mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-24 16:03:23 +00:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
199 lines
6.3 KiB
Nix
199 lines
6.3 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.programs.steam;
|
|
gamescopeCfg = config.programs.gamescope;
|
|
|
|
steam-gamescope = let
|
|
exports = builtins.attrValues (builtins.mapAttrs (n: v: "export ${n}=${v}") cfg.gamescopeSession.env);
|
|
in
|
|
pkgs.writeShellScriptBin "steam-gamescope" ''
|
|
${builtins.concatStringsSep "\n" exports}
|
|
gamescope --steam ${toString cfg.gamescopeSession.args} -- steam -tenfoot -pipewire-dmabuf
|
|
'';
|
|
|
|
gamescopeSessionFile =
|
|
(pkgs.writeTextDir "share/wayland-sessions/steam.desktop" ''
|
|
[Desktop Entry]
|
|
Name=Steam
|
|
Comment=A digital distribution platform
|
|
Exec=${steam-gamescope}/bin/steam-gamescope
|
|
Type=Application
|
|
'').overrideAttrs (_: { passthru.providedSessions = [ "steam" ]; });
|
|
in {
|
|
options.programs.steam = {
|
|
enable = mkEnableOption "steam";
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default = pkgs.steam;
|
|
defaultText = literalExpression "pkgs.steam";
|
|
example = literalExpression ''
|
|
pkgs.steam-small.override {
|
|
extraEnv = {
|
|
MANGOHUD = true;
|
|
OBS_VKCAPTURE = true;
|
|
RADV_TEX_ANISO = 16;
|
|
};
|
|
extraLibraries = p: with p; [
|
|
atk
|
|
];
|
|
}
|
|
'';
|
|
apply = steam: steam.override (prev: {
|
|
extraEnv = (lib.optionalAttrs (cfg.extraCompatPackages != [ ]) {
|
|
STEAM_EXTRA_COMPAT_TOOLS_PATHS = makeSearchPathOutput "steamcompattool" "" cfg.extraCompatPackages;
|
|
}) // (optionalAttrs cfg.extest.enable {
|
|
LD_PRELOAD = "${pkgs.pkgsi686Linux.extest}/lib/libextest.so";
|
|
}) // (prev.extraEnv or {});
|
|
extraLibraries = pkgs: let
|
|
prevLibs = if prev ? extraLibraries then prev.extraLibraries pkgs else [ ];
|
|
additionalLibs = with config.hardware.opengl;
|
|
if pkgs.stdenv.hostPlatform.is64bit
|
|
then [ package ] ++ extraPackages
|
|
else [ package32 ] ++ extraPackages32;
|
|
in prevLibs ++ additionalLibs;
|
|
} // optionalAttrs (cfg.gamescopeSession.enable && gamescopeCfg.capSysNice)
|
|
{
|
|
buildFHSEnv = pkgs.buildFHSEnv.override {
|
|
# use the setuid wrapped bubblewrap
|
|
bubblewrap = "${config.security.wrapperDir}/..";
|
|
};
|
|
});
|
|
description = ''
|
|
The Steam package to use. Additional libraries are added from the system
|
|
configuration to ensure graphics work properly.
|
|
|
|
Use this option to customise the Steam package rather than adding your
|
|
custom Steam to {option}`environment.systemPackages` yourself.
|
|
'';
|
|
};
|
|
|
|
extraCompatPackages = mkOption {
|
|
type = types.listOf types.package;
|
|
default = [ ];
|
|
example = literalExpression ''
|
|
with pkgs; [
|
|
proton-ge-bin
|
|
]
|
|
'';
|
|
description = ''
|
|
Extra packages to be used as compatibility tools for Steam on Linux. Packages will be included
|
|
in the `STEAM_EXTRA_COMPAT_TOOLS_PATHS` environmental variable. For more information see
|
|
https://github.com/ValveSoftware/steam-for-linux/issues/6310.
|
|
|
|
These packages must be Steam compatibility tools that have a `steamcompattool` output.
|
|
'';
|
|
};
|
|
|
|
remotePlay.openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Open ports in the firewall for Steam Remote Play.
|
|
'';
|
|
};
|
|
|
|
dedicatedServer.openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Open ports in the firewall for Source Dedicated Server.
|
|
'';
|
|
};
|
|
|
|
localNetworkGameTransfers.openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Open ports in the firewall for Steam Local Network Game Transfers.
|
|
'';
|
|
};
|
|
|
|
gamescopeSession = mkOption {
|
|
description = "Run a GameScope driven Steam session from your display-manager";
|
|
default = {};
|
|
type = types.submodule {
|
|
options = {
|
|
enable = mkEnableOption "GameScope Session";
|
|
args = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
description = ''
|
|
Arguments to be passed to GameScope for the session.
|
|
'';
|
|
};
|
|
|
|
env = mkOption {
|
|
type = types.attrsOf types.str;
|
|
default = { };
|
|
description = ''
|
|
Environmental variables to be passed to GameScope for the session.
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
};
|
|
|
|
extest.enable = mkEnableOption ''
|
|
Load the extest library into Steam, to translate X11 input events to
|
|
uinput events (e.g. for using Steam Input on Wayland)
|
|
'';
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
hardware.opengl = { # this fixes the "glXChooseVisual failed" bug, context: https://github.com/NixOS/nixpkgs/issues/47932
|
|
enable = true;
|
|
driSupport = true;
|
|
driSupport32Bit = true;
|
|
};
|
|
|
|
security.wrappers = mkIf (cfg.gamescopeSession.enable && gamescopeCfg.capSysNice) {
|
|
# needed or steam fails
|
|
bwrap = {
|
|
owner = "root";
|
|
group = "root";
|
|
source = "${pkgs.bubblewrap}/bin/bwrap";
|
|
setuid = true;
|
|
};
|
|
};
|
|
|
|
programs.gamescope.enable = mkDefault cfg.gamescopeSession.enable;
|
|
services.displayManager.sessionPackages = mkIf cfg.gamescopeSession.enable [ gamescopeSessionFile ];
|
|
|
|
# optionally enable 32bit pulseaudio support if pulseaudio is enabled
|
|
hardware.pulseaudio.support32Bit = config.hardware.pulseaudio.enable;
|
|
|
|
hardware.steam-hardware.enable = true;
|
|
|
|
environment.systemPackages = [
|
|
cfg.package
|
|
cfg.package.run
|
|
] ++ lib.optional cfg.gamescopeSession.enable steam-gamescope;
|
|
|
|
networking.firewall = lib.mkMerge [
|
|
(mkIf (cfg.remotePlay.openFirewall || cfg.localNetworkGameTransfers.openFirewall) {
|
|
allowedUDPPorts = [ 27036 ]; # Peer discovery
|
|
})
|
|
|
|
(mkIf cfg.remotePlay.openFirewall {
|
|
allowedTCPPorts = [ 27036 ];
|
|
allowedUDPPortRanges = [ { from = 27031; to = 27035; } ];
|
|
})
|
|
|
|
(mkIf cfg.dedicatedServer.openFirewall {
|
|
allowedTCPPorts = [ 27015 ]; # SRCDS Rcon port
|
|
allowedUDPPorts = [ 27015 ]; # Gameplay traffic
|
|
})
|
|
|
|
(mkIf cfg.localNetworkGameTransfers.openFirewall {
|
|
allowedTCPPorts = [ 27040 ]; # Data transfers
|
|
})
|
|
];
|
|
};
|
|
|
|
meta.maintainers = teams.steam;
|
|
}
|