nixos 24.11

This commit is contained in:
Casper V. Kristensen 2024-12-04 00:34:25 +01:00
parent 5a3ced21b7
commit 8408c59b79
26 changed files with 166 additions and 202 deletions

View file

@ -137,7 +137,7 @@ nixos-install --no-root-passwd --flake .#omega
### Upgrading
Nixpkgs uses `stateVersion` so sparingly that auditing the entire nixpkgs repo
is [easy
enough](https://sourcegraph.com/search?q=context:global+repo:%5Egithub%5C.com/NixOS/nixpkgs%24+lang:Nix+stateVersion+AND+24.05&patternType=keyword&sm=0).
enough](https://sourcegraph.com/search?q=context:global+repo:%5Egithub%5C.com/NixOS/nixpkgs%24+lang:Nix+stateVersion+AND+24.11&patternType=keyword&sm=0).
Important changes to home-manager is available at
<https://nix-community.github.io/home-manager/release-notes.xhtml> and
<https://github.com/nix-community/home-manager/blob/master/modules/misc/news.nix>.

View file

@ -6,7 +6,7 @@
url = "git+ssh://git@git.caspervk.net/caspervk/nixos-secrets.git";
};
nixpkgs = {
url = "github:NixOS/nixpkgs/nixos-24.05";
url = "github:NixOS/nixpkgs/nixos-24.11";
};
nixpkgs-unstable = {
url = "github:NixOS/nixpkgs/nixos-unstable";
@ -32,7 +32,7 @@
inputs.nixpkgs.follows = "nixpkgs"; # use the same nixpkgs as the system
};
home-manager = {
url = "github:nix-community/home-manager/release-24.05";
url = "github:nix-community/home-manager/release-24.11";
inputs.nixpkgs.follows = "nixpkgs"; # use the same nixpkgs as the system
};
home-manager-unstable = {
@ -40,6 +40,7 @@
inputs.nixpkgs.follows = "nixpkgs"; # use the same nixpkgs as the system
};
simple-nixos-mailserver = {
# TODO: upgrade to 24.11
url = "gitlab:simple-nixos-mailserver/nixos-mailserver/nixos-24.05";
inputs.nixpkgs.follows = "nixpkgs"; # use the same nixpkgs as the system
};

View file

@ -29,7 +29,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -38,5 +38,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -13,14 +13,12 @@
"2a01:4f8:c2c:71c0::/64"
];
routes = [
{routeConfig = {Destination = "172.31.1.1";};}
{Destination = "172.31.1.1";}
{
routeConfig = {
Gateway = "172.31.1.1";
GatewayOnLink = true;
};
Gateway = "172.31.1.1";
GatewayOnLink = true;
}
{routeConfig = {Gateway = "fe80::1";};}
{Gateway = "fe80::1";}
];
# Enable proxy ARP to answer ARP requests for the floating IP addresses,
# intended for the wireguard peers, from Hetzner's router. Without this,
@ -42,14 +40,12 @@
};
wireguardPeers = [
{
wireguardPeerConfig = {
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Add to the main routing table that traffic for the address should
# be sent to sigma.
AllowedIPs = ["49.13.33.75/32"];
RouteTable = "main";
};
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Add to the main routing table that traffic for the address should
# be sent to sigma.
AllowedIPs = ["49.13.33.75/32"];
RouteTable = "main";
}
];
};
@ -71,12 +67,10 @@
};
wireguardPeers = [
{
wireguardPeerConfig = {
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
AllowedIPs = ["${secrets.hosts.alpha.sigma-p2p-ip-address}/32"];
RouteTable = "main";
};
PublicKey = "sigmaH/DKSU8KWyrPtucYmS2ewUvDvCNLxd/qYEo0n0=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
AllowedIPs = ["${secrets.hosts.alpha.sigma-p2p-ip-address}/32"];
RouteTable = "main";
}
];
};

View file

@ -25,7 +25,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -34,5 +34,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -11,14 +11,12 @@
"2a01:4f8:1c0c:70d1::1/64"
];
routes = [
{routeConfig = {Destination = "172.31.1.1";};}
{Destination = "172.31.1.1";}
{
routeConfig = {
Gateway = "172.31.1.1";
GatewayOnLink = true;
};
Gateway = "172.31.1.1";
GatewayOnLink = true;
}
{routeConfig = {Gateway = "fe80::1";};}
{Gateway = "fe80::1";}
];
};
};

View file

@ -27,7 +27,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -36,5 +36,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -26,7 +26,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -35,5 +35,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -54,8 +54,12 @@
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
# GPU
hardware.amdgpu.amdvlk = {
enable = true;
support32Bit.enable = true;
hardware.amdgpu = {
amdvlk = {
enable = true;
support32Bit.enable = true;
supportExperimental.enable = true;
};
opencl.enable = true;
};
}

View file

@ -39,7 +39,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -48,5 +48,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -46,8 +46,8 @@
# Only allow deluged internet access through wg-sigma-p2p. Note that this
# does not tell it to use the correct routing table. For proper internet
# access, the correct routing table is also configured by
# routingPolicyRuleConfig in networking.nix.
# access, the correct routing table is also configured by routingPolicyRules
# in networking.nix.
systemd.services.deluged = {
serviceConfig = {
RestrictNetworkInterfaces = "lo wg-sigma-p2p";

View file

@ -9,6 +9,8 @@
# https://wiki.nixos.org/wiki/Forgejo
services.forgejo = {
enable = true;
# NixOS defaults to forgejo-lts
package = pkgs.forgejo;
# Run Forgejo under git:git for better ssh clone urls.
user = "git";
group = "git";

View file

@ -82,7 +82,7 @@
# Only allow mail delivery through wg-sigma-public. Note that this does not
# tell it to use the correct routing table. For proper internet access, the
# correct routing table is also configured by routingPolicyRuleConfig in
# correct routing table is also configured by routingPolicyRules in
# networking.nix. lan0 is additionally allowed to enable mail submission from
# lan hosts.
systemd.services.postfix = {

View file

@ -51,16 +51,6 @@
};
};
# https://github.com/matrix-org/sliding-sync
services.matrix-sliding-sync = {
# Unlike matrix-synapse, sliding-sync has createDatabase=true by default,
# which means we don't have to configure the database in the postgres
# service manually.
enable = true;
settings.SYNCV3_SERVER = config.services.matrix-synapse.settings.public_baseurl;
environmentFile = config.age.secrets.matrix-sliding-sync-environment-file.path;
};
services.postgresql = {
ensureDatabases = [
# matrix-synapse expects the database to have the options `LC_COLLATE`
@ -91,11 +81,4 @@
}
];
};
age.secrets.matrix-sliding-sync-environment-file = {
file = "${secrets}/secrets/matrix-sliding-sync-environment-file.age";
mode = "400";
owner = "root";
group = "root";
};
}

View file

@ -71,26 +71,23 @@
};
wireguardPeers = [
{
wireguardPeerConfig = {
PublicKey = "AlphazUR/z+1DRCFSvxTeKPIJnyPQvYsDoSgESvqJhM=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Explicit IPv4 address of alpha.caspervk.net to avoid attempting
# to (re)connect through IPv6(??).
Endpoint = "116.203.179.206:51820";
# Keep NAT mappings and stateful firewalls open at the ISP
PersistentKeepalive = 25;
# AllowedIPs is both an ACL for incoming traffic, as well as a
# routing table specifying to which peer outgoing traffic should be
# sent. We want to allow incoming traffic from any address on the
# internet (routed through alpha), but only replies to this should
# be routed back over wireguard. Unlike if we had used NAT, IP
# routes are stateless, so we have no notion of "replies". Instead,
# we add these routes to a specific routing table and configure a
# routing policy rule to only use it for packets being sent as the
# public IP.
AllowedIPs = ["0.0.0.0/0"];
RouteTable = "wg-sigma-public";
};
PublicKey = "AlphazUR/z+1DRCFSvxTeKPIJnyPQvYsDoSgESvqJhM=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Explicit IPv4 address of alpha.caspervk.net to avoid attempting to
# (re)connect through IPv6(??).
Endpoint = "116.203.179.206:51820";
# Keep NAT mappings and stateful firewalls open at the ISP
PersistentKeepalive = 25;
# AllowedIPs is both an ACL for incoming traffic, as well as a
# routing table specifying to which peer outgoing traffic should be
# sent. We want to allow incoming traffic from any address on the
# internet (routed through alpha), but only replies to this should be
# routed back over wireguard. Unlike if we had used NAT, IP routes
# are stateless, so we have no notion of "replies". Instead, we add
# these routes to a specific routing table and configure a routing
# policy rule to only use it for packets being sent as the public IP.
AllowedIPs = ["0.0.0.0/0"];
RouteTable = "wg-sigma-public";
}
];
};
@ -102,30 +99,24 @@
# Allow hosts on the local network to contact us directly on the
# public address instead of routing the packet through Wireguard and
# back again.
routingPolicyRuleConfig = {
Priority = 10;
To = "192.168.0.0/24";
Table = "main";
};
Priority = 10;
To = "192.168.0.0/24";
Table = "main";
}
{
# The postfix systemd service has
# RestrictNetworkInterfaces=wg-sigma-public, but that does not tell
# it to use the correct routing table. You can check that this works
# as expected using `sudo -u postfix curl ip.caspervk.net`.
routingPolicyRuleConfig = {
Priority = 100;
User = config.services.postfix.user;
Table = "wg-sigma-public";
};
Priority = 100;
User = config.services.postfix.user;
Table = "wg-sigma-public";
}
{
# See the AllowedIPs comment above for why this is necessary
routingPolicyRuleConfig = {
Priority = 1000;
From = "49.13.33.75/32";
Table = "wg-sigma-public";
};
Priority = 1000;
From = "49.13.33.75/32";
Table = "wg-sigma-public";
}
];
};
@ -144,16 +135,14 @@
};
wireguardPeers = [
{
wireguardPeerConfig = {
PublicKey = "AlphazUR/z+1DRCFSvxTeKPIJnyPQvYsDoSgESvqJhM=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Explicit IPv4 address of alpha.caspervk.net to avoid attempting
# to (re)connect through IPv6(??).
Endpoint = "116.203.179.206:51821";
PersistentKeepalive = 25;
AllowedIPs = ["0.0.0.0/0"];
RouteTable = "wg-sigma-p2p";
};
PublicKey = "AlphazUR/z+1DRCFSvxTeKPIJnyPQvYsDoSgESvqJhM=";
PresharedKeyFile = config.age.secrets.wireguard-preshared-key-file.path;
# Explicit IPv4 address of alpha.caspervk.net to avoid attempting to
# (re)connect through IPv6(??).
Endpoint = "116.203.179.206:51821";
PersistentKeepalive = 25;
AllowedIPs = ["0.0.0.0/0"];
RouteTable = "wg-sigma-p2p";
}
];
};
@ -166,18 +155,14 @@
# RestrictNetworkInterfaces=wg-sigma-p2p, but that does not tell it
# to use the correct routing table. You can check that this works as
# expected using `sudo -u deluge curl ip.caspervk.net`.
routingPolicyRuleConfig = {
Priority = 100;
User = config.services.deluge.user;
Table = "wg-sigma-p2p";
};
Priority = 100;
User = config.services.deluge.user;
Table = "wg-sigma-p2p";
}
{
routingPolicyRuleConfig = {
Priority = 1000;
From = "${secrets.hosts.sigma.sigma-p2p-ip-address}/32";
Table = "wg-sigma-p2p";
};
Priority = 1000;
From = "${secrets.hosts.sigma.sigma-p2p-ip-address}/32";
Table = "wg-sigma-p2p";
}
];
};

View file

@ -5,6 +5,7 @@
services.postgresql = {
enable = true;
# https://nixos.org/manual/nixos/stable/#module-services-postgres-upgrading
# https://wiki.nixos.org/wiki/PostgreSQL#Major_upgrades
package = pkgs.postgresql_16;
};

View file

@ -24,26 +24,27 @@
# Disable discovery: don't reply to NetBIOS over IP name service requests
# or participate in the browsing protocols which make up the Windows
# “Network Neighborhood” view.
enableNmbd = false;
nmbd.enable = false;
# Disable Sambas winbindd, which provides a number of services to the Name
# Service Switch capability found in most modern C libraries, to arbitrary
# applications via PAM and ntlm_auth and to Samba itself.
enableWinbindd = false;
winbindd.enable = false;
# https://www.samba.org/samba/docs/current/man-html/smb.conf.5.html
extraConfig = ''
# Only allow local access. This should also be enforced by the firewall.
hosts deny ALL
hosts allow = 192.168.0.0/16 127.0.0.1 localhost
# Use user and group information from TDB database.
# The age-encrypted database is created by setting in the config
# > passdb backend = passdb backend = tdbsam:/tmp/samba-password-database
# and running
# > sudo pdbedit --create --user=caspervk
passdb backend = tdbsam:${config.age.secrets.samba-password-database.path}
# Allow Windows clients to run .exe's
acl allow execute always = True
'';
shares = {
settings = {
global = {
# Only allow local access. This should also be enforced by the
# firewall.
"hosts deny" = "ALL";
"hosts allow" = "192.168.0.0/16 127.0.0.1 localhost";
# Use user and group information from TDB database.
# The age-encrypted database is created by setting in the config
# > passdb backend = passdb backend = tdbsam:/tmp/samba-password-database
# and running
# > sudo pdbedit --create --user=caspervk
"passdb backend" = "tdbsam:${config.age.secrets.samba-password-database.path}";
# Allow Windows clients to run .exes
"acl allow execute always" = true;
};
downloads = {
path = "/srv/torrents/downloads";
# Use the 'torrent' group for access for all users connecting

View file

@ -18,6 +18,14 @@
group = "torrent";
};
# https://github.com/NixOS/nixpkgs/issues/360592
nixpkgs.config.permittedInsecurePackages = [
"aspnetcore-runtime-6.0.36"
"aspnetcore-runtime-wrapped-6.0.36"
"dotnet-sdk-6.0.428"
"dotnet-sdk-wrapped-6.0.428"
];
environment.persistence."/nix/persist" = {
directories = [
{

View file

@ -24,7 +24,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -33,5 +33,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -19,8 +19,8 @@
"2a0c:5700:3133:650:b0ea:eeff:fedb:1f7b/64"
];
routes = [
{routeConfig = {Gateway = "185.231.102.1";};}
{routeConfig = {Gateway = "fe80::200:5eff:fe00:20c";};}
{Gateway = "185.231.102.1";}
{Gateway = "fe80::200:5eff:fe00:20c";}
];
};
};

View file

@ -25,7 +25,7 @@
# this value at the release version of the first install of this system.
# Before changing this value read the documentation for this option
# (e.g. man configuration.nix or on https://nixos.org/nixos/options.html).
system.stateVersion = "24.05"; # Did you read the comment?
system.stateVersion = "24.11"; # Did you read the comment?
# This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage
@ -34,5 +34,5 @@
# You can update Home Manager without changing this value. See
# the Home Manager release notes for a list of state version
# changes in each release.
home-manager.users.caspervk.home.stateVersion = "24.05"; # Did you read the comment?
home-manager.users.caspervk.home.stateVersion = "24.11"; # Did you read the comment?
}

View file

@ -28,7 +28,7 @@
auto-optimise-store = true;
# Enable flakes
experimental-features = ["nix-command" "flakes" "repl-flake"];
experimental-features = ["nix-command" "flakes"];
# Timeout connections to the binary cache instead of waiting forever
connect-timeout = 5;

View file

@ -7,9 +7,6 @@
enable = true;
# Automatically `docker system prune` weekly
autoPrune.enable = true;
# Fix waiting for docker containers to exit on shutdown/reboot
# https://discourse.nixos.org/t/docker-hanging-on-reboot/18270/4
liveRestore = false;
};
# Being a member of the docker group is effectively equivalent to being root,

View file

@ -1,55 +1,53 @@
{home-manager, ...}: {
{...}: {
# Terminal emulator
# https://codeberg.org/dnkl/foot
home-manager.users.caspervk = {
programs.foot = {
enable = true;
# https://man.archlinux.org/man/foot.ini.5.en
settings = {
main = {
font = "monospace:size=10.25";
letter-spacing = "1";
};
scrollback = {
lines = 10000;
};
colors = {
# https://alacritty.org/config-alacritty.html
foreground = "d8d8d8";
background = "181818";
regular0 = "181818"; # black
regular1 = "ac4242"; # red
regular2 = "90a959"; # green
regular3 = "f4bf75"; # yellow
regular4 = "6a9fb5"; # blue
regular5 = "aa759f"; # magenta
regular6 = "75b5aa"; # cyan
regular7 = "d8d8d8"; # white
bright0 = "6b6b6b"; # black
bright1 = "c55555"; # red
bright2 = "aac474"; # green
bright3 = "feca88"; # yellow
bright4 = "82b8c8"; # blue
bright5 = "c28cb8"; # magenta
bright6 = "93d3c3"; # cyan
bright7 = "f8f8f8"; # white
dim0 = "0f0f0f"; # black
dim1 = "712b2b"; # red
dim2 = "5f6f3a"; # green
dim3 = "a17e4d"; # yellow
dim4 = "456877"; # blue
dim5 = "704d68"; # magenta
dim6 = "4d7770"; # cyan
dim7 = "8e8e8e"; # white
};
key-bindings = {
# HOW is this not the default?
scrollback-home = "Shift+Home";
scrollback-end = "Shift+End";
# Pipe last command's output to the clipboard. Requires fish
# integration, configured in modules/base/fish.nix.
pipe-command-output = "[wl-copy] Control+Shift+g";
};
programs.foot = {
enable = true;
# https://man.archlinux.org/man/foot.ini.5.en
settings = {
main = {
font = "monospace:size=10.25";
letter-spacing = "1";
};
scrollback = {
lines = 10000;
};
colors = {
# https://alacritty.org/config-alacritty.html
foreground = "d8d8d8";
background = "181818";
regular0 = "181818"; # black
regular1 = "ac4242"; # red
regular2 = "90a959"; # green
regular3 = "f4bf75"; # yellow
regular4 = "6a9fb5"; # blue
regular5 = "aa759f"; # magenta
regular6 = "75b5aa"; # cyan
regular7 = "d8d8d8"; # white
bright0 = "6b6b6b"; # black
bright1 = "c55555"; # red
bright2 = "aac474"; # green
bright3 = "feca88"; # yellow
bright4 = "82b8c8"; # blue
bright5 = "c28cb8"; # magenta
bright6 = "93d3c3"; # cyan
bright7 = "f8f8f8"; # white
dim0 = "0f0f0f"; # black
dim1 = "712b2b"; # red
dim2 = "5f6f3a"; # green
dim3 = "a17e4d"; # yellow
dim4 = "456877"; # blue
dim5 = "704d68"; # magenta
dim6 = "4d7770"; # cyan
dim7 = "8e8e8e"; # white
};
key-bindings = {
# HOW is this not the default?
scrollback-home = "Shift+Home";
scrollback-end = "Shift+End";
# Pipe last command's output to the clipboard. Requires fish
# integration, configured in modules/base/fish.nix.
pipe-command-output = "[wl-copy] Control+Shift+g";
};
};
};

View file

@ -1,7 +1,5 @@
{
home-manager,
lib,
nixpkgs,
pkgs,
...
}: {
@ -13,7 +11,6 @@
aspellDicts.da
aspellDicts.en
aspellDicts.en-computers
aspellDicts.en-science
black
element-desktop
firefox-wayland
@ -50,16 +47,12 @@
"steam"
"steam-original"
"steam-run"
"steam-unwrapped"
"terraform"
];
home-manager.users.caspervk = {
home.sessionVariables = {
# The firefox-wayland package works with wayland without any further
# configuration, but tor-browser doesn't.
# TODO: remove when tor browser is based on firefox v121.
# https://www.mozilla.org/en-US/firefox/121.0/releasenotes/
MOZ_ENABLE_WAYLAND = 1;
# https://wiki.archlinux.org/title/Sway#Java_applications
_JAVA_AWT_WM_NONREPARENTING = 1;
# https://wiki.nixos.org/wiki/Wayland

View file

@ -1,5 +1,4 @@
{
home-manager,
lib,
pkgs,
...