feat: enabled fcitx5 configuration with RIME configured

refactored configuration values in nixos/configuration.nix
This commit is contained in:
Zhongheng Liu 2024-08-11 19:44:43 +08:00
commit 170f232750
No known key found for this signature in database

View file

@ -15,13 +15,27 @@
./services/laptop.preset.nix ./services/laptop.preset.nix
./hardware-configuration.nix ./hardware-configuration.nix
]; ];
boot.kernelPackages = pkgs.linuxPackages_latest;
boot.supportedFilesystems = ["ntfs"];
security.pam.services.hyprlock = {}; security.pam.services.hyprlock = {};
i18n.inputMethod = {
enabled = "fcitx5";
fcitx5.addons = with pkgs; [
fcitx5-mozc
fcitx5-gtk
fcitx5-rime
fcitx5-chinese-addons
];
#enabled = "ibus";
#ibus.engines = with pkgs.ibus-engines; [rime];
};
hardware.bluetooth = { hardware.bluetooth = {
enable = true; enable = true;
powerOnBoot = true; powerOnBoot = true;
}; };
networking.proxy = {
default = "http://127.0.0.1:7897/";
noProxy = "127.0.0.1,localhost,internal.domain";
};
systemd.user.services.mpris-proxy = { systemd.user.services.mpris-proxy = {
description = "Mpris proxy"; description = "Mpris proxy";
after = ["network.target" "sound.target"]; after = ["network.target" "sound.target"];
@ -30,12 +44,18 @@
}; };
programs.steam = { programs.steam = {
enable = true; enable = true;
remotePlay.openFirewall = true; # Open ports in the firewall for Steam Remote Play remotePlay.openFirewall =
dedicatedServer.openFirewall = true; # Open ports in the firewall for Source Dedicated Server true; # Open ports in the firewall for Steam Remote Play
localNetworkGameTransfers.openFirewall = true; # Open ports in the firewall for Steam Local Network Game Transfers dedicatedServer.openFirewall =
true; # Open ports in the firewall for Source Dedicated Server
localNetworkGameTransfers.openFirewall =
true; # Open ports in the firewall for Steam Local Network Game Transfers
}; };
boot.loader = { boot = {
kernelPackages = pkgs.linuxPackages_latest;
supportedFilesystems = ["ntfs"];
loader = {
efi.canTouchEfiVariables = true; efi.canTouchEfiVariables = true;
grub = { grub = {
enable = true; enable = true;
@ -53,31 +73,32 @@
''; '';
}; };
}; };
services.displayManager.sddm = { };
security.polkit.enable = true;
services = {
displayManager.sddm = {
enable = true; enable = true;
wayland.enable = true; wayland.enable = true;
}; };
#systemd.user.services.kanshi = { automatic-timezoned.enable = true;
# description = "kanshi daemon"; openssh = {
# serviceConfig = { enable = true;
# Type = "simple"; settings = {
# ExecStart = ''${pkgs.kanshi}/bin/kanshi -c kanshi_config_file''; PermitRootLogin = "no";
# }; PasswordAuthentication = false;
#}; };
};
security.polkit.enable = true; gnome.gnome-keyring.enable = true;
services.gnome.gnome-keyring.enable = true; };
#programs.sway = { #programs.sway = {
# enable = true; # enable = true;
# wrapperFeatures.gtk = true; # wrapperFeatures.gtk = true;
#}; #};
programs.hyprland.enable = true; # enables Hyprland DM. programs.hyprland.enable = true; # enables Hyprland DM.
nixpkgs = { nixpkgs = {
overlays = [ overlays = [];
]; config = {allowUnfree = true;};
config = {
allowUnfree = true;
};
}; };
nix = let nix = let
@ -100,22 +121,11 @@
"${config.myUserName}" = { "${config.myUserName}" = {
initialPassword = "stevenpassword"; initialPassword = "stevenpassword";
isNormalUser = true; isNormalUser = true;
openssh.authorizedKeys.keys = [ openssh.authorizedKeys.keys = [];
]; packages = with pkgs; [nh];
packages = with pkgs; [ extraGroups = ["wheel" "input" "networkmanager"];
nh
];
extraGroups = ["wheel" "input"];
}; };
}; };
services.openssh = {
enable = true;
settings = {
PermitRootLogin = "no";
PasswordAuthentication = false;
};
};
services.automatic-timezoned.enable = true;
# https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion # https://nixos.wiki/wiki/FAQ/When_do_I_update_stateVersion
system.stateVersion = "24.05"; system.stateVersion = "24.05";
} }