10.14
---
pkgs/tools/networking/ivpn-ui/default.nix | 103 ++++++++++++++++++++++
pkgs/top-level/all-packages.nix | 2 +
2 files changed, 105 insertions(+)
create mode 100644 pkgs/tools/networking/ivpn-ui/default.nix
diff --git a/pkgs/tools/networking/ivpn-ui/default.nix b/pkgs/tools/networking/ivpn-ui/default.nix diff --git a/pkgs/tools/networking/ivpn-ui/default.nix b/pkgs/tools/networking/ivpn-ui/default.nix
new file mode 100644 new file mode 100644
index 0000000000000..fcaae31d3d584 index 00000000000..7e787879e7c
--- /dev/null --- /dev/null
+++ b/pkgs/tools/networking/ivpn-ui/default.nix +++ b/pkgs/tools/networking/ivpn-ui/default.nix
@@ -0,0 +1,103 @@ @@ -0,0 +1,103 @@
@ -46,13 +35,13 @@ index 0000000000000..fcaae31d3d584
+ }; + };
+in buildNpmPackage' rec { +in buildNpmPackage' rec {
+ pname = "ivpn-ui"; + pname = "ivpn-ui";
+ version = "3.10.14"; + version = "3.10.23";
+ +
+ src = fetchFromGitHub { + src = fetchFromGitHub {
+ owner = "ivpn"; + owner = "ivpn";
+ repo = "desktop-app"; + repo = "desktop-app";
+ rev = "v${version}"; + rev = "v${version}";
+ hash = "sha256-zHBjAEVHjnHMuUutwQQCCcZ7+Fz3C4GCAV3/jgZgwhM="; + hash = "sha256-0XIATqidCQdERitYys7Gk0bENRZxdb/A9ieBNsWhbUM=";
+ }; + };
+ +
+ env = { + env = {
@ -63,7 +52,7 @@ index 0000000000000..fcaae31d3d584
+ }; + };
+ +
+ npmBuildScript = "electron:build"; + npmBuildScript = "electron:build";
+ npmDepsHash = "sha256-U7Jurq7Dv9oRZushf8yeHuqe3pKTBJ/9hpS/iQzIYkI="; + npmDepsHash = "sha256-DEXz/IsQG82f1PdlsabtaPKdj8XoweE121sZcqMZvPo=";
+ +
+ sourceRoot = "source/ui"; + sourceRoot = "source/ui";
+ +
@ -119,10 +108,10 @@ index 0000000000000..fcaae31d3d584
+ }; + };
+} +}
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index 73594265adf1e..dae1f0318a7f4 100644 index e42539e17f7..40f8c43bfa5 100644
--- a/pkgs/top-level/all-packages.nix --- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix
@@ -1558,6 +1558,8 @@ with pkgs; @@ -1593,6 +1593,8 @@ with pkgs;
inherit (callPackage ../tools/networking/ivpn/default.nix {}) ivpn ivpn-service; inherit (callPackage ../tools/networking/ivpn/default.nix {}) ivpn ivpn-service;

46
patches/ivpn.patch Normal file
View File

@ -0,0 +1,46 @@
From 13a0c99ff5bed75f1991169ff5757936f0e39747 Mon Sep 17 00:00:00 2001
From: Dmitriy Kholkin <ataraxiadev@ataraxiadev.com>
Date: Tue, 16 May 2023 17:59:58 +0300
Subject: [PATCH] ivpn{,-service}: 3.10.15 -> 3.10.23
---
pkgs/tools/networking/ivpn/default.nix | 8 ++++----
1 file changed, 4 insertions(+), 4 deletions(-)
diff --git a/pkgs/tools/networking/ivpn/default.nix b/pkgs/tools/networking/ivpn/default.nix
index e8e33f3bc73..fe5d673286e 100644
--- a/pkgs/tools/networking/ivpn/default.nix
+++ b/pkgs/tools/networking/ivpn/default.nix
@@ -15,13 +15,13 @@
builtins.mapAttrs (pname: attrs: buildGoModule (attrs // rec {
inherit pname;
- version = "3.10.15";
+ version = "3.10.23";
src = fetchFromGitHub {
owner = "ivpn";
repo = "desktop-app";
rev = "v${version}";
- hash = "sha256-3yVRVM98tVjot3gIkUb/CDwmwKdOOBjBjzGL6htDtpk=";
+ hash = "sha256-0XIATqidCQdERitYys7Gk0bENRZxdb/A9ieBNsWhbUM=";
};
ldflags = [
@@ -45,11 +45,11 @@ builtins.mapAttrs (pname: attrs: buildGoModule (attrs // rec {
})) {
ivpn = {
modRoot = "cli";
- vendorHash = "sha256-T49AE3SUmdP3Tu9Sp5C/QryKDto/NzEqRuUQ3+aJFL0=";
+ vendorHash = "sha256-aD4QOudazSrsg10c1m6xZUfPkw/aCxYKPxBR46KUVAk=";
};
ivpn-service = {
modRoot = "daemon";
- vendorHash = "sha256-9Rk6ruMpyWtQe+90kw4F8OLq7/JcDSrG6ufkfcrS4W8=";
+ vendorHash = "sha256-1bGh3Yvou+xnQvhj5T3Z3yq0agvk8BCUX+M83f+5qOg=";
nativeBuildInputs = [ makeWrapper ];
buildInputs = [ wirelesstools ];
--
2.40.1

View File

@ -0,0 +1,14 @@
{ inputs, config, lib, pkgs, ... }: {
imports = [ inputs.aagl.nixosModules.default ];
# programs.honkers-railway-launcher.enable = true;
networking.mihoyo-telemetry.block = true;
home-manager.users.${config.mainuser}.home.packages = [
inputs.aagl.packages.${pkgs.hostPlatform.system}.honkers-railway-launcher
];
persist.state.homeDirectories = [
".local/share/honkers-railway-launcher"
];
}

View File

@ -75,7 +75,7 @@ with config.deviceSpecific; {
gamescope gamescope
# goverlay # goverlay
lutris lutris
# moonlight-qt moonlight-qt
# reshade-shaders # reshade-shaders
# (retroarch.override { cores = [ libretro.genesis-plus-gx libretro.dosbox ]; }) # (retroarch.override { cores = [ libretro.genesis-plus-gx libretro.dosbox ]; })
# parsec # parsec

View File

@ -1,21 +1,31 @@
{ config, lib, pkgs, ... }: { { config, lib, pkgs, ... }: {
home-manager.users.${config.mainuser} = { boot.kernelModules = [ "uinput" ];
home.packages = [ pkgs.sunshine ];
systemd.user.services.sunshine = { services.udev.extraRules = ''
Unit.Description = "Sunshine is a Gamestream host for Moonlight."; KERNEL=="uinput", GROUP="input", MODE="0660" OPTIONS+="static_node=uinput"
Service.ExecStart = "${pkgs.sunshine}/bin/sunshine"; '';
Install.WantedBy = [ "graphical-session.target" ];
}; environment.systemPackages = [ pkgs.sunshine ];
};
networking.firewall = { security.wrappers.sunshine = {
allowedTCPPorts = [ owner = "root";
47984 47989 48010 group = "root";
47990 capabilities = "cap_sys_admin+p";
]; source = "${pkgs.sunshine}/bin/sunshine";
allowedUDPPorts = [
47998 47999 48000 48002 48010
];
}; };
persist.state.homeDirectories = [ ".config/sunshine "]; systemd.user.services.sunshine = {
} description = "sunshine";
wantedBy = [ "graphical-session.target" ];
serviceConfig = {
ExecStart = "${config.security.wrapperDir}/sunshine";
};
};
networking.firewall = {
allowedTCPPorts = [ 47984 47989 48010 47990 ];
allowedUDPPorts = [ 47998 47999 48000 48002 48010 ];
};
persist.state.homeDirectories = [ ".config/sunshine" ];
}