diff --git a/flake.lock b/flake.lock index b53cfba..a7e3d0d 100644 --- a/flake.lock +++ b/flake.lock @@ -594,17 +594,17 @@ }, "nixpkgs_7": { "locked": { - "lastModified": 1623580589, - "narHash": "sha256-Ayp1cjXpwFCkAiWUE46rj9APTltsiEBdIs2+cj+U7+c=", + "lastModified": 1624024598, + "narHash": "sha256-X++38oH5MKEmPW4/2WdMaHQvwJzO8pJfbnzMD7DbG1E=", "owner": "nixos", "repo": "nixpkgs", - "rev": "fa0326ce5233f7d592271df52c9d0812bec47b84", + "rev": "33d42ad7cf2769ce6364ed4e52afa8e9d1439d58", "type": "github" }, "original": { "owner": "nixos", "repo": "nixpkgs", - "rev": "fa0326ce5233f7d592271df52c9d0812bec47b84", + "rev": "33d42ad7cf2769ce6364ed4e52afa8e9d1439d58", "type": "github" } }, diff --git a/flake.nix b/flake.nix index 676cdb8..04e3553 100644 --- a/flake.nix +++ b/flake.nix @@ -6,7 +6,7 @@ # https://status.nixos.org/ # # This ensures that we always use the official # cache. - nixpkgs.url = "github:nixos/nixpkgs/fa0326ce5233f7d592271df52c9d0812bec47b84"; + nixpkgs.url = "github:nixos/nixpkgs/33d42ad7cf2769ce6364ed4e52afa8e9d1439d58"; nixos-hardware.url = github:NixOS/nixos-hardware/master; home-manager.url = "github:nix-community/home-manager"; diff --git a/hosts/p71.nix b/hosts/p71.nix index 76fcd12..fecca5c 100644 --- a/hosts/p71.nix +++ b/hosts/p71.nix @@ -30,6 +30,9 @@ # high-resolution display hardware.video.hidpi.enable = lib.mkDefault true; + hardware.pulseaudio.enable = true; + hardware.pulseaudio.support32Bit = true; ## If compatibility with 32-bit applications is desired. + # Use the systemd-boot EFI boot loader. boot.loader.systemd-boot.enable = true; @@ -86,7 +89,7 @@ brave fzf # gnome3.gnome-tweaks - google-chrome + # google-chrome htop mpv nodejs-14_x # Need this for https://nixos.wiki/wiki/Vscode @@ -95,12 +98,13 @@ ripgrep signal-desktop vscode + pulsemixer ]; # Define a user account. Don't forget to set a password with ‘passwd’. users.users.srid = { isNormalUser = true; - extraGroups = [ "wheel" "networkmanager" "adbusers" ]; + extraGroups = [ "wheel" "networkmanager" "adbusers" "audio" ]; }; # Open ports in the firewall. # networking.firewall.allowedTCPPorts = [ ... ];