treewide: remove redundant quotes

volth 35d68ef1 fe9c9f71

+860 -860
+2 -2
doc/doc-support/lib-function-locations.nix
··· 14 14 builtins.map 15 15 (subsetname: { 16 16 subsetname = subsetname; 17 - functions = libDefPos toplib."${subsetname}"; 17 + functions = libDefPos toplib.${subsetname}; 18 18 }) 19 19 (builtins.filter 20 - (name: builtins.isAttrs toplib."${name}") 20 + (name: builtins.isAttrs toplib.${name}) 21 21 (builtins.attrNames toplib)); 22 22 23 23 nixpkgsLib = pkgs.lib;
+2 -2
lib/lists.nix
··· 446 446 if length list < 2 447 447 then # finish 448 448 { result = list; } 449 - else if dfsthis ? "cycle" 449 + else if dfsthis ? cycle 450 450 then # there's a cycle, starting from the current vertex, return it 451 451 { cycle = reverseList ([ dfsthis.cycle ] ++ dfsthis.visited); 452 452 inherit (dfsthis) loops; } 453 - else if toporest ? "cycle" 453 + else if toporest ? cycle 454 454 then # there's a cycle somewhere else in the graph, return it 455 455 toporest 456 456 # Slow, but short. Can be made a bit faster with an explicit stack.
+11 -11
lib/systems/default.nix
··· 58 58 uname = { 59 59 # uname -s 60 60 system = { 61 - "linux" = "Linux"; 62 - "windows" = "Windows"; 63 - "darwin" = "Darwin"; 64 - "netbsd" = "NetBSD"; 65 - "freebsd" = "FreeBSD"; 66 - "openbsd" = "OpenBSD"; 67 - "wasi" = "Wasi"; 61 + linux = "Linux"; 62 + windows = "Windows"; 63 + darwin = "Darwin"; 64 + netbsd = "NetBSD"; 65 + freebsd = "FreeBSD"; 66 + openbsd = "OpenBSD"; 67 + wasi = "Wasi"; 68 68 }.${final.parsed.kernel.name} or null; 69 69 70 70 # uname -p ··· 86 86 else if final.isx86_64 then "x86_64" 87 87 else if final.isx86 then "i386" 88 88 else { 89 - "powerpc" = "ppc"; 90 - "powerpcle" = "ppc"; 91 - "powerpc64" = "ppc64"; 92 - "powerpc64le" = "ppc64le"; 89 + powerpc = "ppc"; 90 + powerpcle = "ppc"; 91 + powerpc64 = "ppc64"; 92 + powerpc64le = "ppc64le"; 93 93 }.${final.parsed.cpu.name} or final.parsed.cpu.name; 94 94 95 95 emulator = pkgs: let
+11 -11
lib/systems/platforms.nix
··· 456 456 }; 457 457 458 458 selectBySystem = system: { 459 - "i486-linux" = pc32; 460 - "i586-linux" = pc32; 461 - "i686-linux" = pc32; 462 - "x86_64-linux" = pc64; 463 - "armv5tel-linux" = sheevaplug; 464 - "armv6l-linux" = raspberrypi; 465 - "armv7a-linux" = armv7l-hf-multiplatform; 466 - "armv7l-linux" = armv7l-hf-multiplatform; 467 - "aarch64-linux" = aarch64-multiplatform; 468 - "mipsel-linux" = fuloong2f_n32; 469 - "powerpc64le-linux" = powernv; 459 + i486-linux = pc32; 460 + i586-linux = pc32; 461 + i686-linux = pc32; 462 + x86_64-linux = pc64; 463 + armv5tel-linux = sheevaplug; 464 + armv6l-linux = raspberrypi; 465 + armv7a-linux = armv7l-hf-multiplatform; 466 + armv7l-linux = armv7l-hf-multiplatform; 467 + aarch64-linux = aarch64-multiplatform; 468 + mipsel-linux = fuloong2f_n32; 469 + powerpc64le-linux = powernv; 470 470 }.${system} or pcBase; 471 471 }
+1 -1
lib/types.nix
··· 42 42 # Default type functor 43 43 defaultFunctor = name: { 44 44 inherit name; 45 - type = types."${name}" or null; 45 + type = types.${name} or null; 46 46 wrapped = null; 47 47 payload = null; 48 48 binOp = a: b: null;
+4 -4
nixos/lib/qemu-flags.nix
··· 17 17 else throw "Unknown QEMU serial device for system '${pkgs.stdenv.hostPlatform.system}'"; 18 18 19 19 qemuBinary = qemuPkg: { 20 - "x86_64-linux" = "${qemuPkg}/bin/qemu-kvm -cpu kvm64"; 21 - "armv7l-linux" = "${qemuPkg}/bin/qemu-system-arm -enable-kvm -machine virt -cpu host"; 22 - "aarch64-linux" = "${qemuPkg}/bin/qemu-system-aarch64 -enable-kvm -machine virt,gic-version=host -cpu host"; 23 - "x86_64-darwin" = "${qemuPkg}/bin/qemu-kvm -cpu kvm64"; 20 + x86_64-linux = "${qemuPkg}/bin/qemu-kvm -cpu kvm64"; 21 + armv7l-linux = "${qemuPkg}/bin/qemu-system-arm -enable-kvm -machine virt -cpu host"; 22 + aarch64-linux = "${qemuPkg}/bin/qemu-system-aarch64 -enable-kvm -machine virt,gic-version=host -cpu host"; 23 + x86_64-darwin = "${qemuPkg}/bin/qemu-kvm -cpu kvm64"; 24 24 }.${pkgs.stdenv.hostPlatform.system} or "${qemuPkg}/bin/qemu-kvm"; 25 25 }
+2 -2
nixos/modules/config/fonts/fontconfig-penultimate.nix
··· 35 35 then "fontconfig" 36 36 else "fontconfig_${version}"; 37 37 makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; }; 38 - cache = makeCache pkgs."${fcPackage}"; 39 - cache32 = makeCache pkgs.pkgsi686Linux."${fcPackage}"; 38 + cache = makeCache pkgs.${fcPackage}; 39 + cache32 = makeCache pkgs.pkgsi686Linux.${fcPackage}; 40 40 in 41 41 pkgs.writeText "fc-00-nixos-cache.conf" '' 42 42 <?xml version='1.0'?>
+1 -1
nixos/modules/config/fonts/fontconfig-ultimate.nix
··· 79 79 config = mkIf (config.fonts.fontconfig.enable && cfg.enable) { 80 80 81 81 fonts.fontconfig.confPackages = [ confPkg ]; 82 - environment.variables."INFINALITY_FT" = cfg.preset; 82 + environment.variables.INFINALITY_FT = cfg.preset; 83 83 84 84 }; 85 85
+2 -2
nixos/modules/config/fonts/fontconfig.nix
··· 50 50 then "fontconfig" 51 51 else "fontconfig_${version}"; 52 52 makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; }; 53 - cache = makeCache pkgs."${fcPackage}"; 54 - cache32 = makeCache pkgs.pkgsi686Linux."${fcPackage}"; 53 + cache = makeCache pkgs.${fcPackage}; 54 + cache32 = makeCache pkgs.pkgsi686Linux.${fcPackage}; 55 55 in 56 56 pkgs.writeText "fc-00-nixos-cache.conf" '' 57 57 <?xml version='1.0'?>
+2 -2
nixos/modules/config/krb5/default.nix
··· 15 15 realms = optionalAttrs (lib.all (value: value != null) [ 16 16 cfg.defaultRealm cfg.kdc cfg.kerberosAdminServer 17 17 ]) { 18 - "${cfg.defaultRealm}" = { 18 + ${cfg.defaultRealm} = { 19 19 kdc = cfg.kdc; 20 20 admin_server = cfg.kerberosAdminServer; 21 21 }; ··· 25 25 cfg.domainRealm cfg.defaultRealm 26 26 ]) { 27 27 ".${cfg.domainRealm}" = cfg.defaultRealm; 28 - "${cfg.domainRealm}" = cfg.defaultRealm; 28 + ${cfg.domainRealm} = cfg.defaultRealm; 29 29 }; 30 30 }; 31 31
+4 -4
nixos/modules/config/malloc.nix
··· 6 6 7 7 # The set of alternative malloc(3) providers. 8 8 providers = { 9 - "graphene-hardened" = rec { 9 + graphene-hardened = rec { 10 10 libPath = "${pkgs.graphene-hardened-malloc}/lib/libhardened_malloc.so"; 11 11 description = '' 12 12 An allocator designed to mitigate memory corruption attacks, such as ··· 14 14 ''; 15 15 }; 16 16 17 - "jemalloc" = { 17 + jemalloc = { 18 18 libPath = "${pkgs.jemalloc}/lib/libjemalloc.so"; 19 19 description = '' 20 20 A general purpose allocator that emphasizes fragmentation avoidance ··· 22 22 ''; 23 23 }; 24 24 25 - "scudo" = { 25 + scudo = { 26 26 libPath = "${pkgs.llvmPackages.compiler-rt}/lib/linux/libclang_rt.scudo-x86_64.so"; 27 27 description = '' 28 28 A user-mode allocator based on LLVM Sanitizer’s CombinedAllocator, ··· 32 32 }; 33 33 }; 34 34 35 - providerConf = providers."${cfg.provider}"; 35 + providerConf = providers.${cfg.provider}; 36 36 37 37 # An output that contains only the shared library, to avoid 38 38 # needlessly bloating the system closure
+4 -4
nixos/modules/config/networking.nix
··· 171 171 172 172 environment.etc = 173 173 { # /etc/services: TCP/UDP port assignments. 174 - "services".source = pkgs.iana-etc + "/etc/services"; 174 + services.source = pkgs.iana-etc + "/etc/services"; 175 175 176 176 # /etc/protocols: IP protocol numbers. 177 - "protocols".source = pkgs.iana-etc + "/etc/protocols"; 177 + protocols.source = pkgs.iana-etc + "/etc/protocols"; 178 178 179 179 # /etc/hosts: Hostname-to-IP mappings. 180 - "hosts".text = let 180 + hosts.text = let 181 181 oneToString = set: ip: ip + " " + concatStringsSep " " set.${ip}; 182 182 allToString = set: concatMapStringsSep "\n" (oneToString set) (attrNames set); 183 183 in '' ··· 190 190 191 191 } // optionalAttrs (pkgs.stdenv.hostPlatform.libc == "glibc") { 192 192 # /etc/rpc: RPC program numbers. 193 - "rpc".source = pkgs.glibc.out + "/etc/rpc"; 193 + rpc.source = pkgs.glibc.out + "/etc/rpc"; 194 194 }; 195 195 196 196 networking.proxy.envVars =
+2 -2
nixos/modules/config/power-management.nix
··· 78 78 }; 79 79 80 80 # Service executed before suspending/hibernating. 81 - systemd.services."pre-sleep" = 81 + systemd.services.pre-sleep = 82 82 { description = "Pre-Sleep Actions"; 83 83 wantedBy = [ "sleep.target" ]; 84 84 before = [ "sleep.target" ]; ··· 89 89 serviceConfig.Type = "oneshot"; 90 90 }; 91 91 92 - systemd.services."post-resume" = 92 + systemd.services.post-resume = 93 93 { description = "Post-Resume Actions"; 94 94 after = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" ]; 95 95 script =
+2 -2
nixos/modules/config/shells-environment.nix
··· 163 163 l = "ls -alh"; 164 164 }; 165 165 166 - environment.etc."shells".text = 166 + environment.etc.shells.text = 167 167 '' 168 168 ${concatStringsSep "\n" (map utils.toShellPath cfg.shells)} 169 169 /bin/sh ··· 171 171 172 172 # For resetting environment with `. /etc/set-environment` when needed 173 173 # and discoverability (see motivation of #30418). 174 - environment.etc."set-environment".source = config.system.build.setEnvironment; 174 + environment.etc.set-environment.source = config.system.build.setEnvironment; 175 175 176 176 system.build.setEnvironment = pkgs.writeText "set-environment" 177 177 ''
+1 -1
nixos/modules/config/terminfo.nix
··· 8 8 "/share/terminfo" 9 9 ]; 10 10 11 - environment.etc."terminfo" = { 11 + environment.etc.terminfo = { 12 12 source = "${config.system.path}/share/terminfo"; 13 13 }; 14 14
+2 -2
nixos/modules/config/users-groups.nix
··· 546 546 environment.systemPackages = systemShells; 547 547 548 548 environment.etc = { 549 - "subuid" = { 549 + subuid = { 550 550 text = subuidFile; 551 551 mode = "0644"; 552 552 }; 553 - "subgid" = { 553 + subgid = { 554 554 text = subgidFile; 555 555 mode = "0644"; 556 556 };
+1 -1
nixos/modules/hardware/nitrokey.nix
··· 36 36 { inherit (cfg) group; } 37 37 )) 38 38 ]; 39 - users.groups."${cfg.group}" = {}; 39 + users.groups.${cfg.group} = {}; 40 40 }; 41 41 }
+1 -1
nixos/modules/hardware/video/ati.nix
··· 33 33 34 34 boot.blacklistedKernelModules = [ "radeon" ]; 35 35 36 - environment.etc."ati".source = "${ati_x11}/etc/ati"; 36 + environment.etc.ati.source = "${ati_x11}/etc/ati"; 37 37 38 38 }; 39 39
+1 -1
nixos/modules/misc/version.nix
··· 85 85 # Generate /etc/os-release. See 86 86 # https://www.freedesktop.org/software/systemd/man/os-release.html for the 87 87 # format. 88 - environment.etc."os-release".text = 88 + environment.etc.os-release.text = 89 89 '' 90 90 NAME=NixOS 91 91 ID=nixos
+1 -1
nixos/modules/programs/atop.nix
··· 30 30 }; 31 31 32 32 config = mkIf (cfg.settings != {}) { 33 - environment.etc."atoprc".text = 33 + environment.etc.atoprc.text = 34 34 concatStrings (mapAttrsToList (n: v: "${n} ${toString v}\n") cfg.settings); 35 35 }; 36 36 }
+3 -3
nixos/modules/programs/bash/bash.nix
··· 159 159 160 160 }; 161 161 162 - environment.etc."profile".text = 162 + environment.etc.profile.text = 163 163 '' 164 164 # /etc/profile: DO NOT EDIT -- this file has been generated automatically. 165 165 # This file is read for login shells. ··· 184 184 fi 185 185 ''; 186 186 187 - environment.etc."bashrc".text = 187 + environment.etc.bashrc.text = 188 188 '' 189 189 # /etc/bashrc: DO NOT EDIT -- this file has been generated automatically. 190 190 ··· 212 212 213 213 # Configuration for readline in bash. We use "option default" 214 214 # priority to allow user override using both .text and .source. 215 - environment.etc."inputrc".source = mkOptionDefault ./inputrc; 215 + environment.etc.inputrc.source = mkOptionDefault ./inputrc; 216 216 217 217 users.defaultUserShell = mkDefault pkgs.bashInteractive; 218 218
+6 -6
nixos/modules/programs/less.nix
··· 54 54 type = types.attrsOf types.str; 55 55 default = {}; 56 56 example = { 57 - "h" = "noaction 5\e("; 58 - "l" = "noaction 5\e)"; 57 + h = "noaction 5\e("; 58 + l = "noaction 5\e)"; 59 59 }; 60 60 description = "Defines new command keys."; 61 61 }; ··· 74 74 type = types.attrsOf types.str; 75 75 default = {}; 76 76 example = { 77 - "\e" = "abort"; 77 + e = "abort"; 78 78 }; 79 79 description = "Defines new line-editing keys."; 80 80 }; ··· 111 111 environment.systemPackages = [ pkgs.less ]; 112 112 113 113 environment.variables = { 114 - "LESSKEY_SYSTEM" = toString lessKey; 114 + LESSKEY_SYSTEM = toString lessKey; 115 115 } // optionalAttrs (cfg.lessopen != null) { 116 - "LESSOPEN" = cfg.lessopen; 116 + LESSOPEN = cfg.lessopen; 117 117 } // optionalAttrs (cfg.lessclose != null) { 118 - "LESSCLOSE" = cfg.lessclose; 118 + LESSCLOSE = cfg.lessclose; 119 119 }; 120 120 121 121 warnings = optional (
+1 -1
nixos/modules/programs/nano.nix
··· 35 35 ###### implementation 36 36 37 37 config = lib.mkIf (cfg.nanorc != "" || cfg.syntaxHighlight) { 38 - environment.etc."nanorc".text = lib.concatStrings [ cfg.nanorc 38 + environment.etc.nanorc.text = lib.concatStrings [ cfg.nanorc 39 39 (lib.optionalString cfg.syntaxHighlight ''${LF}include "${pkgs.nano}/share/nano/*.nanorc"'') ]; 40 40 }; 41 41
+1 -1
nixos/modules/programs/npm.nix
··· 36 36 ###### implementation 37 37 38 38 config = lib.mkIf cfg.enable { 39 - environment.etc."npmrc".text = cfg.npmrc; 39 + environment.etc.npmrc.text = cfg.npmrc; 40 40 41 41 environment.variables.NPM_CONFIG_GLOBALCONFIG = "/etc/npmrc"; 42 42
+1 -1
nixos/modules/programs/screen.nix
··· 24 24 ###### implementation 25 25 26 26 config = mkIf (cfg.screenrc != "") { 27 - environment.etc."screenrc".text = cfg.screenrc; 27 + environment.etc.screenrc.text = cfg.screenrc; 28 28 29 29 environment.systemPackages = [ pkgs.screen ]; 30 30 };
+1 -1
nixos/modules/programs/xfs_quota.nix
··· 61 61 description = "Setup of xfs_quota projects. Make sure the filesystem is mounted with the pquota option."; 62 62 63 63 example = { 64 - "projname" = { 64 + projname = { 65 65 id = 50; 66 66 path = "/xfsprojects/projname"; 67 67 sizeHardLimit = "50g";
+1 -1
nixos/modules/programs/xonsh.nix
··· 45 45 46 46 config = mkIf cfg.enable { 47 47 48 - environment.etc."xonshrc".text = cfg.config; 48 + environment.etc.xonshrc.text = cfg.config; 49 49 50 50 environment.systemPackages = [ cfg.package ]; 51 51
+4 -4
nixos/modules/programs/zsh/zsh.nix
··· 135 135 136 136 programs.zsh.shellAliases = mapAttrs (name: mkDefault) cfge.shellAliases; 137 137 138 - environment.etc."zshenv".text = 138 + environment.etc.zshenv.text = 139 139 '' 140 140 # /etc/zshenv: DO NOT EDIT -- this file has been generated automatically. 141 141 # This file is read for all shells. ··· 159 159 fi 160 160 ''; 161 161 162 - environment.etc."zprofile".text = 162 + environment.etc.zprofile.text = 163 163 '' 164 164 # /etc/zprofile: DO NOT EDIT -- this file has been generated automatically. 165 165 # This file is read for login shells. ··· 178 178 fi 179 179 ''; 180 180 181 - environment.etc."zshrc".text = 181 + environment.etc.zshrc.text = 182 182 '' 183 183 # /etc/zshrc: DO NOT EDIT -- this file has been generated automatically. 184 184 # This file is read for interactive shells. ··· 219 219 fi 220 220 ''; 221 221 222 - environment.etc."zinputrc".source = ./zinputrc; 222 + environment.etc.zinputrc.source = ./zinputrc; 223 223 224 224 environment.systemPackages = [ pkgs.zsh ] 225 225 ++ optional cfg.enableCompletion pkgs.nix-zsh-completions;
+2 -2
nixos/modules/security/acme.nix
··· 378 378 }) 379 379 ); 380 380 381 - systemd.targets."acme-selfsigned-certificates" = mkIf cfg.preliminarySelfsigned {}; 382 - systemd.targets."acme-certificates" = {}; 381 + systemd.targets.acme-selfsigned-certificates = mkIf cfg.preliminarySelfsigned {}; 382 + systemd.targets.acme-certificates = {}; 383 383 }) 384 384 385 385 ];
+1 -1
nixos/modules/security/chromium-suid-sandbox.nix
··· 24 24 25 25 config = mkIf cfg.enable { 26 26 environment.systemPackages = [ sandbox ]; 27 - security.wrappers."${sandbox.passthru.sandboxExecutableName}".source = "${sandbox}/bin/${sandbox.passthru.sandboxExecutableName}"; 27 + security.wrappers.${sandbox.passthru.sandboxExecutableName}.source = "${sandbox}/bin/${sandbox.passthru.sandboxExecutableName}"; 28 28 }; 29 29 }
+1 -1
nixos/modules/security/polkit.nix
··· 85 85 86 86 security.wrappers = { 87 87 pkexec.source = "${pkgs.polkit.bin}/bin/pkexec"; 88 - "polkit-agent-helper-1".source = "${pkgs.polkit.out}/lib/polkit-1/polkit-agent-helper-1"; 88 + polkit-agent-helper-1.source = "${pkgs.polkit.out}/lib/polkit-1/polkit-agent-helper-1"; 89 89 }; 90 90 91 91 systemd.tmpfiles.rules = [
+1 -1
nixos/modules/security/prey.nix
··· 4 4 5 5 let 6 6 cfg = config.services.prey; 7 - myPrey = pkgs."prey-bash-client".override { 7 + myPrey = pkgs.prey-bash-client.override { 8 8 apiKey = cfg.apiKey; 9 9 deviceKey = cfg.deviceKey; 10 10 };
+5 -5
nixos/modules/security/wrappers/default.nix
··· 7 7 8 8 programs = 9 9 (lib.mapAttrsToList 10 - (n: v: (if v ? "program" then v else v // {program=n;})) 10 + (n: v: (if v ? program then v else v // {program=n;})) 11 11 wrappers); 12 12 13 13 securityWrapper = pkgs.stdenv.mkDerivation { ··· 74 74 75 75 mkWrappedPrograms = 76 76 builtins.map 77 - (s: if (s ? "capabilities") 77 + (s: if (s ? capabilities) 78 78 then mkSetcapProgram 79 79 ({ owner = "root"; 80 80 group = "root"; 81 81 } // s) 82 82 else if 83 - (s ? "setuid" && s.setuid) || 84 - (s ? "setgid" && s.setgid) || 85 - (s ? "permissions") 83 + (s ? setuid && s.setuid) || 84 + (s ? setgid && s.setgid) || 85 + (s ? permissions) 86 86 then mkSetuidProgram s 87 87 else mkSetuidProgram 88 88 ({ owner = "root";
+1 -1
nixos/modules/services/audio/alsa.nix
··· 99 99 100 100 boot.kernelModules = optional config.sound.enableOSSEmulation "snd_pcm_oss"; 101 101 102 - systemd.services."alsa-store" = 102 + systemd.services.alsa-store = 103 103 { description = "Store Sound Card State"; 104 104 wantedBy = [ "multi-user.target" ]; 105 105 unitConfig.RequiresMountsFor = "/var/lib/alsa";
+2 -2
nixos/modules/services/backup/mysql-backup.nix
··· 103 103 }]; 104 104 105 105 systemd = { 106 - timers."mysql-backup" = { 106 + timers.mysql-backup = { 107 107 description = "Mysql backup timer"; 108 108 wantedBy = [ "timers.target" ]; 109 109 timerConfig = { ··· 112 112 Unit = "mysql-backup.service"; 113 113 }; 114 114 }; 115 - services."mysql-backup" = { 115 + services.mysql-backup = { 116 116 description = "Mysql backup service"; 117 117 enable = true; 118 118 serviceConfig = {
+1 -1
nixos/modules/services/backup/tsm.nix
··· 78 78 config = mkIf cfg.enable { 79 79 inherit assertions; 80 80 programs.tsmClient.enable = true; 81 - programs.tsmClient.servers."${cfg.servername}".passwdDir = 81 + programs.tsmClient.servers.${cfg.servername}.passwdDir = 82 82 mkDefault "/var/lib/tsm-backup/password"; 83 83 systemd.services.tsm-backup = { 84 84 description = "IBM Spectrum Protect (Tivoli Storage Manager) Backup";
+1 -1
nixos/modules/services/backup/zfs-replication.nix
··· 60 60 pkgs.lz4 61 61 ]; 62 62 63 - systemd.services."zfs-replication" = { 63 + systemd.services.zfs-replication = { 64 64 after = [ 65 65 "zfs-snapshot-daily.service" 66 66 "zfs-snapshot-frequent.service"
+1 -1
nixos/modules/services/backup/znapzend.nix
··· 361 361 environment.systemPackages = [ pkgs.znapzend ]; 362 362 363 363 systemd.services = { 364 - "znapzend" = { 364 + znapzend = { 365 365 description = "ZnapZend - ZFS Backup System"; 366 366 wantedBy = [ "zfs.target" ]; 367 367 after = [ "zfs.target" ];
+2 -2
nixos/modules/services/cluster/hadoop/hdfs.nix
··· 24 24 25 25 config = mkMerge [ 26 26 (mkIf cfg.hdfs.namenode.enabled { 27 - systemd.services."hdfs-namenode" = { 27 + systemd.services.hdfs-namenode = { 28 28 description = "Hadoop HDFS NameNode"; 29 29 wantedBy = [ "multi-user.target" ]; 30 30 ··· 44 44 }; 45 45 }) 46 46 (mkIf cfg.hdfs.datanode.enabled { 47 - systemd.services."hdfs-datanode" = { 47 + systemd.services.hdfs-datanode = { 48 48 description = "Hadoop HDFS DataNode"; 49 49 wantedBy = [ "multi-user.target" ]; 50 50
+2 -2
nixos/modules/services/cluster/hadoop/yarn.nix
··· 35 35 }) 36 36 37 37 (mkIf cfg.yarn.resourcemanager.enabled { 38 - systemd.services."yarn-resourcemanager" = { 38 + systemd.services.yarn-resourcemanager = { 39 39 description = "Hadoop YARN ResourceManager"; 40 40 wantedBy = [ "multi-user.target" ]; 41 41 ··· 53 53 }) 54 54 55 55 (mkIf cfg.yarn.nodemanager.enabled { 56 - systemd.services."yarn-nodemanager" = { 56 + systemd.services.yarn-nodemanager = { 57 57 description = "Hadoop YARN NodeManager"; 58 58 wantedBy = [ "multi-user.target" ]; 59 59
+1 -1
nixos/modules/services/cluster/kubernetes/addons/dashboard.nix
··· 74 74 spec = { 75 75 replicas = 1; 76 76 revisionHistoryLimit = 10; 77 - selector.matchLabels."k8s-app" = "kubernetes-dashboard"; 77 + selector.matchLabels.k8s-app = "kubernetes-dashboard"; 78 78 template = { 79 79 metadata = { 80 80 labels = {
+6 -6
nixos/modules/services/cluster/kubernetes/addons/dns.nix
··· 73 73 metadata = { 74 74 labels = { 75 75 "addonmanager.kubernetes.io/mode" = "Reconcile"; 76 - "k8s-app" = "kube-dns"; 76 + k8s-app = "kube-dns"; 77 77 "kubernetes.io/cluster-service" = "true"; 78 78 "kubernetes.io/bootstrapping" = "rbac-defaults"; 79 79 }; ··· 102 102 }; 103 103 labels = { 104 104 "addonmanager.kubernetes.io/mode" = "Reconcile"; 105 - "k8s-app" = "kube-dns"; 105 + k8s-app = "kube-dns"; 106 106 "kubernetes.io/cluster-service" = "true"; 107 107 "kubernetes.io/bootstrapping" = "rbac-defaults"; 108 108 }; ··· 130 130 metadata = { 131 131 labels = { 132 132 "addonmanager.kubernetes.io/mode" = "Reconcile"; 133 - "k8s-app" = "kube-dns"; 133 + k8s-app = "kube-dns"; 134 134 "kubernetes.io/cluster-service" = "true"; 135 135 }; 136 136 name = "coredns"; ··· 144 144 metadata = { 145 145 labels = { 146 146 "addonmanager.kubernetes.io/mode" = cfg.reconcileMode; 147 - "k8s-app" = "kube-dns"; 147 + k8s-app = "kube-dns"; 148 148 "kubernetes.io/cluster-service" = "true"; 149 149 }; 150 150 name = "coredns"; ··· 175 175 metadata = { 176 176 labels = { 177 177 "addonmanager.kubernetes.io/mode" = cfg.reconcileMode; 178 - "k8s-app" = "kube-dns"; 178 + k8s-app = "kube-dns"; 179 179 "kubernetes.io/cluster-service" = "true"; 180 180 "kubernetes.io/name" = "CoreDNS"; 181 181 }; ··· 301 301 }; 302 302 labels = { 303 303 "addonmanager.kubernetes.io/mode" = "Reconcile"; 304 - "k8s-app" = "kube-dns"; 304 + k8s-app = "kube-dns"; 305 305 "kubernetes.io/cluster-service" = "true"; 306 306 "kubernetes.io/name" = "CoreDNS"; 307 307 };
+2 -2
nixos/modules/services/databases/cassandra.nix
··· 397 397 } 398 398 ]; 399 399 users = mkIf (cfg.user == defaultUser) { 400 - extraUsers."${defaultUser}" = 400 + extraUsers.${defaultUser} = 401 401 { group = cfg.group; 402 402 home = cfg.homeDir; 403 403 createHome = true; 404 404 uid = config.ids.uids.cassandra; 405 405 description = "Cassandra service user"; 406 406 }; 407 - extraGroups."${defaultUser}".gid = config.ids.gids.cassandra; 407 + extraGroups.${defaultUser}.gid = config.ids.gids.cassandra; 408 408 }; 409 409 410 410 systemd.services.cassandra =
+4 -4
nixos/modules/services/databases/pgmanage.nix
··· 59 59 type = types.attrsOf types.str; 60 60 default = {}; 61 61 example = { 62 - "nuc-server" = "hostaddr=192.168.0.100 port=5432 dbname=postgres"; 63 - "mini-server" = "hostaddr=127.0.0.1 port=5432 dbname=postgres sslmode=require"; 62 + nuc-server = "hostaddr=192.168.0.100 port=5432 dbname=postgres"; 63 + mini-server = "hostaddr=127.0.0.1 port=5432 dbname=postgres sslmode=require"; 64 64 }; 65 65 description = '' 66 66 pgmanage requires at least one PostgreSQL server be defined. ··· 192 192 }; 193 193 }; 194 194 users = { 195 - users."${pgmanage}" = { 195 + users.${pgmanage} = { 196 196 name = pgmanage; 197 197 group = pgmanage; 198 198 home = cfg.sqlRoot; 199 199 createHome = true; 200 200 }; 201 - groups."${pgmanage}" = { 201 + groups.${pgmanage} = { 202 202 name = pgmanage; 203 203 }; 204 204 };
+4 -4
nixos/modules/services/desktops/geoclue2.nix
··· 202 202 ]; 203 203 204 204 # restart geoclue service when the configuration changes 205 - systemd.services."geoclue".restartTriggers = [ 205 + systemd.services.geoclue.restartTriggers = [ 206 206 config.environment.etc."geoclue/geoclue.conf".source 207 207 ]; 208 208 209 209 # this needs to run as a user service, since it's associated with the 210 210 # user who is making the requests 211 211 systemd.user.services = mkIf cfg.enableDemoAgent { 212 - "geoclue-agent" = { 212 + geoclue-agent = { 213 213 description = "Geoclue agent"; 214 214 script = "${package}/libexec/geoclue-2.0/demos/agent"; 215 215 # this should really be `partOf = [ "geoclue.service" ]`, but ··· 219 219 }; 220 220 }; 221 221 222 - services.geoclue2.appConfig."epiphany" = { 222 + services.geoclue2.appConfig.epiphany = { 223 223 isAllowed = true; 224 224 isSystem = false; 225 225 }; 226 226 227 - services.geoclue2.appConfig."firefox" = { 227 + services.geoclue2.appConfig.firefox = { 228 228 isAllowed = true; 229 229 isSystem = false; 230 230 };
+1 -1
nixos/modules/services/games/terraria.nix
··· 4 4 5 5 let 6 6 cfg = config.services.terraria; 7 - worldSizeMap = { "small" = 1; "medium" = 2; "large" = 3; }; 7 + worldSizeMap = { small = 1; medium = 2; large = 3; }; 8 8 valFlag = name: val: optionalString (val != null) "-${name} \"${escape ["\\" "\""] (toString val)}\""; 9 9 boolFlag = name: val: optionalString val "-${name}"; 10 10 flags = [
+2 -2
nixos/modules/services/hardware/sane.nix
··· 124 124 environment.sessionVariables = env; 125 125 services.udev.packages = backends; 126 126 127 - users.groups."scanner".gid = config.ids.gids.scanner; 127 + users.groups.scanner.gid = config.ids.gids.scanner; 128 128 }) 129 129 130 130 (mkIf config.services.saned.enable { ··· 152 152 }; 153 153 }; 154 154 155 - users.users."scanner" = { 155 + users.users.scanner = { 156 156 uid = config.ids.uids.scanner; 157 157 group = "scanner"; 158 158 };
+1 -1
nixos/modules/services/hardware/throttled.nix
··· 20 20 config = mkIf cfg.enable { 21 21 systemd.packages = [ pkgs.throttled ]; 22 22 # The upstream package has this in Install, but that's not enough, see the NixOS manual 23 - systemd.services."lenovo_fix".wantedBy = [ "multi-user.target" ]; 23 + systemd.services.lenovo_fix.wantedBy = [ "multi-user.target" ]; 24 24 25 25 environment.etc."lenovo_fix.conf".source = 26 26 if cfg.extraConfig != ""
+2 -2
nixos/modules/services/hardware/tlp.nix
··· 60 60 powerManagement.cpufreq.max = null; 61 61 powerManagement.cpufreq.min = null; 62 62 63 - systemd.sockets."systemd-rfkill".enable = false; 63 + systemd.sockets.systemd-rfkill.enable = false; 64 64 65 65 systemd.services = { 66 66 "systemd-rfkill@".enable = false; 67 - "systemd-rfkill".enable = false; 67 + systemd-rfkill.enable = false; 68 68 69 69 tlp = { 70 70 description = "TLP system startup/shutdown";
+3 -3
nixos/modules/services/logging/logcheck.nix
··· 23 23 flags = "-r ${rulesDir} -c ${configFile} -L ${logFiles} -${levelFlag} -m ${cfg.mailTo}"; 24 24 25 25 levelFlag = getAttrFromPath [cfg.level] 26 - { "paranoid" = "p"; 27 - "server" = "s"; 28 - "workstation" = "w"; 26 + { paranoid = "p"; 27 + server = "s"; 28 + workstation = "w"; 29 29 }; 30 30 31 31 cronJob = ''
+2 -2
nixos/modules/services/mail/mlmmj.nix
··· 137 137 ${pkgs.postfix}/bin/postmap ${stateDir}/transports 138 138 ''; 139 139 140 - systemd.services."mlmmj-maintd" = { 140 + systemd.services.mlmmj-maintd = { 141 141 description = "mlmmj maintenance daemon"; 142 142 serviceConfig = { 143 143 User = cfg.user; ··· 146 146 }; 147 147 }; 148 148 149 - systemd.timers."mlmmj-maintd" = { 149 + systemd.timers.mlmmj-maintd = { 150 150 description = "mlmmj maintenance timer"; 151 151 timerConfig.OnUnitActiveSec = cfg.maintInterval; 152 152 wantedBy = [ "timers.target" ];
+1 -1
nixos/modules/services/mail/pfix-srsd.nix
··· 40 40 systemPackages = [ pkgs.pfixtools ]; 41 41 }; 42 42 43 - systemd.services."pfix-srsd" = { 43 + systemd.services.pfix-srsd = { 44 44 description = "Postfix sender rewriting scheme daemon"; 45 45 before = [ "postfix.service" ]; 46 46 #note that we use requires rather than wants because postfix
+6 -6
nixos/modules/services/mail/postfix.nix
··· 877 877 } 878 878 879 879 (mkIf haveAliases { 880 - services.postfix.aliasFiles."aliases" = aliasesFile; 880 + services.postfix.aliasFiles.aliases = aliasesFile; 881 881 }) 882 882 (mkIf haveTransport { 883 - services.postfix.mapFiles."transport" = transportFile; 883 + services.postfix.mapFiles.transport = transportFile; 884 884 }) 885 885 (mkIf haveVirtual { 886 - services.postfix.mapFiles."virtual" = virtualFile; 886 + services.postfix.mapFiles.virtual = virtualFile; 887 887 }) 888 888 (mkIf haveLocalRecipients { 889 - services.postfix.mapFiles."local_recipients" = localRecipientMapFile; 889 + services.postfix.mapFiles.local_recipients = localRecipientMapFile; 890 890 }) 891 891 (mkIf cfg.enableHeaderChecks { 892 - services.postfix.mapFiles."header_checks" = headerChecksFile; 892 + services.postfix.mapFiles.header_checks = headerChecksFile; 893 893 }) 894 894 (mkIf (cfg.dnsBlacklists != []) { 895 - services.postfix.mapFiles."client_access" = checkClientAccessFile; 895 + services.postfix.mapFiles.client_access = checkClientAccessFile; 896 896 }) 897 897 ]); 898 898 }
+2 -2
nixos/modules/services/mail/postgrey.nix
··· 7 7 natural = with types; addCheck int (x: x >= 0); 8 8 natural' = with types; addCheck int (x: x > 0); 9 9 10 - socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? "path" || x ? "port"); 10 + socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? path || x ? port); 11 11 12 12 inetSocket = with types; { 13 13 options = { ··· 151 151 }; 152 152 153 153 systemd.services.postgrey = let 154 - bind-flag = if cfg.socket ? "path" then 154 + bind-flag = if cfg.socket ? path then 155 155 ''--unix=${cfg.socket.path} --socketmode=${cfg.socket.mode}'' 156 156 else 157 157 ''--inet=${optionalString (cfg.socket.addr != null) (cfg.socket.addr + ":")}${toString cfg.socket.port}'';
+1 -1
nixos/modules/services/mail/rspamd.nix
··· 387 387 gid = config.ids.gids.rspamd; 388 388 }; 389 389 390 - environment.etc."rspamd".source = rspamdDir; 390 + environment.etc.rspamd.source = rspamdDir; 391 391 392 392 systemd.services.rspamd = { 393 393 description = "Rspamd Service";
+2 -2
nixos/modules/services/misc/airsonic.nix
··· 138 138 139 139 services.nginx = mkIf (cfg.virtualHost != null) { 140 140 enable = true; 141 - virtualHosts."${cfg.virtualHost}" = { 142 - locations."${cfg.contextPath}".proxyPass = "http://${cfg.listenAddress}:${toString cfg.port}"; 141 + virtualHosts.${cfg.virtualHost} = { 142 + locations.${cfg.contextPath}.proxyPass = "http://${cfg.listenAddress}:${toString cfg.port}"; 143 143 }; 144 144 }; 145 145
+5 -5
nixos/modules/services/misc/dysnomia.nix
··· 8 8 printProperties = properties: 9 9 concatMapStrings (propertyName: 10 10 let 11 - property = properties."${propertyName}"; 11 + property = properties.${propertyName}; 12 12 in 13 - if isList property then "${propertyName}=(${lib.concatMapStrings (elem: "\"${toString elem}\" ") (properties."${propertyName}")})\n" 13 + if isList property then "${propertyName}=(${lib.concatMapStrings (elem: "\"${toString elem}\" ") (properties.${propertyName})})\n" 14 14 else "${propertyName}=\"${toString property}\"\n" 15 15 ) (builtins.attrNames properties); 16 16 ··· 31 31 32 32 ${concatMapStrings (containerName: 33 33 let 34 - containerProperties = cfg.containers."${containerName}"; 34 + containerProperties = cfg.containers.${containerName}; 35 35 in 36 36 '' 37 37 cat > ${containerName} <<EOF ··· 49 49 50 50 ${concatMapStrings (componentName: 51 51 let 52 - component = cfg.components."${containerName}"."${componentName}"; 52 + component = cfg.components.${containerName}.${componentName}; 53 53 in 54 54 "ln -s ${component} ${containerName}/${componentName}\n" 55 - ) (builtins.attrNames (cfg.components."${containerName}" or {}))} 55 + ) (builtins.attrNames (cfg.components.${containerName} or {}))} 56 56 ''; 57 57 58 58 componentsDir = pkgs.stdenv.mkDerivation {
+1 -1
nixos/modules/services/misc/exhibitor.nix
··· 58 58 }; 59 59 }; 60 60 cliOptions = concatStringsSep " " (mapAttrsToList (k: v: "--${k} ${v}") (filterAttrs (k: v: v != null && v != "") (cliOptionsCommon // 61 - cliOptionsPerConfig."${cfg.configType}" // 61 + cliOptionsPerConfig.${cfg.configType} // 62 62 s3CommonOptions // 63 63 optionalAttrs cfg.s3Backup { s3backup = "true"; } // 64 64 optionalAttrs cfg.fileSystemBackup { filesystembackup = "true"; }
+2 -2
nixos/modules/services/misc/gitolite.nix
··· 147 147 group = cfg.group; 148 148 useDefaultShell = true; 149 149 }; 150 - users.groups."${cfg.group}".gid = config.ids.gids.gitolite; 150 + users.groups.${cfg.group}.gid = config.ids.gids.gitolite; 151 151 152 152 systemd.tmpfiles.rules = [ 153 153 "d '${cfg.dataDir}' 0750 ${cfg.user} ${cfg.group} - -" ··· 157 157 "Z ${cfg.dataDir} 0750 ${cfg.user} ${cfg.group} - -" 158 158 ]; 159 159 160 - systemd.services."gitolite-init" = { 160 + systemd.services.gitolite-init = { 161 161 description = "Gitolite initialization"; 162 162 wantedBy = [ "multi-user.target" ]; 163 163 unitConfig.RequiresMountsFor = cfg.dataDir;
+1 -1
nixos/modules/services/misc/matrix-synapse.nix
··· 374 374 user = cfg.database_user; 375 375 database = cfg.database_name; 376 376 }; 377 - }."${cfg.database_type}"; 377 + }.${cfg.database_type}; 378 378 description = '' 379 379 Arguments to pass to the engine. 380 380 '';
+6 -6
nixos/modules/services/misc/nix-daemon.nix
··· 495 495 optionals (pkgs.stdenv.isx86_64 && pkgs.hostPlatform.platform ? gcc.arch) ( 496 496 # a x86_64 builder can run code for `platform.gcc.arch` and minor architectures: 497 497 [ "gccarch-${pkgs.hostPlatform.platform.gcc.arch}" ] ++ { 498 - "sandybridge" = [ "gccarch-westmere" ]; 499 - "ivybridge" = [ "gccarch-westmere" "gccarch-sandybridge" ]; 500 - "haswell" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" ]; 501 - "broadwell" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" ]; 502 - "skylake" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" ]; 503 - "skylake-avx512" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" "gccarch-skylake" ]; 498 + sandybridge = [ "gccarch-westmere" ]; 499 + ivybridge = [ "gccarch-westmere" "gccarch-sandybridge" ]; 500 + haswell = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" ]; 501 + broadwell = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" ]; 502 + skylake = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" ]; 503 + skylake-avx512 = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" "gccarch-skylake" ]; 504 504 }.${pkgs.hostPlatform.platform.gcc.arch} or [] 505 505 ) 506 506 );
+1 -1
nixos/modules/services/misc/nixos-manual.nix
··· 54 54 (mkIf (cfg.showManual && cfgd.enable && cfgd.nixos.enable) { 55 55 boot.extraTTYs = [ "tty${toString cfg.ttyNumber}" ]; 56 56 57 - systemd.services."nixos-manual" = { 57 + systemd.services.nixos-manual = { 58 58 description = "NixOS Manual"; 59 59 wantedBy = [ "multi-user.target" ]; 60 60 serviceConfig = {
+1 -1
nixos/modules/services/misc/snapper.nix
··· 44 44 configs = mkOption { 45 45 default = { }; 46 46 example = literalExample { 47 - "home" = { 47 + home = { 48 48 subvolume = "/home"; 49 49 extraConfig = '' 50 50 ALLOW_USERS="alice"
+2 -2
nixos/modules/services/misc/synergy.nix
··· 83 83 84 84 config = mkMerge [ 85 85 (mkIf cfgC.enable { 86 - systemd.user.services."synergy-client" = { 86 + systemd.user.services.synergy-client = { 87 87 after = [ "network.target" "graphical-session.target" ]; 88 88 description = "Synergy client"; 89 89 wantedBy = optional cfgC.autoStart "graphical-session.target"; ··· 93 93 }; 94 94 }) 95 95 (mkIf cfgS.enable { 96 - systemd.user.services."synergy-server" = { 96 + systemd.user.services.synergy-server = { 97 97 after = [ "network.target" "graphical-session.target" ]; 98 98 description = "Synergy server"; 99 99 wantedBy = optional cfgS.autoStart "graphical-session.target";
+4 -4
nixos/modules/services/misc/zoneminder.nix
··· 10 10 group = { 11 11 nginx = config.services.nginx.group; 12 12 none = user; 13 - }."${cfg.webserver}"; 13 + }.${cfg.webserver}; 14 14 15 15 useNginx = cfg.webserver == "nginx"; 16 16 ··· 223 223 nginx = lib.mkIf useNginx { 224 224 enable = true; 225 225 virtualHosts = { 226 - "${cfg.hostname}" = { 226 + ${cfg.hostname} = { 227 227 default = true; 228 228 root = "${pkg}/share/zoneminder/www"; 229 229 listen = [ { addr = "0.0.0.0"; inherit (cfg) port; } ]; ··· 357 357 }; 358 358 }; 359 359 360 - users.groups."${user}" = { 360 + users.groups.${user} = { 361 361 gid = config.ids.gids.zoneminder; 362 362 }; 363 363 364 - users.users."${user}" = { 364 + users.users.${user} = { 365 365 uid = config.ids.uids.zoneminder; 366 366 group = user; 367 367 inherit home;
+1 -1
nixos/modules/services/monitoring/dd-agent/dd-agent.nix
··· 185 185 }; 186 186 187 187 config = mkIf cfg.enable { 188 - environment.systemPackages = [ pkgs."dd-agent" pkgs.sysstat pkgs.procps ]; 188 + environment.systemPackages = [ pkgs.dd-agent pkgs.sysstat pkgs.procps ]; 189 189 190 190 users.users.datadog = { 191 191 description = "Datadog Agent User";
+1 -1
nixos/modules/services/monitoring/fusion-inventory.nix
··· 51 51 description = "FusionInventory user"; 52 52 }; 53 53 54 - systemd.services."fusion-inventory" = { 54 + systemd.services.fusion-inventory = { 55 55 description = "Fusion Inventory Agent"; 56 56 wantedBy = [ "multi-user.target" ]; 57 57
+2 -2
nixos/modules/services/monitoring/monit.nix
··· 23 23 24 24 environment.systemPackages = [ pkgs.monit ]; 25 25 26 - environment.etc."monitrc" = { 26 + environment.etc.monitrc = { 27 27 text = cfg.config; 28 28 mode = "0400"; 29 29 }; ··· 39 39 KillMode = "process"; 40 40 Restart = "always"; 41 41 }; 42 - restartTriggers = [ config.environment.etc."monitrc".source ]; 42 + restartTriggers = [ config.environment.etc.monitrc.source ]; 43 43 }; 44 44 45 45 };
+5 -5
nixos/modules/services/monitoring/thanos.nix
··· 70 70 } ''json2yaml -i $json -o $out''; 71 71 72 72 thanos = cmd: "${cfg.package}/bin/thanos ${cmd}" + 73 - (let args = cfg."${cmd}".arguments; 73 + (let args = cfg.${cmd}.arguments; 74 74 in optionalString (length args != 0) (" \\\n " + 75 75 concatStringsSep " \\\n " args)); 76 76 77 77 argumentsOf = cmd: concatLists (collect isList 78 - (flip mapParamsRecursive params."${cmd}" (path: param: 78 + (flip mapParamsRecursive params.${cmd} (path: param: 79 79 let opt = concatStringsSep "." path; 80 - v = getAttrFromPath path cfg."${cmd}"; 80 + v = getAttrFromPath path cfg.${cmd}; 81 81 in param.toArgs opt v))); 82 82 83 83 mkArgumentsOption = cmd: mkOption { ··· 95 95 }; 96 96 97 97 mapParamsRecursive = 98 - let noParam = attr: !(attr ? "toArgs" && attr ? "option"); 98 + let noParam = attr: !(attr ? toArgs && attr ? option); 99 99 in mapAttrsRecursiveCond noParam; 100 100 101 101 paramsToOptions = mapParamsRecursive (_path: param: param.option); ··· 607 607 assertRelativeStateDir = cmd: { 608 608 assertions = [ 609 609 { 610 - assertion = !hasPrefix "/" cfg."${cmd}".stateDir; 610 + assertion = !hasPrefix "/" cfg.${cmd}.stateDir; 611 611 message = 612 612 "The option services.thanos.${cmd}.stateDir should not be an absolute directory." + 613 613 " It should be a directory relative to /var/lib.";
+1 -1
nixos/modules/services/monitoring/zabbix-agent.nix
··· 135 135 136 136 users.groups.${group} = { }; 137 137 138 - systemd.services."zabbix-agent" = { 138 + systemd.services.zabbix-agent = { 139 139 description = "Zabbix Agent"; 140 140 141 141 wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/monitoring/zabbix-proxy.nix
··· 252 252 fping.source = "${pkgs.fping}/bin/fping"; 253 253 }; 254 254 255 - systemd.services."zabbix-proxy" = { 255 + systemd.services.zabbix-proxy = { 256 256 description = "Zabbix Proxy"; 257 257 258 258 wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/monitoring/zabbix-server.nix
··· 237 237 fping.source = "${pkgs.fping}/bin/fping"; 238 238 }; 239 239 240 - systemd.services."zabbix-server" = { 240 + systemd.services.zabbix-server = { 241 241 description = "Zabbix Server"; 242 242 243 243 wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/network-filesystems/beegfs.nix
··· 69 69 # functions to generate systemd.service entries 70 70 71 71 systemdEntry = service: cfgFile: (mapAttrs' ( name: cfg: 72 - (nameValuePair "beegfs-${service}-${name}" (mkIf cfg."${service}".enable { 72 + (nameValuePair "beegfs-${service}-${name}" (mkIf cfg.${service}.enable { 73 73 wantedBy = [ "multi-user.target" ]; 74 74 requires = [ "network-online.target" ]; 75 75 after = [ "network-online.target" ];
+5 -5
nixos/modules/services/network-filesystems/ceph.nix
··· 324 324 # Remove all name-value pairs with null values from the attribute set to avoid making empty sections in the ceph.conf 325 325 globalConfig = mapAttrs' (name: value: nameValuePair (translateOption name) value) (filterAttrs (name: value: value != null) globalAndMgrConfig); 326 326 totalConfig = { 327 - "global" = globalConfig; 328 - } // optionalAttrs (cfg.mon.enable && cfg.mon.extraConfig != {}) { "mon" = cfg.mon.extraConfig; } 329 - // optionalAttrs (cfg.mds.enable && cfg.mds.extraConfig != {}) { "mds" = cfg.mds.extraConfig; } 330 - // optionalAttrs (cfg.osd.enable && cfg.osd.extraConfig != {}) { "osd" = cfg.osd.extraConfig; } 327 + global = globalConfig; 328 + } // optionalAttrs (cfg.mon.enable && cfg.mon.extraConfig != {}) { mon = cfg.mon.extraConfig; } 329 + // optionalAttrs (cfg.mds.enable && cfg.mds.extraConfig != {}) { mds = cfg.mds.extraConfig; } 330 + // optionalAttrs (cfg.osd.enable && cfg.osd.extraConfig != {}) { osd = cfg.osd.extraConfig; } 331 331 // optionalAttrs (cfg.client.enable && cfg.client.extraConfig != {}) cfg.client.extraConfig; 332 332 in 333 333 generators.toINI {} totalConfig; ··· 355 355 356 356 systemd.targets = let 357 357 targets = [ 358 - { "ceph" = { description = "Ceph target allowing to start/stop all ceph service instances at once"; }; } 358 + { ceph = { description = "Ceph target allowing to start/stop all ceph service instances at once"; }; } 359 359 ] ++ optional cfg.mon.enable (generateTargetFile "mon") 360 360 ++ optional cfg.mds.enable (generateTargetFile "mds") 361 361 ++ optional cfg.osd.enable (generateTargetFile "osd")
+4 -4
nixos/modules/services/network-filesystems/samba.nix
··· 234 234 # Refer to https://github.com/samba-team/samba/tree/master/packaging/systemd 235 235 # for correct use with systemd 236 236 services = { 237 - "samba-smbd" = daemonService "smbd" ""; 238 - "samba-nmbd" = mkIf cfg.enableNmbd (daemonService "nmbd" ""); 239 - "samba-winbindd" = mkIf cfg.enableWinbindd (daemonService "winbindd" ""); 240 - "samba-setup" = { 237 + samba-smbd = daemonService "smbd" ""; 238 + samba-nmbd = mkIf cfg.enableNmbd (daemonService "nmbd" ""); 239 + samba-winbindd = mkIf cfg.enableWinbindd (daemonService "winbindd" ""); 240 + samba-setup = { 241 241 description = "Samba Setup Task"; 242 242 script = setupScript; 243 243 unitConfig.RequiresMountsFor = "/var/lib/samba";
+3 -3
nixos/modules/services/networking/babeld.nix
··· 52 52 example = 53 53 { 54 54 type = "tunnel"; 55 - "split-horizon" = true; 55 + split-horizon = true; 56 56 }; 57 57 }; 58 58 ··· 66 66 example = 67 67 { enp0s2 = 68 68 { type = "wired"; 69 - "hello-interval" = 5; 70 - "split-horizon" = "auto"; 69 + hello-interval = 5; 70 + split-horizon = "auto"; 71 71 }; 72 72 }; 73 73 };
+3 -3
nixos/modules/services/networking/connman.nix
··· 82 82 83 83 environment.systemPackages = [ connman ]; 84 84 85 - systemd.services."connman" = { 85 + systemd.services.connman = { 86 86 description = "Connection service"; 87 87 wantedBy = [ "multi-user.target" ]; 88 88 after = [ "syslog.target" ]; ··· 95 95 }; 96 96 }; 97 97 98 - systemd.services."connman-vpn" = mkIf cfg.enableVPN { 98 + systemd.services.connman-vpn = mkIf cfg.enableVPN { 99 99 description = "ConnMan VPN service"; 100 100 wantedBy = [ "multi-user.target" ]; 101 101 after = [ "syslog.target" ]; ··· 108 108 }; 109 109 }; 110 110 111 - systemd.services."net-connman-vpn" = mkIf cfg.enableVPN { 111 + systemd.services.net-connman-vpn = mkIf cfg.enableVPN { 112 112 description = "D-BUS Service"; 113 113 serviceConfig = { 114 114 Name = "net.connman.vpn";
+1 -1
nixos/modules/services/networking/consul.nix
··· 156 156 config = mkIf cfg.enable ( 157 157 mkMerge [{ 158 158 159 - users.users."consul" = { 159 + users.users.consul = { 160 160 description = "Consul agent daemon user"; 161 161 uid = config.ids.uids.consul; 162 162 # The shell is needed for health checks
+1 -1
nixos/modules/services/networking/firewall.nix
··· 58 58 ${text} 59 59 ''; in "${dir}/bin/${name}"; 60 60 61 - defaultInterface = { default = mapAttrs (name: value: cfg."${name}") commonOptions; }; 61 + defaultInterface = { default = mapAttrs (name: value: cfg.${name}) commonOptions; }; 62 62 allInterfaces = defaultInterface // cfg.interfaces; 63 63 64 64 startScript = writeShScript "firewall-start" ''
+1 -1
nixos/modules/services/networking/git-daemon.nix
··· 115 115 gid = config.ids.gids.git; 116 116 }; 117 117 118 - systemd.services."git-daemon" = { 118 + systemd.services.git-daemon = { 119 119 after = [ "network.target" ]; 120 120 wantedBy = [ "multi-user.target" ]; 121 121 script = "${pkgs.git}/bin/git daemon --reuseaddr "
+8 -8
nixos/modules/services/networking/hylafax/systemd.nix
··· 68 68 inherit (cfg) spoolAreaPath; 69 69 }; 70 70 71 - sockets."hylafax-hfaxd" = { 71 + sockets.hylafax-hfaxd = { 72 72 description = "HylaFAX server socket"; 73 73 documentation = [ "man:hfaxd(8)" ]; 74 74 wantedBy = [ "multi-user.target" ]; ··· 77 77 socketConfig.Accept = true; 78 78 }; 79 79 80 - paths."hylafax-faxq" = { 80 + paths.hylafax-faxq = { 81 81 description = "HylaFAX queue manager sendq watch"; 82 82 documentation = [ "man:faxq(8)" "man:sendq(5)" ]; 83 83 wantedBy = [ "multi-user.target" ]; ··· 87 87 timers = mkMerge [ 88 88 ( 89 89 mkIf (cfg.faxcron.enable.frequency!=null) 90 - { "hylafax-faxcron".timerConfig.Persistent = true; } 90 + { hylafax-faxcron.timerConfig.Persistent = true; } 91 91 ) 92 92 ( 93 93 mkIf (cfg.faxqclean.enable.frequency!=null) 94 - { "hylafax-faxqclean".timerConfig.Persistent = true; } 94 + { hylafax-faxqclean.timerConfig.Persistent = true; } 95 95 ) 96 96 ]; 97 97 ··· 121 121 in 122 122 service: service // { serviceConfig = apply service; }; 123 123 124 - services."hylafax-spool" = { 124 + services.hylafax-spool = { 125 125 description = "HylaFAX spool area preparation"; 126 126 documentation = [ "man:hylafax-server(4)" ]; 127 127 script = '' ··· 140 140 unitConfig.RequiresMountsFor = [ cfg.spoolAreaPath ]; 141 141 }; 142 142 143 - services."hylafax-faxq" = { 143 + services.hylafax-faxq = { 144 144 description = "HylaFAX queue manager"; 145 145 documentation = [ "man:faxq(8)" ]; 146 146 requires = [ "hylafax-spool.service" ]; ··· 178 178 serviceConfig.PrivateNetwork = null; 179 179 }; 180 180 181 - services."hylafax-faxcron" = rec { 181 + services.hylafax-faxcron = rec { 182 182 description = "HylaFAX spool area maintenance"; 183 183 documentation = [ "man:faxcron(8)" ]; 184 184 after = [ "hylafax-spool.service" ]; ··· 194 194 ]; 195 195 }; 196 196 197 - services."hylafax-faxqclean" = rec { 197 + services.hylafax-faxqclean = rec { 198 198 description = "HylaFAX spool area queue cleaner"; 199 199 documentation = [ "man:faxqclean(8)" ]; 200 200 after = [ "hylafax-spool.service" ];
+1 -1
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 121 121 122 122 users.groups.ircd.gid = config.ids.gids.ircd; 123 123 124 - systemd.services."ircd-hybrid" = { 124 + systemd.services.ircd-hybrid = { 125 125 description = "IRCD Hybrid server"; 126 126 after = [ "started networking" ]; 127 127 wantedBy = [ "multi-user.target" ];
+3 -3
nixos/modules/services/networking/mtprotoproxy.nix
··· 50 50 users = mkOption { 51 51 type = types.attrsOf types.str; 52 52 example = { 53 - "tg" = "00000000000000000000000000000000"; 54 - "tg2" = "0123456789abcdef0123456789abcdef"; 53 + tg = "00000000000000000000000000000000"; 54 + tg2 = "0123456789abcdef0123456789abcdef"; 55 55 }; 56 56 description = '' 57 57 Allowed users and their secrets. A secret is a 32 characters long hex string. ··· 80 80 type = types.attrs; 81 81 default = {}; 82 82 example = { 83 - "STATS_PRINT_PERIOD" = 600; 83 + STATS_PRINT_PERIOD = 600; 84 84 }; 85 85 description = '' 86 86 Extra configuration options for mtprotoproxy.
+2 -2
nixos/modules/services/networking/ndppd.nix
··· 142 142 messages, and respond to them according to a set of rules. 143 143 ''; 144 144 default = {}; 145 - example = { "eth0".rules."1111::/64" = {}; }; 145 + example = { eth0.rules."1111::/64" = {}; }; 146 146 }; 147 147 }; 148 148 ··· 153 153 '' ]; 154 154 155 155 services.ndppd.proxies = mkIf (cfg.interface != null && cfg.network != null) { 156 - "${cfg.interface}".rules."${cfg.network}" = {}; 156 + ${cfg.interface}.rules.${cfg.network} = {}; 157 157 }; 158 158 159 159 systemd.services.ndppd = {
+5 -5
nixos/modules/services/networking/networkmanager.nix
··· 81 81 ''; 82 82 83 83 dispatcherTypesSubdirMap = { 84 - "basic" = ""; 85 - "pre-up" = "pre-up.d/"; 86 - "pre-down" = "pre-down.d/"; 84 + basic = ""; 85 + pre-up = "pre-up.d/"; 86 + pre-down = "pre-down.d/"; 87 87 }; 88 88 89 89 macAddressOpt = mkOption { ··· 453 453 454 454 systemd.packages = cfg.packages; 455 455 456 - systemd.services."NetworkManager" = { 456 + systemd.services.NetworkManager = { 457 457 wantedBy = [ "network.target" ]; 458 458 restartTriggers = [ configFile ]; 459 459 ··· 483 483 }; 484 484 }; 485 485 486 - systemd.services."NetworkManager-dispatcher" = { 486 + systemd.services.NetworkManager-dispatcher = { 487 487 wantedBy = [ "network.target" ]; 488 488 restartTriggers = [ configFile ]; 489 489
+2 -2
nixos/modules/services/networking/nsd.nix
··· 955 955 ''; 956 956 }; 957 957 958 - systemd.timers."nsd-dnssec" = mkIf dnssec { 958 + systemd.timers.nsd-dnssec = mkIf dnssec { 959 959 description = "Automatic DNSSEC key rollover"; 960 960 961 961 wantedBy = [ "nsd.service" ]; ··· 966 966 }; 967 967 }; 968 968 969 - systemd.services."nsd-dnssec" = mkIf dnssec { 969 + systemd.services.nsd-dnssec = mkIf dnssec { 970 970 description = "DNSSEC key rollover"; 971 971 972 972 wantedBy = [ "nsd.service" ];
+1 -1
nixos/modules/services/networking/pdns-recursor.nix
··· 128 128 129 129 config = mkIf cfg.enable { 130 130 131 - users.users."${username}" = { 131 + users.users.${username} = { 132 132 home = dataDir; 133 133 createHome = true; 134 134 uid = config.ids.uids.pdns-recursor;
+12 -12
nixos/modules/services/networking/quicktun.nix
··· 93 93 wantedBy = [ "multi-user.target" ]; 94 94 after = [ "network.target" ]; 95 95 environment = { 96 - "INTERFACE" = name; 97 - "TUN_MODE" = toString qtcfg.tunMode; 98 - "REMOTE_ADDRESS" = qtcfg.remoteAddress; 99 - "LOCAL_ADDRESS" = qtcfg.localAddress; 100 - "LOCAL_PORT" = toString qtcfg.localPort; 101 - "REMOTE_PORT" = toString qtcfg.remotePort; 102 - "REMOTE_FLOAT" = toString qtcfg.remoteFloat; 103 - "PRIVATE_KEY" = qtcfg.privateKey; 104 - "PUBLIC_KEY" = qtcfg.publicKey; 105 - "TIME_WINDOW" = toString qtcfg.timeWindow; 106 - "TUN_UP_SCRIPT" = pkgs.writeScript "quicktun-${name}-up.sh" qtcfg.upScript; 107 - "SUID" = "nobody"; 96 + INTERFACE = name; 97 + TUN_MODE = toString qtcfg.tunMode; 98 + REMOTE_ADDRESS = qtcfg.remoteAddress; 99 + LOCAL_ADDRESS = qtcfg.localAddress; 100 + LOCAL_PORT = toString qtcfg.localPort; 101 + REMOTE_PORT = toString qtcfg.remotePort; 102 + REMOTE_FLOAT = toString qtcfg.remoteFloat; 103 + PRIVATE_KEY = qtcfg.privateKey; 104 + PUBLIC_KEY = qtcfg.publicKey; 105 + TIME_WINDOW = toString qtcfg.timeWindow; 106 + TUN_UP_SCRIPT = pkgs.writeScript "quicktun-${name}-up.sh" qtcfg.upScript; 107 + SUID = "nobody"; 108 108 }; 109 109 serviceConfig = { 110 110 Type = "simple";
+1 -1
nixos/modules/services/networking/smokeping.nix
··· 275 275 ]; 276 276 security.wrappers = { 277 277 fping.source = "${pkgs.fping}/bin/fping"; 278 - "fping6".source = "${pkgs.fping}/bin/fping6"; 278 + fping6.source = "${pkgs.fping}/bin/fping6"; 279 279 }; 280 280 environment.systemPackages = [ pkgs.fping ]; 281 281 users.users = singleton {
+1 -1
nixos/modules/services/networking/softether.nix
··· 68 68 mkMerge [{ 69 69 environment.systemPackages = [ package ]; 70 70 71 - systemd.services."softether-init" = { 71 + systemd.services.softether-init = { 72 72 description = "SoftEther VPN services initial task"; 73 73 after = [ "keys.target" ]; 74 74 wants = [ "keys.target" ];
+1 -1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
··· 63 63 StrongSwan default: <literal><![CDATA[${builtins.toJSON strongswanDefault}]]></literal> 64 64 ''; 65 65 66 - single = f: name: value: { "${name}" = f value; }; 66 + single = f: name: value: { ${name} = f value; }; 67 67 68 68 mkStrParam = mkParamOfType types.str; 69 69 mkOptionalStrParam = mkStrParam null;
+4 -4
nixos/modules/services/networking/strongswan-swanctl/param-lib.nix
··· 21 21 mkConf = indent : ps : 22 22 concatMapStringsSep "\n" 23 23 (name: 24 - let value = ps."${name}"; 24 + let value = ps.${name}; 25 25 indentation = replicate indent " "; 26 26 in 27 27 indentation + ( ··· 58 58 ) set); 59 59 60 60 # Recursively map over every parameter in the given attribute set. 61 - mapParamsRecursive = mapAttrsRecursiveCond' (as: (!(as ? "_type" && as._type == "param"))); 61 + mapParamsRecursive = mapAttrsRecursiveCond' (as: (!(as ? _type && as._type == "param"))); 62 62 63 63 mapAttrsRecursiveCond' = cond: f: set: 64 64 let ··· 67 67 g = 68 68 name: value: 69 69 if isAttrs value && cond value 70 - then { "${name}" = recurse (path ++ [name]) value; } 70 + then { ${name} = recurse (path ++ [name]) value; } 71 71 else f (path ++ [name]) name value; 72 72 in mapAttrs'' g set; 73 73 in recurse [] set; ··· 77 77 78 78 # Extract the options from the given set of parameters. 79 79 paramsToOptions = ps : 80 - mapParamsRecursive (_path: name: param: { "${name}" = param.option; }) ps; 80 + mapParamsRecursive (_path: name: param: { ${name} = param.option; }) ps; 81 81 82 82 }
+2 -2
nixos/modules/services/networking/syncthing.nix
··· 373 373 systemd.packages = [ pkgs.syncthing ]; 374 374 375 375 users.users = mkIf (cfg.systemService && cfg.user == defaultUser) { 376 - "${defaultUser}" = 376 + ${defaultUser} = 377 377 { group = cfg.group; 378 378 home = cfg.dataDir; 379 379 createHome = true; ··· 383 383 }; 384 384 385 385 users.groups = mkIf (cfg.systemService && cfg.group == defaultUser) { 386 - "${defaultUser}".gid = 386 + ${defaultUser}.gid = 387 387 config.ids.gids.syncthing; 388 388 }; 389 389
+2 -2
nixos/modules/services/networking/websockify.nix
··· 44 44 scriptArgs = "%i"; 45 45 }; 46 46 47 - systemd.targets."default-websockify" = { 47 + systemd.targets.default-websockify = { 48 48 description = "Target to start all default websockify@ services"; 49 - unitConfig."X-StopOnReconfiguration" = true; 49 + unitConfig.X-StopOnReconfiguration = true; 50 50 wants = mapAttrsToList (name: value: "websockify@${name}:${toString value}.service") cfg.portMap; 51 51 wantedBy = [ "multi-user.target" ]; 52 52 };
+2 -2
nixos/modules/services/networking/zerobin.nix
··· 74 74 }; 75 75 76 76 config = mkIf (cfg.enable) { 77 - users.users."${cfg.user}" = 77 + users.users.${cfg.user} = 78 78 if cfg.user == "zerobin" then { 79 79 isSystemUser = true; 80 80 group = cfg.group; ··· 82 82 createHome = true; 83 83 } 84 84 else {}; 85 - users.groups."${cfg.group}" = {}; 85 + users.groups.${cfg.group} = {}; 86 86 87 87 systemd.services.zerobin = { 88 88 enable = true;
+1 -1
nixos/modules/services/printing/cupsd.nix
··· 287 287 }; 288 288 289 289 environment.systemPackages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper; 290 - environment.etc."cups".source = "/var/lib/cups"; 290 + environment.etc.cups.source = "/var/lib/cups"; 291 291 292 292 services.dbus.packages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper; 293 293
+1 -1
nixos/modules/services/security/fprot.nix
··· 67 67 68 68 services.cron.systemCronJobs = [ "*/${toString cfg.updater.frequency} * * * * root start fprot-updater" ]; 69 69 70 - systemd.services."fprot-updater" = { 70 + systemd.services.fprot-updater = { 71 71 serviceConfig = { 72 72 Type = "oneshot"; 73 73 RemainAfterExit = false;
+1 -1
nixos/modules/services/security/physlock.nix
··· 99 99 # for physlock -l and physlock -L 100 100 environment.systemPackages = [ pkgs.physlock ]; 101 101 102 - systemd.services."physlock" = { 102 + systemd.services.physlock = { 103 103 enable = true; 104 104 description = "Physlock"; 105 105 wantedBy = optional cfg.lockOn.suspend "suspend.target"
+1 -1
nixos/modules/services/security/sks.nix
··· 108 108 hkpAddress = "'" + (builtins.concatStringsSep " " cfg.hkpAddress) + "'" ; 109 109 hkpPort = builtins.toString cfg.hkpPort; 110 110 in { 111 - "sks-db" = { 111 + sks-db = { 112 112 description = "SKS database server"; 113 113 after = [ "network.target" ]; 114 114 wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/system/localtime.nix
··· 22 22 config = mkIf cfg.enable { 23 23 services.geoclue2 = { 24 24 enable = true; 25 - appConfig."localtime" = { 25 + appConfig.localtime = { 26 26 isAllowed = true; 27 27 isSystem = true; 28 28 };
+3 -3
nixos/modules/services/torrent/deluge.nix
··· 174 174 services.deluge.extraPackages = with pkgs; [ unzip gnutar xz p7zip bzip2 ]; 175 175 176 176 systemd.tmpfiles.rules = [ "d '${configDir}' 0770 ${cfg.user} ${cfg.group}" ] 177 - ++ optional (cfg.config ? "download_location") 177 + ++ optional (cfg.config ? download_location) 178 178 "d '${cfg.config.download_location}' 0770 ${cfg.user} ${cfg.group}" 179 - ++ optional (cfg.config ? "torrentfiles_location") 179 + ++ optional (cfg.config ? torrentfiles_location) 180 180 "d '${cfg.config.torrentfiles_location}' 0770 ${cfg.user} ${cfg.group}" 181 - ++ optional (cfg.config ? "move_completed_path") 181 + ++ optional (cfg.config ? move_completed_path) 182 182 "d '${cfg.config.move_completed_path}' 0770 ${cfg.user} ${cfg.group}"; 183 183 184 184 systemd.services.deluged = {
+1 -1
nixos/modules/services/ttys/agetty.nix
··· 92 92 restartIfChanged = false; 93 93 }; 94 94 95 - systemd.services."console-getty" = 95 + systemd.services.console-getty = 96 96 { serviceConfig.ExecStart = [ 97 97 "" # override upstream default with an empty ExecStart 98 98 (gettyCmd "--noclear --keep-baud console 115200,38400,9600 $TERM")
+2 -2
nixos/modules/services/web-apps/atlassian/confluence.nix
··· 142 142 }; 143 143 144 144 config = mkIf cfg.enable { 145 - users.users."${cfg.user}" = { 145 + users.users.${cfg.user} = { 146 146 isSystemUser = true; 147 147 group = cfg.group; 148 148 }; 149 149 150 - users.groups."${cfg.group}" = {}; 150 + users.groups.${cfg.group} = {}; 151 151 152 152 systemd.tmpfiles.rules = [ 153 153 "d '${cfg.home}' - ${cfg.user} - - -"
+2 -2
nixos/modules/services/web-apps/atlassian/crowd.nix
··· 110 110 }; 111 111 112 112 config = mkIf cfg.enable { 113 - users.users."${cfg.user}" = { 113 + users.users.${cfg.user} = { 114 114 isSystemUser = true; 115 115 group = cfg.group; 116 116 }; 117 117 118 - users.groups."${cfg.group}" = {}; 118 + users.groups.${cfg.group} = {}; 119 119 120 120 systemd.tmpfiles.rules = [ 121 121 "d '${cfg.home}' - ${cfg.user} ${cfg.group} - -"
+2 -2
nixos/modules/services/web-apps/atlassian/jira.nix
··· 148 148 }; 149 149 150 150 config = mkIf cfg.enable { 151 - users.users."${cfg.user}" = { 151 + users.users.${cfg.user} = { 152 152 isSystemUser = true; 153 153 group = cfg.group; 154 154 }; 155 155 156 - users.groups."${cfg.group}" = {}; 156 + users.groups.${cfg.group} = {}; 157 157 158 158 systemd.tmpfiles.rules = [ 159 159 "d '${cfg.home}' - ${cfg.user} - - -"
+3 -3
nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix
··· 163 163 164 164 config = mkIf cfg.enable { 165 165 services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") { 166 - "${poolName}" = '' 166 + ${poolName} = '' 167 167 listen = "${phpfpmSocketName}" 168 168 listen.owner = nginx 169 169 listen.group = nginx ··· 188 188 services.nginx = { 189 189 enable = true; 190 190 virtualHosts = mkIf (cfg.virtualHost != null) { 191 - "${cfg.virtualHost}" = { 191 + ${cfg.virtualHost} = { 192 192 root = "${pkgs.icingaweb2}/public"; 193 193 194 194 extraConfig = '' ··· 215 215 216 216 # /etc/icingaweb2 217 217 environment.etc = let 218 - doModule = name: optionalAttrs (cfg.modules."${name}".enable) { "icingaweb2/enabledModules/${name}".source = "${pkgs.icingaweb2}/modules/${name}"; }; 218 + doModule = name: optionalAttrs (cfg.modules.${name}.enable) { "icingaweb2/enabledModules/${name}".source = "${pkgs.icingaweb2}/modules/${name}"; }; 219 219 in {} 220 220 # Module packages 221 221 // (mapAttrs' (k: v: nameValuePair "icingaweb2/enabledModules/${k}" { source = v; }) cfg.modulePackages)
+1 -1
nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix
··· 58 58 }; 59 59 60 60 backends = mkOption { 61 - default = { "icinga" = { resource = "icinga_ido"; }; }; 61 + default = { icinga = { resource = "icinga_ido"; }; }; 62 62 description = "Monitoring backends to define"; 63 63 type = attrsOf (submodule ({ name, ... }: { 64 64 options = {
+1 -1
nixos/modules/services/web-apps/limesurvey.nix
··· 282 282 283 283 systemd.services.httpd.after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.service"; 284 284 285 - users.users."${user}".group = group; 285 + users.users.${user}.group = group; 286 286 287 287 }; 288 288 }
+10 -10
nixos/modules/services/web-apps/nextcloud.nix
··· 101 101 phpOptions = mkOption { 102 102 type = types.attrsOf types.str; 103 103 default = { 104 - "short_open_tag" = "Off"; 105 - "expose_php" = "Off"; 106 - "error_reporting" = "E_ALL & ~E_DEPRECATED & ~E_STRICT"; 107 - "display_errors" = "stderr"; 104 + short_open_tag = "Off"; 105 + expose_php = "Off"; 106 + error_reporting = "E_ALL & ~E_DEPRECATED & ~E_STRICT"; 107 + display_errors = "stderr"; 108 108 "opcache.enable_cli" = "1"; 109 109 "opcache.interned_strings_buffer" = "8"; 110 110 "opcache.max_accelerated_files" = "10000"; ··· 112 112 "opcache.revalidate_freq" = "1"; 113 113 "opcache.fast_shutdown" = "1"; 114 114 "openssl.cafile" = "/etc/ssl/certs/ca-certificates.crt"; 115 - "catch_workers_output" = "yes"; 115 + catch_workers_output = "yes"; 116 116 }; 117 117 description = '' 118 118 Options for PHP's php.ini file for nextcloud. ··· 288 288 ]; 289 289 } 290 290 291 - { systemd.timers."nextcloud-cron" = { 291 + { systemd.timers.nextcloud-cron = { 292 292 wantedBy = [ "timers.target" ]; 293 293 timerConfig.OnBootSec = "5m"; 294 294 timerConfig.OnUnitActiveSec = "15m"; ··· 296 296 }; 297 297 298 298 systemd.services = { 299 - "nextcloud-setup" = let 299 + nextcloud-setup = let 300 300 c = cfg.config; 301 301 writePhpArrary = a: "[${concatMapStringsSep "," (val: ''"${toString val}"'') a}]"; 302 302 overrideConfig = pkgs.writeText "nextcloud-config.php" '' ··· 396 396 ''; 397 397 serviceConfig.Type = "oneshot"; 398 398 }; 399 - "nextcloud-cron" = { 399 + nextcloud-cron = { 400 400 environment.NEXTCLOUD_CONFIG_DIR = "${cfg.home}/config"; 401 401 serviceConfig.Type = "oneshot"; 402 402 serviceConfig.User = "nextcloud"; 403 403 serviceConfig.ExecStart = "${phpPackage}/bin/php -f ${pkgs.nextcloud}/cron.php"; 404 404 }; 405 - "nextcloud-update-plugins" = mkIf cfg.autoUpdateApps.enable { 405 + nextcloud-update-plugins = mkIf cfg.autoUpdateApps.enable { 406 406 serviceConfig.Type = "oneshot"; 407 407 serviceConfig.ExecStart = "${occ}/bin/nextcloud-occ app:update --all"; 408 408 startAt = cfg.autoUpdateApps.startAt; ··· 445 445 services.nginx = { 446 446 enable = true; 447 447 virtualHosts = { 448 - "${cfg.hostName}" = { 448 + ${cfg.hostName} = { 449 449 root = pkgs.nextcloud; 450 450 locations = { 451 451 "= /robots.txt" = {
+2 -2
nixos/modules/services/web-apps/nexus.nix
··· 80 80 }; 81 81 82 82 config = mkIf cfg.enable { 83 - users.users."${cfg.user}" = { 83 + users.users.${cfg.user} = { 84 84 isSystemUser = true; 85 85 group = cfg.group; 86 86 home = cfg.home; 87 87 createHome = true; 88 88 }; 89 89 90 - users.groups."${cfg.group}" = {}; 90 + users.groups.${cfg.group} = {}; 91 91 92 92 systemd.services.nexus = { 93 93 description = "Sonatype Nexus3";
+1 -1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
··· 60 60 services.nginx.virtualHosts = let 61 61 hkpPort = builtins.toString cfg.hkpPort; 62 62 in { 63 - "${cfg.hostname}" = { 63 + ${cfg.hostname} = { 64 64 root = webPkg; 65 65 locations = { 66 66 "/pks".extraConfig = ''
+2 -2
nixos/modules/services/web-apps/restya-board.nix
··· 179 179 config = mkIf cfg.enable { 180 180 181 181 services.phpfpm.pools = { 182 - "${poolName}" = { 182 + ${poolName} = { 183 183 listen = phpfpmSocketName; 184 184 phpOptions = '' 185 185 date.timezone = "CET" ··· 209 209 }; 210 210 211 211 services.nginx.enable = true; 212 - services.nginx.virtualHosts."${cfg.virtualHost.serverName}" = { 212 + services.nginx.virtualHosts.${cfg.virtualHost.serverName} = { 213 213 listen = [ { addr = cfg.virtualHost.listenHost; port = cfg.virtualHost.listenPort; } ]; 214 214 serverName = cfg.virtualHost.serverName; 215 215 root = runDir;
+1 -1
nixos/modules/services/web-apps/selfoss.nix
··· 117 117 config = mkIf cfg.enable { 118 118 119 119 services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") { 120 - "${poolName}" = '' 120 + ${poolName} = '' 121 121 listen = "${phpfpmSocketName}"; 122 122 listen.owner = nginx 123 123 listen.group = nginx
+2 -2
nixos/modules/services/web-apps/tt-rss.nix
··· 520 520 ]; 521 521 522 522 services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") { 523 - "${poolName}" = { 523 + ${poolName} = { 524 524 listen = "/var/run/phpfpm/${poolName}.sock"; 525 525 extraConfig = '' 526 526 listen.owner = nginx ··· 542 542 services.nginx = mkIf (cfg.virtualHost != null) { 543 543 enable = true; 544 544 virtualHosts = { 545 - "${cfg.virtualHost}" = { 545 + ${cfg.virtualHost} = { 546 546 root = "${cfg.root}"; 547 547 548 548 locations."/" = {
+1 -1
nixos/modules/services/web-apps/zabbix.nix
··· 16 16 <?php 17 17 // Zabbix GUI configuration file. 18 18 global $DB; 19 - $DB['TYPE'] = '${ { "mysql" = "MYSQL"; "pgsql" = "POSTGRESQL"; "oracle" = "ORACLE"; }.${cfg.database.type} }'; 19 + $DB['TYPE'] = '${ { mysql = "MYSQL"; pgsql = "POSTGRESQL"; oracle = "ORACLE"; }.${cfg.database.type} }'; 20 20 $DB['SERVER'] = '${cfg.database.host}'; 21 21 $DB['PORT'] = '${toString cfg.database.port}'; 22 22 $DB['DATABASE'] = '${cfg.database.name}';
+1 -1
nixos/modules/services/x11/clight.nix
··· 75 75 longitude = mkDefault config.location.longitude; 76 76 }); 77 77 78 - services.geoclue2.appConfig."clightc" = { 78 + services.geoclue2.appConfig.clightc = { 79 79 isAllowed = true; 80 80 isSystem = true; 81 81 };
+2 -2
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 203 203 # GNOME should have its own geoclue agent 204 204 services.geoclue2.enableDemoAgent = false; 205 205 206 - services.geoclue2.appConfig."gnome-datetime-panel" = { 206 + services.geoclue2.appConfig.gnome-datetime-panel = { 207 207 isAllowed = true; 208 208 isSystem = true; 209 209 }; 210 - services.geoclue2.appConfig."gnome-color-panel" = { 210 + services.geoclue2.appConfig.gnome-color-panel = { 211 211 isAllowed = true; 212 212 isSystem = true; 213 213 };
+1 -1
nixos/modules/services/x11/desktop-managers/mate.nix
··· 101 101 services.gnome3.gvfs.enable = true; 102 102 services.upower.enable = config.powerManagement.enable; 103 103 104 - security.pam.services."mate-screensaver".unixAuth = true; 104 + security.pam.services.mate-screensaver.unixAuth = true; 105 105 106 106 environment.variables.GIO_EXTRA_MODULES = [ "${pkgs.gnome3.gvfs}/lib/gio/modules" ]; 107 107
+1 -1
nixos/modules/services/x11/desktop-managers/plasma5.nix
··· 72 72 73 73 security.wrappers = { 74 74 kcheckpass.source = "${lib.getBin plasma5.kscreenlocker}/libexec/kcheckpass"; 75 - "start_kdeinit".source = "${lib.getBin pkgs.kinit}/libexec/kf5/start_kdeinit"; 75 + start_kdeinit.source = "${lib.getBin pkgs.kinit}/libexec/kf5/start_kdeinit"; 76 76 kwin_wayland = { 77 77 source = "${lib.getBin plasma5.kwin}/bin/kwin_wayland"; 78 78 capabilities = "cap_sys_nice+ep";
+1 -1
nixos/modules/services/x11/display-managers/lightdm.nix
··· 6 6 7 7 xcfg = config.services.xserver; 8 8 dmcfg = xcfg.displayManager; 9 - xEnv = config.systemd.services."display-manager".environment; 9 + xEnv = config.systemd.services.display-manager.environment; 10 10 cfg = dmcfg.lightdm; 11 11 12 12 dmDefault = xcfg.desktopManager.default;
+1 -1
nixos/modules/services/x11/display-managers/sddm.nix
··· 7 7 xcfg = config.services.xserver; 8 8 dmcfg = xcfg.displayManager; 9 9 cfg = dmcfg.sddm; 10 - xEnv = config.systemd.services."display-manager".environment; 10 + xEnv = config.systemd.services.display-manager.environment; 11 11 12 12 inherit (pkgs) sddm; 13 13
+1 -1
nixos/modules/services/x11/hardware/synaptics.nix
··· 167 167 168 168 services.xserver.modules = [ pkg.out ]; 169 169 170 - environment.etc."${etcFile}".source = 170 + environment.etc.${etcFile}.source = 171 171 "${pkg.out}/share/X11/xorg.conf.d/70-synaptics.conf"; 172 172 173 173 environment.systemPackages = [ pkg ];
+1 -1
nixos/modules/services/x11/redshift.nix
··· 81 81 # needed so that .desktop files are installed, which geoclue cares about 82 82 environment.systemPackages = [ cfg.package ]; 83 83 84 - services.geoclue2.appConfig."redshift" = { 84 + services.geoclue2.appConfig.redshift = { 85 85 isAllowed = true; 86 86 isSystem = true; 87 87 };
+1 -1
nixos/modules/services/x11/xautolock.nix
··· 132 132 ] ++ (lib.flip map [ "locker" "notifier" "nowlocker" "killer" ] 133 133 (option: 134 134 { 135 - assertion = cfg."${option}" != null -> builtins.substring 0 1 cfg."${option}" == "/"; 135 + assertion = cfg.${option} != null -> builtins.substring 0 1 cfg.${option} == "/"; 136 136 message = "Please specify a canonical path for `services.xserver.xautolock.${option}`"; 137 137 }) 138 138 );
+1 -1
nixos/modules/system/boot/kernel.nix
··· 260 260 source = kernelModulesConf; 261 261 }; 262 262 263 - systemd.services."systemd-modules-load" = 263 + systemd.services.systemd-modules-load = 264 264 { wantedBy = [ "multi-user.target" ]; 265 265 restartTriggers = [ kernelModulesConf ]; 266 266 serviceConfig =
+1 -1
nixos/modules/system/boot/kexec.nix
··· 4 4 config = lib.mkIf (lib.any (lib.meta.platformMatch pkgs.stdenv.hostPlatform) pkgs.kexectools.meta.platforms) { 5 5 environment.systemPackages = [ pkgs.kexectools ]; 6 6 7 - systemd.services."prepare-kexec" = 7 + systemd.services.prepare-kexec = 8 8 { description = "Preparation for kexec"; 9 9 wantedBy = [ "kexec.target" ]; 10 10 before = [ "systemd-kexec.service" ];
+1 -1
nixos/modules/system/boot/loader/grub/grub.nix
··· 72 72 else "${convertedFont}"); 73 73 }); 74 74 75 - bootDeviceCounters = fold (device: attr: attr // { "${device}" = (attr."${device}" or 0) + 1; }) {} 75 + bootDeviceCounters = fold (device: attr: attr // { ${device} = (attr.${device} or 0) + 1; }) {} 76 76 (concatMap (args: args.devices) cfg.mirroredBoots); 77 77 78 78 convertedFont = (pkgs.runCommand "grub-font-converted.pf2" {}
+1 -1
nixos/modules/system/boot/luksroot.nix
··· 476 476 477 477 boot.initrd.luks.devices = mkOption { 478 478 default = { }; 479 - example = { "luksroot".device = "/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08"; }; 479 + example = { luksroot.device = "/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08"; }; 480 480 description = '' 481 481 The encrypted disk that should be opened before the root 482 482 filesystem is mounted. Both LVM-over-LUKS and LUKS-over-LVM
+1 -1
nixos/modules/system/boot/systemd-nspawn.nix
··· 117 117 118 118 environment.etc."systemd/nspawn".source = generateUnits "nspawn" units [] []; 119 119 120 - systemd.targets."multi-user".wants = [ "machines.target" ]; 120 + systemd.targets.multi-user.wants = [ "machines.target" ]; 121 121 }; 122 122 123 123 }
+2 -2
nixos/modules/system/boot/systemd.nix
··· 322 322 [Service] 323 323 ${let env = cfg.globalEnvironment // def.environment; 324 324 in concatMapStrings (n: 325 - let s = optionalString (env."${n}" != null) 325 + let s = optionalString (env.${n} != null) 326 326 "Environment=${builtins.toJSON "${n}=${env.${n}}"}\n"; 327 327 # systemd max line length is now 1MiB 328 328 # https://github.com/systemd/systemd/commit/e6dde451a51dc5aaa7f4d98d39b8fe735f73d2af ··· 490 490 systemd.generators = mkOption { 491 491 type = types.attrsOf types.path; 492 492 default = {}; 493 - example = { "systemd-gpt-auto-generator" = "/dev/null"; }; 493 + example = { systemd-gpt-auto-generator = "/dev/null"; }; 494 494 description = '' 495 495 Definition of systemd generators. 496 496 For each <literal>NAME = VALUE</literal> pair of the attrSet, a link is generated from
+2 -2
nixos/modules/tasks/filesystems.nix
··· 12 12 13 13 fileSystems' = toposort fsBefore (attrValues config.fileSystems); 14 14 15 - fileSystems = if fileSystems' ? "result" 15 + fileSystems = if fileSystems' ? result 16 16 then # use topologically sorted fileSystems everywhere 17 17 fileSystems'.result 18 18 else # the assertion below will catch this, ··· 211 211 ls = sep: concatMapStringsSep sep (x: x.mountPoint); 212 212 notAutoResizable = fs: fs.autoResize && !(hasPrefix "ext" fs.fsType || fs.fsType == "f2fs"); 213 213 in [ 214 - { assertion = ! (fileSystems' ? "cycle"); 214 + { assertion = ! (fileSystems' ? cycle); 215 215 message = "The ‘fileSystems’ option can't be topologically sorted: mountpoint dependency path ${ls " -> " fileSystems'.cycle} loops to ${ls ", " fileSystems'.loops}"; 216 216 } 217 217 { assertion = ! (any notAutoResizable fileSystems);
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
··· 469 469 map createSyncService allPools ++ 470 470 map createZfsService [ "zfs-mount" "zfs-share" "zfs-zed" ]); 471 471 472 - systemd.targets."zfs-import" = 472 + systemd.targets.zfs-import = 473 473 let 474 474 services = map (pool: "zfs-import-${pool}.service") dataPools; 475 475 in ··· 479 479 wantedBy = [ "zfs.target" ]; 480 480 }; 481 481 482 - systemd.targets."zfs".wantedBy = [ "multi-user.target" ]; 482 + systemd.targets.zfs.wantedBy = [ "multi-user.target" ]; 483 483 }) 484 484 485 485 (mkIf enableAutoSnapshots {
+3 -3
nixos/modules/tasks/kbd.nix
··· 73 73 74 74 config = mkMerge [ 75 75 (mkIf (!setVconsole) { 76 - systemd.services."systemd-vconsole-setup".enable = false; 76 + systemd.services.systemd-vconsole-setup.enable = false; 77 77 }) 78 78 79 79 (mkIf setVconsole (mkMerge [ ··· 83 83 # virtual consoles. 84 84 environment.etc."vconsole.conf".source = vconsoleConf; 85 85 # Provide kbd with additional packages. 86 - environment.etc."kbd".source = "${kbdEnv}/share"; 86 + environment.etc.kbd.source = "${kbdEnv}/share"; 87 87 88 88 boot.initrd.preLVMCommands = mkBefore '' 89 89 kbd_mode ${if isUnicode then "-u" else "-a"} -C /dev/console ··· 99 99 '') config.i18n.consoleColors} 100 100 ''; 101 101 102 - systemd.services."systemd-vconsole-setup" = 102 + systemd.services.systemd-vconsole-setup = 103 103 { before = [ "display-manager.service" ]; 104 104 after = [ "systemd-udev-settle.service" ]; 105 105 restartTriggers = [ vconsoleConf kbdEnv ];
+2 -2
nixos/modules/tasks/network-interfaces-scripted.nix
··· 498 498 // mapAttrs' createSitDevice cfg.sits 499 499 // mapAttrs' createVlanDevice cfg.vlans 500 500 // { 501 - "network-setup" = networkSetup; 502 - "network-local-commands" = networkLocalCommands; 501 + network-setup = networkSetup; 502 + network-local-commands = networkLocalCommands; 503 503 }; 504 504 505 505 services.udev.extraRules =
+3 -3
nixos/modules/tasks/network-interfaces-systemd.nix
··· 160 160 (mapAttrsToList (k: _: k) do); ""; 161 161 # get those driverOptions that have been set 162 162 filterSystemdOptions = filterAttrs (sysDOpt: kOpts: 163 - any (kOpt: do ? "${kOpt}") kOpts.optNames); 163 + any (kOpt: do ? ${kOpt}) kOpts.optNames); 164 164 # build final set of systemd options to bond values 165 165 buildOptionSet = mapAttrs (_: kOpts: with kOpts; 166 166 # we simply take the first set kernel bond option 167 167 # (one option has multiple names, which is silly) 168 - head (map (optN: valTransform (do."${optN}")) 168 + head (map (optN: valTransform (do.${optN})) 169 169 # only map those that exist 170 - (filter (o: do ? "${o}") optNames))); 170 + (filter (o: do ? ${o}) optNames))); 171 171 in seq assertNoUnknownOption 172 172 (buildOptionSet (filterSystemdOptions driverOptionMapping)); 173 173
+9 -9
nixos/modules/tasks/network-interfaces.nix
··· 799 799 networking.wlanInterfaces = mkOption { 800 800 default = { }; 801 801 example = literalExample { 802 - "wlan-station0" = { 802 + wlan-station0 = { 803 803 device = "wlp6s0"; 804 804 }; 805 - "wlan-adhoc0" = { 805 + wlan-adhoc0 = { 806 806 type = "ibss"; 807 807 device = "wlp6s0"; 808 808 mac = "02:00:00:00:00:01"; 809 809 }; 810 - "wlan-p2p0" = { 810 + wlan-p2p0 = { 811 811 device = "wlp6s0"; 812 812 mac = "02:00:00:00:00:02"; 813 813 }; 814 - "wlan-ap0" = { 814 + wlan-ap0 = { 815 815 device = "wlp6s0"; 816 816 mac = "02:00:00:00:00:03"; 817 817 }; ··· 994 994 domainname "${cfg.domain}" 995 995 ''; 996 996 997 - environment.etc."hostid" = mkIf (cfg.hostId != null) 997 + environment.etc.hostid = mkIf (cfg.hostId != null) 998 998 { source = pkgs.runCommand "gen-hostid" { preferLocalBuild = true; } '' 999 999 hi="${cfg.hostId}" 1000 1000 ${if pkgs.stdenv.isBigEndian then '' ··· 1007 1007 1008 1008 # static hostname configuration needed for hostnamectl and the 1009 1009 # org.freedesktop.hostname1 dbus service (both provided by systemd) 1010 - environment.etc."hostname" = mkIf (cfg.hostName != "") 1010 + environment.etc.hostname = mkIf (cfg.hostName != "") 1011 1011 { 1012 1012 text = cfg.hostName + "\n"; 1013 1013 }; ··· 1027 1027 1028 1028 # The network-interfaces target is kept for backwards compatibility. 1029 1029 # New modules must NOT use it. 1030 - systemd.targets."network-interfaces" = 1030 + systemd.targets.network-interfaces = 1031 1031 { description = "All Network Interfaces (deprecated)"; 1032 1032 wantedBy = [ "network.target" ]; 1033 1033 before = [ "network.target" ]; ··· 1162 1162 in 1163 1163 flip (concatMapStringsSep "\n") (attrNames wlanDeviceInterfaces) (device: 1164 1164 let 1165 - interfaces = wlanListDeviceFirst device wlanDeviceInterfaces."${device}"; 1165 + interfaces = wlanListDeviceFirst device wlanDeviceInterfaces.${device}; 1166 1166 curInterface = elemAt interfaces 0; 1167 1167 newInterfaces = drop 1 interfaces; 1168 1168 in '' 1169 1169 # It is important to have that rule first as overwriting the NAME attribute also prevents the 1170 1170 # next rules from matching. 1171 - ${flip (concatMapStringsSep "\n") (wlanListDeviceFirst device wlanDeviceInterfaces."${device}") (interface: 1171 + ${flip (concatMapStringsSep "\n") (wlanListDeviceFirst device wlanDeviceInterfaces.${device}) (interface: 1172 1172 ''ACTION=="add", SUBSYSTEM=="net", ENV{DEVTYPE}=="wlan", ENV{INTERFACE}=="${interface._iName}", ${systemdAttrs interface._iName}, RUN+="${newInterfaceScript device interface}"'')} 1173 1173 1174 1174 # Add the required, new WLAN interfaces to the default WLAN interface with the
+1 -1
nixos/modules/virtualisation/brightbox-image.nix
··· 111 111 # Always include cryptsetup so that NixOps can use it. 112 112 environment.systemPackages = [ pkgs.cryptsetup ]; 113 113 114 - systemd.services."fetch-ec2-data" = 114 + systemd.services.fetch-ec2-data = 115 115 { description = "Fetch EC2 Data"; 116 116 117 117 wantedBy = [ "multi-user.target" "sshd.service" ];
+1 -1
nixos/modules/virtualisation/containers.nix
··· 686 686 serviceConfig = serviceDirectives dummyConfig; 687 687 }; 688 688 in { 689 - systemd.targets."multi-user".wants = [ "machines.target" ]; 689 + systemd.targets.multi-user.wants = [ "machines.target" ]; 690 690 691 691 systemd.services = listToAttrs (filter (x: x.value != null) ( 692 692 # The generic container template used by imperative containers
+1 -1
nixos/modules/virtualisation/ec2-data.nix
··· 64 64 serviceConfig.RemainAfterExit = true; 65 65 }; 66 66 67 - systemd.services."print-host-key" = 67 + systemd.services.print-host-key = 68 68 { description = "Print SSH Host Key"; 69 69 wantedBy = [ "multi-user.target" ]; 70 70 after = [ "sshd.service" ];
+1 -1
nixos/modules/virtualisation/kvmgt.nix
··· 35 35 and find info about device via <command>cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description</command> 36 36 ''; 37 37 example = { 38 - "i915-GVTg_V5_8" = { 38 + i915-GVTg_V5_8 = { 39 39 uuid = "a297db4a-f4c2-11e6-90f6-d3b88d6c9525"; 40 40 }; 41 41 };
+1 -1
nixos/modules/virtualisation/virtualbox-host.nix
··· 122 122 123 123 # Since we lack the right setuid/setcap binaries, set up a host-only network by default. 124 124 } (mkIf cfg.addNetworkInterface { 125 - systemd.services."vboxnet0" = 125 + systemd.services.vboxnet0 = 126 126 { description = "VirtualBox vboxnet0 Interface"; 127 127 requires = [ "dev-vboxnetctl.device" ]; 128 128 after = [ "dev-vboxnetctl.device" ];
+1 -1
nixos/modules/virtualisation/vmware-guest.nix
··· 33 33 serviceConfig.ExecStart = "${open-vm-tools}/bin/vmtoolsd"; 34 34 }; 35 35 36 - environment.etc."vmware-tools".source = "${open-vm-tools}/etc/vmware-tools/*"; 36 + environment.etc.vmware-tools.source = "${open-vm-tools}/etc/vmware-tools/*"; 37 37 38 38 services.xserver = mkIf (!cfg.headless) { 39 39 videoDrivers = mkOverride 50 [ "vmware" ];
+3 -3
nixos/tests/beegfs.nix
··· 23 23 } 24 24 ]; 25 25 26 - environment.etc."${connAuthFile}" = { 26 + environment.etc.${connAuthFile} = { 27 27 enable = true; 28 28 text = "ThisIsALousySecret"; 29 29 mode = "0600"; ··· 47 47 ]; 48 48 49 49 environment.systemPackages = with pkgs; [ beegfs ]; 50 - environment.etc."${connAuthFile}" = { 50 + environment.etc.${connAuthFile} = { 51 51 enable = true; 52 52 text = "ThisIsALousySecret"; 53 53 mode = "0600"; ··· 57 57 services.beegfs.default = { 58 58 mgmtdHost = "mgmt"; 59 59 connAuthFile = "/etc/${connAuthFile}"; 60 - "${service}" = { 60 + ${service} = { 61 61 enable = true; 62 62 storeDir = "/data"; 63 63 };
+3 -3
nixos/tests/containers-reloadable.nix
··· 5 5 containers.test1 = { 6 6 autoStart = true; 7 7 config = { 8 - environment.etc."check".text = "client_base"; 8 + environment.etc.check.text = "client_base"; 9 9 }; 10 10 }; 11 11 ··· 29 29 imports = [ client_base ]; 30 30 31 31 containers.test1.config = { 32 - environment.etc."check".text = lib.mkForce "client_c1"; 32 + environment.etc.check.text = lib.mkForce "client_c1"; 33 33 services.httpd.enable = true; 34 34 services.httpd.adminAddr = "nixos@example.com"; 35 35 }; ··· 38 38 imports = [ client_base ]; 39 39 40 40 containers.test1.config = { 41 - environment.etc."check".text = lib.mkForce "client_c2"; 41 + environment.etc.check.text = lib.mkForce "client_c2"; 42 42 services.nginx.enable = true; 43 43 }; 44 44 };
+3 -3
nixos/tests/elk.nix
··· 178 178 ''; 179 179 }; 180 180 in mapAttrs mkElkTest { 181 - "ELK-5" = { 181 + ELK-5 = { 182 182 elasticsearch = pkgs.elasticsearch5; 183 183 logstash = pkgs.logstash5; 184 184 kibana = pkgs.kibana5; 185 185 journalbeat = pkgs.journalbeat5; 186 186 }; 187 - "ELK-6" = 187 + ELK-6 = 188 188 if enableUnfree 189 189 then { 190 190 elasticsearch = pkgs.elasticsearch6; ··· 198 198 kibana = pkgs.kibana6-oss; 199 199 journalbeat = pkgs.journalbeat6; 200 200 }; 201 - "ELK-7" = 201 + ELK-7 = 202 202 if enableUnfree 203 203 then { 204 204 elasticsearch = pkgs.elasticsearch7;
+1 -1
nixos/tests/env.nix
··· 7 7 machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages; 10 - environment.etc."plainFile".text = '' 10 + environment.etc.plainFile.text = '' 11 11 Hello World 12 12 ''; 13 13 environment.etc."folder/with/file".text = ''
+1 -1
nixos/tests/gitlab.nix
··· 21 21 enable = true; 22 22 recommendedProxySettings = true; 23 23 virtualHosts = { 24 - "localhost" = { 24 + localhost = { 25 25 locations."/".proxyPass = "http://unix:/run/gitlab/gitlab-workhorse.socket"; 26 26 }; 27 27 };
+1 -1
nixos/tests/kubernetes/base.nix
··· 71 71 443 # kubernetes apiserver 72 72 ]; 73 73 }) 74 - (optionalAttrs (machine ? "extraConfiguration") (machine.extraConfiguration { inherit config pkgs lib nodes; })) 74 + (optionalAttrs (machine ? extraConfiguration) (machine.extraConfiguration { inherit config pkgs lib nodes; })) 75 75 (optionalAttrs (extraConfiguration != null) (extraConfiguration { inherit config pkgs lib nodes; })) 76 76 ] 77 77 ) machines;
+1 -1
nixos/tests/ldap.nix
··· 115 115 ); 116 116 117 117 slapdDatabases = { 118 - "${dbSuffix}" = { 118 + ${dbSuffix} = { 119 119 conf = '' 120 120 dn: olcBackend={1}mdb,cn=config 121 121 objectClass: olcBackendConfig
+1 -1
nixos/tests/mosquitto.nix
··· 34 34 enable = true; 35 35 host = "0.0.0.0"; 36 36 checkPasswords = true; 37 - users."${username}" = { 37 + users.${username} = { 38 38 inherit password; 39 39 acl = [ 40 40 "topic readwrite ${topic}"
+1 -1
nixos/tests/ndppd.nix
··· 37 37 }; 38 38 services.ndppd = { 39 39 enable = true; 40 - proxies."eth1".rules."fd42::/112" = {}; 40 + proxies.eth1.rules."fd42::/112" = {}; 41 41 }; 42 42 containers.client = { 43 43 autoStart = true;
+3 -3
nixos/tests/networking.nix
··· 440 440 virtual = { 441 441 name = "Virtual"; 442 442 machine = { 443 - networking.interfaces."tap0" = { 443 + networking.interfaces.tap0 = { 444 444 ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ]; 445 445 ipv6.addresses = [ { address = "2001:1470:fffd:2096::"; prefixLength = 64; } ]; 446 446 virtual = true; 447 447 }; 448 - networking.interfaces."tun0" = { 448 + networking.interfaces.tun0 = { 449 449 ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ]; 450 450 ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ]; 451 451 virtual = true; ··· 561 561 name = "routes"; 562 562 machine = { 563 563 networking.useDHCP = false; 564 - networking.interfaces."eth0" = { 564 + networking.interfaces.eth0 = { 565 565 ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ]; 566 566 ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ]; 567 567 ipv6.routes = [
+1 -1
nixos/tests/nextcloud/with-mysql-and-memcached.nix
··· 50 50 ''; 51 51 }; 52 52 53 - systemd.services."nextcloud-setup"= { 53 + systemd.services.nextcloud-setup= { 54 54 requires = ["mysql.service"]; 55 55 after = ["mysql.service"]; 56 56 };
+2 -2
nixos/tests/nextcloud/with-postgresql-and-redis.nix
··· 51 51 serviceConfig.PermissionsStartOnly = true; 52 52 }; 53 53 54 - systemd.services."nextcloud-setup"= { 54 + systemd.services.nextcloud-setup= { 55 55 requires = ["postgresql.service"]; 56 56 after = [ 57 57 "postgresql.service" ··· 62 62 # At the time of writing, redis creates its socket with the "nobody" 63 63 # group. I figure this is slightly less bad than making the socket world 64 64 # readable. 65 - systemd.services."chown-redis-socket" = { 65 + systemd.services.chown-redis-socket = { 66 66 enable = true; 67 67 script = '' 68 68 until ${pkgs.redis}/bin/redis-cli ping; do
+1 -1
nixos/tests/nghttpx.nix
··· 15 15 16 16 services.nginx = { 17 17 enable = true; 18 - virtualHosts."server" = { 18 + virtualHosts.server = { 19 19 locations."/".root = nginxRoot; 20 20 }; 21 21 };
+1 -1
nixos/tests/pgmanage.nix
··· 21 21 pgmanage = { 22 22 enable = true; 23 23 connections = { 24 - "${conn}" = "hostaddr=127.0.0.1 port=${toString config.services.postgresql.port} dbname=postgres"; 24 + ${conn} = "hostaddr=127.0.0.1 port=${toString config.services.postgresql.port} dbname=postgres"; 25 25 }; 26 26 }; 27 27 };
+1 -1
nixos/tests/quake3.nix
··· 42 42 { server = 43 43 { pkgs, ... }: 44 44 45 - { systemd.services."quake3-server" = 45 + { systemd.services.quake3-server = 46 46 { wantedBy = [ "multi-user.target" ]; 47 47 script = 48 48 "${pkgs.quake3demo}/bin/quake3-server +set g_gametype 0 " +
+12 -12
nixos/tests/strongswan-swanctl.nix
··· 65 65 enable = true; 66 66 swanctl = { 67 67 connections = { 68 - "rw" = { 68 + rw = { 69 69 local_addrs = [ moonIp ]; 70 - local."main" = { 70 + local.main = { 71 71 auth = "psk"; 72 72 }; 73 - remote."main" = { 73 + remote.main = { 74 74 auth = "psk"; 75 75 }; 76 76 children = { 77 - "net" = { 77 + net = { 78 78 local_ts = [ vlan0 ]; 79 79 updown = "${strongswan}/libexec/ipsec/_updown iptables"; 80 80 inherit esp_proposals; ··· 85 85 }; 86 86 }; 87 87 secrets = { 88 - ike."carol" = { 89 - id."main" = carolIp; 88 + ike.carol = { 89 + id.main = carolIp; 90 90 inherit secret; 91 91 }; 92 92 }; ··· 107 107 enable = true; 108 108 swanctl = { 109 109 connections = { 110 - "home" = { 110 + home = { 111 111 local_addrs = [ carolIp ]; 112 112 remote_addrs = [ moonIp ]; 113 - local."main" = { 113 + local.main = { 114 114 auth = "psk"; 115 115 id = carolIp; 116 116 }; 117 - remote."main" = { 117 + remote.main = { 118 118 auth = "psk"; 119 119 id = moonIp; 120 120 }; 121 121 children = { 122 - "home" = { 122 + home = { 123 123 remote_ts = [ vlan0 ]; 124 124 start_action = "trap"; 125 125 updown = "${strongswan}/libexec/ipsec/_updown iptables"; ··· 131 131 }; 132 132 }; 133 133 secrets = { 134 - ike."moon" = { 135 - id."main" = moonIp; 134 + ike.moon = { 135 + id.main = moonIp; 136 136 inherit secret; 137 137 }; 138 138 };
+2 -2
pkgs/applications/editors/emacs-modes/libgenerated.nix
··· 53 53 , sha256 ? null 54 54 , ... }@args: 55 55 let 56 - sourceArgs = args."${variant}"; 56 + sourceArgs = args.${variant}; 57 57 version = sourceArgs.version or null; 58 58 deps = sourceArgs.deps or null; 59 59 error = sourceArgs.error or args.error or null; ··· 78 78 inherit sha256; 79 79 }; 80 80 packageRequires = lib.optional (! isNull deps) 81 - (map (dep: pkgargs."${dep}" or self."${dep}" or null) 81 + (map (dep: pkgargs.${dep} or self.${dep} or null) 82 82 deps); 83 83 meta = (sourceArgs.meta or {}) // { 84 84 inherit broken;
+1 -1
pkgs/applications/editors/emacs-modes/melpa-packages.nix
··· 500 500 }; 501 501 }; 502 502 503 - in super // overrides."${variant}"); 503 + in super // overrides.${variant}); 504 504 505 505 in generateMelpa { }
+4 -4
pkgs/applications/editors/standardnotes/default.nix
··· 4 4 version = "3.0.15"; 5 5 6 6 plat = { 7 - "i386-linux" = "i386"; 8 - "x86_64-linux" = "x86_64"; 7 + i386-linux = "i386"; 8 + x86_64-linux = "x86_64"; 9 9 }.${stdenv.hostPlatform.system}; 10 10 11 11 sha256 = { 12 - "i386-linux" = "0v2nsis6vb1lnhmjd28vrfxqwwpycv02j0nvjlfzcgj4b3400j7a"; 13 - "x86_64-linux" = "130n586cw0836zsbwqcz3pp3h0d4ny74ngqs4k4cvfb92556r7xh"; 12 + i386-linux = "0v2nsis6vb1lnhmjd28vrfxqwwpycv02j0nvjlfzcgj4b3400j7a"; 13 + x86_64-linux = "130n586cw0836zsbwqcz3pp3h0d4ny74ngqs4k4cvfb92556r7xh"; 14 14 }.${stdenv.hostPlatform.system}; 15 15 in 16 16
+1 -1
pkgs/applications/editors/vim/configurable.nix
··· 73 73 inherit (common) version postPatch hardeningDisable enableParallelBuilding meta; 74 74 75 75 src = builtins.getAttr source { 76 - "default" = common.src; # latest release 76 + default = common.src; # latest release 77 77 }; 78 78 79 79 patches = [ ./cflags-prune.diff ] ++ stdenv.lib.optional ftNixSupport ./ft-nix-support.patch;
+4 -4
pkgs/applications/editors/vscode/vscode.nix
··· 4 4 inherit (stdenv.hostPlatform) system; 5 5 6 6 plat = { 7 - "x86_64-linux" = "linux-x64"; 8 - "x86_64-darwin" = "darwin"; 7 + x86_64-linux = "linux-x64"; 8 + x86_64-darwin = "darwin"; 9 9 }.${system}; 10 10 11 11 archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz"; 12 12 13 13 sha256 = { 14 - "x86_64-linux" = "17g7mra9a52qlrrj77cw16vqvc7fsvbhc03wrl4iq1afzxsyqi22"; 15 - "x86_64-darwin" = "1is04anvhl2b354h5w7i5qi7ixhzna277f7xdy4qj9gjby6zydc6"; 14 + x86_64-linux = "17g7mra9a52qlrrj77cw16vqvc7fsvbhc03wrl4iq1afzxsyqi22"; 15 + x86_64-darwin = "1is04anvhl2b354h5w7i5qi7ixhzna277f7xdy4qj9gjby6zydc6"; 16 16 }.${system}; 17 17 in 18 18 callPackage ./generic.nix rec {
+4 -4
pkgs/applications/editors/vscode/vscodium.nix
··· 4 4 inherit (stdenv.hostPlatform) system; 5 5 6 6 plat = { 7 - "x86_64-linux" = "linux-x64"; 8 - "x86_64-darwin" = "darwin"; 7 + x86_64-linux = "linux-x64"; 8 + x86_64-darwin = "darwin"; 9 9 }.${system}; 10 10 11 11 archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz"; 12 12 13 13 sha256 = { 14 - "x86_64-linux" = "1ay4zvkbln2wf2j1d71mn13b6p2fqvzgz45mzrgaqwsszhbg4xzp"; 15 - "x86_64-darwin" = "17r9krb1qd92ybx078hkw9zlyym6kbnmbl91vjdilsq77bkf9jmw"; 14 + x86_64-linux = "1ay4zvkbln2wf2j1d71mn13b6p2fqvzgz45mzrgaqwsszhbg4xzp"; 15 + x86_64-darwin = "17r9krb1qd92ybx078hkw9zlyym6kbnmbl91vjdilsq77bkf9jmw"; 16 16 }.${system}; 17 17 in 18 18 callPackage ./generic.nix rec {
+1 -1
pkgs/applications/kde/default.nix
··· 38 38 let 39 39 inherit (args) name; 40 40 sname = args.sname or name; 41 - inherit (srcs."${sname}") src version; 41 + inherit (srcs.${sname}) src version; 42 42 mkDerivation = 43 43 libsForQt5.callPackage ({ mkDerivation }: mkDerivation) {}; 44 44 in
+5 -5
pkgs/applications/misc/taskjuggler/3.x/gemset.nix
··· 1 1 { 2 - "mail" = { 2 + mail = { 3 3 version = "2.6.3"; 4 4 source = { 5 5 type = "gem"; ··· 9 9 "mime-types" 10 10 ]; 11 11 }; 12 - "mime-types" = { 12 + mime-types = { 13 13 version = "2.6.1"; 14 14 source = { 15 15 type = "gem"; 16 16 sha256 = "1vnrvf245ijfyxzjbj9dr6i1hkjbyrh4yj88865wv9bs75axc5jv"; 17 17 }; 18 18 }; 19 - "taskjuggler" = { 19 + taskjuggler = { 20 20 version = "3.5.0"; 21 21 source = { 22 22 type = "gem"; ··· 27 27 "term-ansicolor" 28 28 ]; 29 29 }; 30 - "term-ansicolor" = { 30 + term-ansicolor = { 31 31 version = "1.3.2"; 32 32 source = { 33 33 type = "gem"; ··· 37 37 "tins" 38 38 ]; 39 39 }; 40 - "tins" = { 40 + tins = { 41 41 version = "1.6.0"; 42 42 source = { 43 43 type = "gem";
+2 -2
pkgs/applications/networking/browsers/firefox-bin/default.nix
··· 58 58 inherit (generated) version sources; 59 59 60 60 mozillaPlatforms = { 61 - "i686-linux" = "linux-i686"; 62 - "x86_64-linux" = "linux-x86_64"; 61 + i686-linux = "linux-i686"; 62 + x86_64-linux = "linux-x86_64"; 63 63 }; 64 64 65 65 arch = mozillaPlatforms.${stdenv.hostPlatform.system};
+3 -3
pkgs/applications/networking/browsers/tor-browser-bundle-bin/default.nix
··· 94 94 lang = "en-US"; 95 95 96 96 srcs = { 97 - "x86_64-linux" = fetchurl { 97 + x86_64-linux = fetchurl { 98 98 urls = [ 99 99 "https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux64-${version}_${lang}.tar.xz" 100 100 "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz" ··· 102 102 sha256 = "0nnzynk3nlnd847c8jjghs9anmr5a2hv7nk1qxigigxqa5vqy96z"; 103 103 }; 104 104 105 - "i686-linux" = fetchurl { 105 + i686-linux = fetchurl { 106 106 urls = [ 107 107 "https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz" 108 108 "https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux32-${version}_${lang}.tar.xz" ··· 116 116 pname = "tor-browser-bundle-bin"; 117 117 inherit version; 118 118 119 - src = srcs."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 119 + src = srcs.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 120 120 121 121 preferLocalBuild = true; 122 122 allowSubstitutes = false;
+2 -2
pkgs/applications/networking/dropbox/default.nix
··· 10 10 version = "73.4.118"; 11 11 12 12 arch = { 13 - "x86_64-linux" = "x86_64"; 14 - "i686-linux" = "x86"; 13 + x86_64-linux = "x86_64"; 14 + i686-linux = "x86"; 15 15 }.${stdenv.hostPlatform.system}; 16 16 17 17 installer = "https://clientupdates.dropboxstatic.com/dbx-releng/client/dropbox-lnx.${arch}-${version}.tar.gz";
+4 -4
pkgs/applications/networking/instant-messengers/wire-desktop/default.nix
··· 18 18 pname = "wire-desktop"; 19 19 20 20 version = { 21 - "x86_64-linux" = "3.9.2895"; 22 - "x86_64-darwin" = "3.9.2943"; 21 + x86_64-linux = "3.9.2895"; 22 + x86_64-darwin = "3.9.2943"; 23 23 }.${system} or throwSystem; 24 24 25 25 sha256 = { 26 - "x86_64-linux" = "0wrn95m64j4b7ym44h9zawq13kg4m12aixlyyzp56bfyczmjq4a5"; 27 - "x86_64-darwin" = "1y1bzsjmjrj518q29xfx6gg1nhdbaz7y5hzaqrp241az6plp090k"; 26 + x86_64-linux = "0wrn95m64j4b7ym44h9zawq13kg4m12aixlyyzp56bfyczmjq4a5"; 27 + x86_64-darwin = "1y1bzsjmjrj518q29xfx6gg1nhdbaz7y5hzaqrp241az6plp090k"; 28 28 }.${system} or throwSystem; 29 29 30 30 meta = with stdenv.lib; {
+2 -2
pkgs/applications/networking/p2p/soulseekqt/default.nix
··· 17 17 18 18 mainbin = "SoulseekQt-" + (version) +"-"+ (if stdenv.is64bit then "64bit" else "32bit"); 19 19 srcs = { 20 - "x86_64-linux" = fetchurl { 20 + x86_64-linux = fetchurl { 21 21 url = "https://www.dropbox.com/s/0vi87eef3ooh7iy/${mainbin}.tgz"; 22 22 sha256 = "0d1cayxr1a4j19bc5a3qp9pg22ggzmd55b6f5av3lc6lvwqqg4w6"; 23 23 }; ··· 27 27 28 28 pname = "soulseekqt"; 29 29 inherit version; 30 - src = srcs."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 30 + src = srcs.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 31 31 32 32 dontBuild = true; 33 33
+6 -6
pkgs/applications/networking/remote/anydesk/default.nix
··· 4 4 5 5 let 6 6 sha256 = { 7 - "x86_64-linux" = "08kdxsg9npb1nmlr2jyq7p238735kqkp7c5xckxn6rc4cp12n2y2"; 8 - "i686-linux" = "11r5d4234zbkkgyrd7q9x3w7s7lailnq7z4x8cnhpr8vipzrg7h2"; 9 - }."${stdenv.hostPlatform.system}" or (throw "system ${stdenv.hostPlatform.system} not supported"); 7 + x86_64-linux = "08kdxsg9npb1nmlr2jyq7p238735kqkp7c5xckxn6rc4cp12n2y2"; 8 + i686-linux = "11r5d4234zbkkgyrd7q9x3w7s7lailnq7z4x8cnhpr8vipzrg7h2"; 9 + }.${stdenv.hostPlatform.system} or (throw "system ${stdenv.hostPlatform.system} not supported"); 10 10 11 11 arch = { 12 - "x86_64-linux" = "amd64"; 13 - "i686-linux" = "i686"; 14 - }."${stdenv.hostPlatform.system}" or (throw "system ${stdenv.hostPlatform.system} not supported"); 12 + x86_64-linux = "amd64"; 13 + i686-linux = "i686"; 14 + }.${stdenv.hostPlatform.system} or (throw "system ${stdenv.hostPlatform.system} not supported"); 15 15 16 16 description = "Desktop sharing application, providing remote support and online meetings"; 17 17
+4 -4
pkgs/applications/networking/resilio-sync/default.nix
··· 2 2 3 3 let 4 4 arch = { 5 - "x86_64-linux" = "x64"; 6 - "i686-linux" = "i386"; 5 + x86_64-linux = "x64"; 6 + i686-linux = "i386"; 7 7 }.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}"); 8 8 libPath = stdenv.lib.makeLibraryPath [ stdenv.cc.libc ]; 9 9 ··· 14 14 src = fetchurl { 15 15 url = "https://download-cdn.resilio.com/${version}/linux-${arch}/resilio-sync_${arch}.tar.gz"; 16 16 sha256 = { 17 - "x86_64-linux" = "114k7dsxn7lzv6mjq9alsqxypvkah4lmjn5w6brbvgd6m6pdwslz"; 18 - "i686-linux" = "1dh0hxbd33bs51xib3qwxw58h9j30v0dc10b4x4rwkbgsj11nc83"; 17 + x86_64-linux = "114k7dsxn7lzv6mjq9alsqxypvkah4lmjn5w6brbvgd6m6pdwslz"; 18 + i686-linux = "1dh0hxbd33bs51xib3qwxw58h9j30v0dc10b4x4rwkbgsj11nc83"; 19 19 }.${stdenv.hostPlatform.system}; 20 20 }; 21 21
+2 -2
pkgs/applications/radio/gnuradio/ais.nix
··· 13 13 owner = "bistromath"; 14 14 repo = "gr-ais"; 15 15 # Upstream PR: https://github.com/bistromath/gr-ais/commit/8502d0252a2a1a9b8d1a71795eaeb5d820684054 16 - "rev" = "8502d0252a2a1a9b8d1a71795eaeb5d820684054"; 17 - "sha256" = "1b9j0kc74cw12a7jv4lii77dgzqzg2s8ndzp4xmisxksgva1qfvh"; 16 + rev = "8502d0252a2a1a9b8d1a71795eaeb5d820684054"; 17 + sha256 = "1b9j0kc74cw12a7jv4lii77dgzqzg2s8ndzp4xmisxksgva1qfvh"; 18 18 }; 19 19 20 20 nativeBuildInputs = [ pkgconfig ];
+1 -1
pkgs/applications/science/logic/coq/default.nix
··· 29 29 "8.9.0" = "1dkgdjc4n1m15m1p724hhi5cyxpqbjw6rxc5na6fl3v4qjjfnizh"; 30 30 "8.9.1" = "1xrq6mkhpq994bncmnijf8jwmwn961kkpl4mwwlv7j3dgnysrcv2"; 31 31 "8.10+beta2" = "0jk7pwydhd17ab7ii69zvi4sgrr630q2lsxhckaj3sz55cpjlhal"; 32 - }."${version}"; 32 + }.${version}; 33 33 coq-version = stdenv.lib.versions.majorMinor version; 34 34 versionAtLeast = stdenv.lib.versionAtLeast coq-version; 35 35 ideFlags = stdenv.lib.optionalString (buildIde && !versionAtLeast "8.10")
+4 -4
pkgs/applications/science/math/nauty/default.nix
··· 14 14 # Prevent nauty from sniffing some cpu features. While those are very 15 15 # widely available, it can lead to nasty bugs when they are not available: 16 16 # https://groups.google.com/forum/#!topic/sage-packaging/Pe4SRDNYlhA 17 - "default" = [ "--disable-clz" "--disable-popcnt" ]; 18 - "westmere" = [ "--disable-clz" ]; 19 - "sandybridge" = [ "--disable-clz" ]; 20 - "ivybridge" = [ "--disable-clz" ]; 17 + default = [ "--disable-clz" "--disable-popcnt" ]; 18 + westmere = [ "--disable-clz" ]; 19 + sandybridge = [ "--disable-clz" ]; 20 + ivybridge = [ "--disable-clz" ]; 21 21 }.${stdenv.hostPlatform.platform.gcc.arch or "default"} or []; 22 22 buildInputs = []; 23 23 installPhase = ''
+1 -1
pkgs/applications/video/kodi/plugins.nix
··· 172 172 }; 173 173 174 174 mkController = controller: { 175 - "${controller}" = mkKodiPlugin rec { 175 + ${controller} = mkKodiPlugin rec { 176 176 plugin = pname + "-" + controller; 177 177 namespace = "game.controller." + controller; 178 178 sourceDir = "addons/" + namespace;
+3 -3
pkgs/applications/virtualization/xen/4.10.nix
··· 47 47 48 48 # Sources needed to build tools and firmwares. 49 49 xenfiles = optionalAttrs withInternalQemu { 50 - "qemu-xen" = { 50 + qemu-xen = { 51 51 src = fetchgit { 52 52 url = https://xenbits.xen.org/git-http/qemu-xen.git; 53 53 # rev = "refs/tags/qemu-xen-${version}"; ··· 67 67 meta.description = "Xen's fork of upstream Qemu"; 68 68 }; 69 69 } // optionalAttrs withInternalTraditionalQemu { 70 - "qemu-xen-traditional" = { 70 + qemu-xen-traditional = { 71 71 src = fetchgit { 72 72 url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git; 73 73 # rev = "refs/tags/xen-${version}"; ··· 114 114 meta.description = "Xen's fork of iPXE"; 115 115 }; 116 116 } // optionalAttrs withLibHVM { 117 - "xen-libhvm-dir-remote" = { 117 + xen-libhvm-dir-remote = { 118 118 src = fetchgit { 119 119 name = "xen-libhvm"; 120 120 url = https://github.com/michalpalka/xen-libhvm;
+3 -3
pkgs/applications/virtualization/xen/4.5.nix
··· 50 50 51 51 # Sources needed to build tools and firmwares. 52 52 xenfiles = optionalAttrs withInternalQemu { 53 - "qemu-xen" = { 53 + qemu-xen = { 54 54 src = fetchgit { 55 55 url = https://xenbits.xen.org/git-http/qemu-xen.git; 56 56 rev = "refs/tags/qemu-xen-${version}"; ··· 86 86 meta.description = "Xen's fork of upstream Qemu"; 87 87 }; 88 88 } // optionalAttrs withInternalTraditionalQemu { 89 - "qemu-xen-traditional" = { 89 + qemu-xen-traditional = { 90 90 src = fetchgit { 91 91 url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git; 92 92 rev = "refs/tags/xen-${version}"; ··· 152 152 meta.description = "Xen's fork of iPXE"; 153 153 }; 154 154 } // optionalAttrs withLibHVM { 155 - "xen-libhvm-dir-remote" = { 155 + xen-libhvm-dir-remote = { 156 156 src = fetchgit { 157 157 name = "xen-libhvm"; 158 158 url = https://github.com/ts468/xen-libhvm;
+3 -3
pkgs/applications/virtualization/xen/4.8.nix
··· 59 59 60 60 # Sources needed to build tools and firmwares. 61 61 xenfiles = optionalAttrs withInternalQemu { 62 - "qemu-xen" = { 62 + qemu-xen = { 63 63 src = fetchgit { 64 64 url = https://xenbits.xen.org/git-http/qemu-xen.git; 65 65 rev = "refs/tags/qemu-xen-${version}"; ··· 72 72 meta.description = "Xen's fork of upstream Qemu"; 73 73 }; 74 74 } // optionalAttrs withInternalTraditionalQemu { 75 - "qemu-xen-traditional" = { 75 + qemu-xen-traditional = { 76 76 src = fetchgit { 77 77 url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git; 78 78 rev = "refs/tags/xen-${version}"; ··· 117 117 meta.description = "Xen's fork of iPXE"; 118 118 }; 119 119 } // optionalAttrs withLibHVM { 120 - "xen-libhvm-dir-remote" = { 120 + xen-libhvm-dir-remote = { 121 121 src = fetchgit { 122 122 name = "xen-libhvm"; 123 123 url = https://github.com/michalpalka/xen-libhvm;
+2 -2
pkgs/applications/window-managers/stumpwm/default.nix
··· 10 10 sha256 = "1ml6mjk2fsfv4sf65fdbji3q5x0qiq99g1k8w7a99gsl2i8h60gc"; 11 11 }); 12 12 versionSpec = { 13 - "latest" = { 13 + latest = { 14 14 name = "1.0.0"; 15 15 rev = "refs/tags/1.0.0"; 16 16 sha256 = "16r0lwhxl8g71masmfbjr7s7m7fah4ii4smi1g8zpbpiqjz48ryb"; ··· 22 22 sha256 = "0hmvbdk2yr5wrkiwn9dfzf65s4xc2qifj0sn6w2mghzp96cph79k"; 23 23 patches = [ ./fix-module-path.patch ]; 24 24 }; 25 - "git" = { 25 + git = { 26 26 name = "git-20170203"; 27 27 rev = "d20f24e58ab62afceae2afb6262ffef3cc318b97"; 28 28 sha256 = "1gi29ds1x6dq7lz8lamnhcvcrr3cvvrg5yappfkggyhyvib1ii70";
+3 -3
pkgs/applications/window-managers/way-cooler/default.nix
··· 16 16 # https://nest.pijul.com/pmeunier/carnix/discussions/22 17 17 version = "0.8.1"; 18 18 deps = (callPackage ./way-cooler.nix {}).deps; 19 - way_cooler_ = f: cratesIO.crates.way_cooler."${version}" deps { 20 - features = cratesIO.features_.way_cooler."${version}" deps { 21 - "way_cooler"."${version}" = f; 19 + way_cooler_ = f: cratesIO.crates.way_cooler.${version} deps { 20 + features = cratesIO.features_.way_cooler.${version} deps { 21 + way_cooler.${version} = f; 22 22 }; 23 23 }; 24 24 way-cooler = ((way_cooler_ { builtin-lua = true; }).override {
+4 -4
pkgs/build-support/bintools-wrapper/default.nix
··· 180 180 else if targetPlatform.isx86_64 then "x86-64" 181 181 else if targetPlatform.isx86_32 then "i386" 182 182 else if targetPlatform.isMips then { 183 - "mips" = "btsmipn32"; # n32 variant 184 - "mipsel" = "ltsmipn32"; # n32 variant 185 - "mips64" = "btsmip"; 186 - "mips64el" = "ltsmip"; 183 + mips = "btsmipn32"; # n32 variant 184 + mipsel = "ltsmipn32"; # n32 variant 185 + mips64 = "btsmip"; 186 + mips64el = "ltsmip"; 187 187 }.${targetPlatform.parsed.cpu.name} 188 188 else if targetPlatform.isPower then if targetPlatform.isBigEndian then "ppc" else "lppc" 189 189 else if targetPlatform.isSparc then "sparc"
+2 -2
pkgs/build-support/fetchdocker/default.nix
··· 37 37 38 38 repositories = 39 39 writeText "repositories" (builtins.toJSON { 40 - "${repoTag1}" = { 41 - "${tag}" = lib.last layers; 40 + ${repoTag1} = { 41 + ${tag} = lib.last layers; 42 42 }; 43 43 }); 44 44
+16 -16
pkgs/build-support/rust/build-rust-crate/test/brotli-crates.nix
··· 52 52 features = mkFeatures (features.brotli_2_5_0 or {}); 53 53 }; 54 54 brotli_2_5_0_features = f: updateFeatures f (rec { 55 - alloc_no_stdlib_1_3_0."no-stdlib" = 56 - (f.alloc_no_stdlib_1_3_0."no-stdlib" or false) || 57 - (brotli_2_5_0."no-stdlib" or false) || 58 - (f.brotli_2_5_0."no-stdlib" or false); 55 + alloc_no_stdlib_1_3_0.no-stdlib = 56 + (f.alloc_no_stdlib_1_3_0.no-stdlib or false) || 57 + (brotli_2_5_0.no-stdlib or false) || 58 + (f.brotli_2_5_0.no-stdlib or false); 59 59 alloc_no_stdlib_1_3_0.default = true; 60 60 brotli_2_5_0.default = (f.brotli_2_5_0.default or true); 61 - brotli_decompressor_1_3_1."disable-timer" = 62 - (f.brotli_decompressor_1_3_1."disable-timer" or false) || 63 - (brotli_2_5_0."disable-timer" or false) || 64 - (f.brotli_2_5_0."disable-timer" or false); 65 - brotli_decompressor_1_3_1."no-stdlib" = 66 - (f.brotli_decompressor_1_3_1."no-stdlib" or false) || 67 - (brotli_2_5_0."no-stdlib" or false) || 68 - (f.brotli_2_5_0."no-stdlib" or false); 61 + brotli_decompressor_1_3_1.disable-timer = 62 + (f.brotli_decompressor_1_3_1.disable-timer or false) || 63 + (brotli_2_5_0.disable-timer or false) || 64 + (f.brotli_2_5_0.disable-timer or false); 65 + brotli_decompressor_1_3_1.no-stdlib = 66 + (f.brotli_decompressor_1_3_1.no-stdlib or false) || 67 + (brotli_2_5_0.no-stdlib or false) || 68 + (f.brotli_2_5_0.no-stdlib or false); 69 69 brotli_decompressor_1_3_1.benchmark = 70 70 (f.brotli_decompressor_1_3_1.benchmark or false) || 71 71 (brotli_2_5_0.benchmark or false) || ··· 81 81 features = mkFeatures (features.brotli_decompressor_1_3_1 or {}); 82 82 }; 83 83 brotli_decompressor_1_3_1_features = f: updateFeatures f (rec { 84 - alloc_no_stdlib_1_3_0."no-stdlib" = 85 - (f.alloc_no_stdlib_1_3_0."no-stdlib" or false) || 86 - (brotli_decompressor_1_3_1."no-stdlib" or false) || 87 - (f.brotli_decompressor_1_3_1."no-stdlib" or false); 84 + alloc_no_stdlib_1_3_0.no-stdlib = 85 + (f.alloc_no_stdlib_1_3_0.no-stdlib or false) || 86 + (brotli_decompressor_1_3_1.no-stdlib or false) || 87 + (f.brotli_decompressor_1_3_1.no-stdlib or false); 88 88 alloc_no_stdlib_1_3_0.default = true; 89 89 alloc_no_stdlib_1_3_0.unsafe = 90 90 (f.alloc_no_stdlib_1_3_0.unsafe or false) ||
+2 -2
pkgs/build-support/rust/default.nix
··· 44 44 hostConfig = stdenv.hostPlatform.config; 45 45 46 46 rustHostConfig = { 47 - "x86_64-pc-mingw32" = "x86_64-pc-windows-gnu"; 48 - }."${hostConfig}" or hostConfig; 47 + x86_64-pc-mingw32 = "x86_64-pc-windows-gnu"; 48 + }.${hostConfig} or hostConfig; 49 49 50 50 ccForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}cc"; 51 51 cxxForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}c++";
+52 -52
pkgs/data/fonts/iosevka/package-lock.nix
··· 14 14 0; 15 15 chars = stringToCharacters (substring 0 (len - padding) str); 16 16 table = { 17 - "A" = [0 0 0]; 18 - "B" = [0 0 1]; 19 - "C" = [0 0 2]; 20 - "D" = [0 0 3]; 21 - "E" = [0 1 0]; 22 - "F" = [0 1 1]; 23 - "G" = [0 1 2]; 24 - "H" = [0 1 3]; 25 - "I" = [0 2 0]; 26 - "J" = [0 2 1]; 27 - "K" = [0 2 2]; 28 - "L" = [0 2 3]; 29 - "M" = [0 3 0]; 30 - "N" = [0 3 1]; 31 - "O" = [0 3 2]; 32 - "P" = [0 3 3]; 33 - "Q" = [1 0 0]; 34 - "R" = [1 0 1]; 35 - "S" = [1 0 2]; 36 - "T" = [1 0 3]; 37 - "U" = [1 1 0]; 38 - "V" = [1 1 1]; 39 - "W" = [1 1 2]; 40 - "X" = [1 1 3]; 41 - "Y" = [1 2 0]; 42 - "Z" = [1 2 1]; 43 - "a" = [1 2 2]; 44 - "b" = [1 2 3]; 45 - "c" = [1 3 0]; 46 - "d" = [1 3 1]; 47 - "e" = [1 3 2]; 48 - "f" = [1 3 3]; 49 - "g" = [2 0 0]; 50 - "h" = [2 0 1]; 51 - "i" = [2 0 2]; 52 - "j" = [2 0 3]; 53 - "k" = [2 1 0]; 54 - "l" = [2 1 1]; 55 - "m" = [2 1 2]; 56 - "n" = [2 1 3]; 57 - "o" = [2 2 0]; 58 - "p" = [2 2 1]; 59 - "q" = [2 2 2]; 60 - "r" = [2 2 3]; 61 - "s" = [2 3 0]; 62 - "t" = [2 3 1]; 63 - "u" = [2 3 2]; 64 - "v" = [2 3 3]; 65 - "w" = [3 0 0]; 66 - "x" = [3 0 1]; 67 - "y" = [3 0 2]; 68 - "z" = [3 0 3]; 17 + A = [0 0 0]; 18 + B = [0 0 1]; 19 + C = [0 0 2]; 20 + D = [0 0 3]; 21 + E = [0 1 0]; 22 + F = [0 1 1]; 23 + G = [0 1 2]; 24 + H = [0 1 3]; 25 + I = [0 2 0]; 26 + J = [0 2 1]; 27 + K = [0 2 2]; 28 + L = [0 2 3]; 29 + M = [0 3 0]; 30 + N = [0 3 1]; 31 + O = [0 3 2]; 32 + P = [0 3 3]; 33 + Q = [1 0 0]; 34 + R = [1 0 1]; 35 + S = [1 0 2]; 36 + T = [1 0 3]; 37 + U = [1 1 0]; 38 + V = [1 1 1]; 39 + W = [1 1 2]; 40 + X = [1 1 3]; 41 + Y = [1 2 0]; 42 + Z = [1 2 1]; 43 + a = [1 2 2]; 44 + b = [1 2 3]; 45 + c = [1 3 0]; 46 + d = [1 3 1]; 47 + e = [1 3 2]; 48 + f = [1 3 3]; 49 + g = [2 0 0]; 50 + h = [2 0 1]; 51 + i = [2 0 2]; 52 + j = [2 0 3]; 53 + k = [2 1 0]; 54 + l = [2 1 1]; 55 + m = [2 1 2]; 56 + n = [2 1 3]; 57 + o = [2 2 0]; 58 + p = [2 2 1]; 59 + q = [2 2 2]; 60 + r = [2 2 3]; 61 + s = [2 3 0]; 62 + t = [2 3 1]; 63 + u = [2 3 2]; 64 + v = [2 3 3]; 65 + w = [3 0 0]; 66 + x = [3 0 1]; 67 + y = [3 0 2]; 68 + z = [3 0 3]; 69 69 "0" = [3 1 0]; 70 70 "1" = [3 1 1]; 71 71 "2" = [3 1 2];
+1 -1
pkgs/desktops/pantheon/update.nix
··· 31 31 32 32 throwFlag = throw "${versionPolicy} is not a valid versionPolicy - Options are either 'release' or 'master' (defaults to release)."; 33 33 34 - versionFlag = { "release" = "-r"; "master" = "-m"; }.${versionPolicy} or throwFlag; 34 + versionFlag = { release = "-r"; master = "-m"; }.${versionPolicy} or throwFlag; 35 35 36 36 in [ updateScript versionFlag repoName attrPath ]
+1 -1
pkgs/desktops/plasma-5/default.nix
··· 72 72 let 73 73 inherit (args) name; 74 74 sname = args.sname or name; 75 - inherit (srcs."${sname}") src version; 75 + inherit (srcs.${sname}) src version; 76 76 77 77 outputs = args.outputs or [ "out" ]; 78 78 hasBin = lib.elem "bin" outputs;
+6 -6
pkgs/development/androidndk-pkgs/androidndk-pkgs.nix
··· 12 12 # than we do. We don't just use theirs because ours are less ambiguous and 13 13 # some builds need that clarity. 14 14 ndkInfoFun = { config, ... }: { 15 - "x86_64-apple-darwin" = { 15 + x86_64-apple-darwin = { 16 16 double = "darwin-x86_64"; 17 17 }; 18 - "x86_64-unknown-linux-gnu" = { 18 + x86_64-unknown-linux-gnu = { 19 19 double = "linux-x86_64"; 20 20 }; 21 - "i686-unknown-linux-android" = { 21 + i686-unknown-linux-android = { 22 22 triple = "i686-linux-android"; 23 23 arch = "x86"; 24 24 toolchain = "x86"; 25 25 gccVer = "4.9"; 26 26 }; 27 - "x86_64-unknown-linux-android" = { 27 + x86_64-unknown-linux-android = { 28 28 triple = "x86_64-linux-android"; 29 29 arch = "x86_64"; 30 30 toolchain = "x86_64"; 31 31 gccVer = "4.9"; 32 32 }; 33 - "armv7a-unknown-linux-androideabi" = { 33 + armv7a-unknown-linux-androideabi = { 34 34 arch = "arm"; 35 35 triple = "arm-linux-androideabi"; 36 36 toolchain = "arm-linux-androideabi"; 37 37 gccVer = "4.9"; 38 38 }; 39 - "aarch64-unknown-linux-android" = { 39 + aarch64-unknown-linux-android = { 40 40 arch = "arm64"; 41 41 triple = "aarch64-linux-android"; 42 42 toolchain = "aarch64-linux-android";
+1 -1
pkgs/development/compilers/binaryen/default.nix
··· 5 5 6 6 # Map from git revs to SHA256 hashes 7 7 sha256s = { 8 - "version_89" = "0rh1dq33ilq54szfgi1ajaiaj7rbylai02rhp9zm9vpwp0rw8mij"; 8 + version_89 = "0rh1dq33ilq54szfgi1ajaiaj7rbylai02rhp9zm9vpwp0rw8mij"; 9 9 "1.38.28" = "172s7y5f38736ic8ri3mnbdqcrkadd40a26cxcfwbscc53phl11v"; 10 10 }; 11 11 in
+1 -1
pkgs/development/compilers/ccl/default.nix
··· 29 29 }; 30 30 armv6l-linux = armv7l-linux; 31 31 }; 32 - cfg = options."${stdenv.hostPlatform.system}" or (throw "missing source url for platform ${stdenv.hostPlatform.system}"); 32 + cfg = options.${stdenv.hostPlatform.system} or (throw "missing source url for platform ${stdenv.hostPlatform.system}"); 33 33 in 34 34 35 35 stdenv.mkDerivation rec {
+14 -14
pkgs/development/compilers/crystal/default.nix
··· 12 12 13 13 let 14 14 archs = { 15 - "x86_64-linux" = "linux-x86_64"; 16 - "i686-linux" = "linux-i686"; 17 - "x86_64-darwin" = "darwin-x86_64"; 15 + x86_64-linux = "linux-x86_64"; 16 + i686-linux = "linux-i686"; 17 + x86_64-darwin = "darwin-x86_64"; 18 18 }; 19 19 20 - arch = archs."${stdenv.system}" or (throw "system ${stdenv.system} not supported"); 20 + arch = archs.${stdenv.system} or (throw "system ${stdenv.system} not supported"); 21 21 22 22 checkInputs = [ git gmp openssl readline libxml2 libyaml ]; 23 23 ··· 28 28 29 29 src = fetchurl { 30 30 url = "https://github.com/crystal-lang/crystal/releases/download/${version}/crystal-${version}-${toString rel}-${arch}.tar.gz"; 31 - sha256 = sha256s."${stdenv.system}"; 31 + sha256 = sha256s.${stdenv.system}; 32 32 }; 33 33 34 34 buildCommand = '' ··· 148 148 binaryCrystal_0_26 = genericBinary { 149 149 version = "0.26.1"; 150 150 sha256s = { 151 - "x86_64-linux" = "1xban102yiiwmlklxvn3xp3q546bp8hlxxpakayajkhhnpl6yv45"; 152 - "i686-linux" = "1igspf1lrv7wpmz0pfrkbx8m1ykvnv4zhic53cav4nicppm2v0ic"; 153 - "x86_64-darwin" = "1mri8bfrcldl69gczxpihxpv1shn4bijx28m3qby8vnk0ii63n9s"; 151 + x86_64-linux = "1xban102yiiwmlklxvn3xp3q546bp8hlxxpakayajkhhnpl6yv45"; 152 + i686-linux = "1igspf1lrv7wpmz0pfrkbx8m1ykvnv4zhic53cav4nicppm2v0ic"; 153 + x86_64-darwin = "1mri8bfrcldl69gczxpihxpv1shn4bijx28m3qby8vnk0ii63n9s"; 154 154 }; 155 155 }; 156 156 157 157 binaryCrystal_0_27 = genericBinary { 158 158 version = "0.27.2"; 159 159 sha256s = { 160 - "x86_64-linux" = "05l5x7kx2acgnv42fj3rr17z73ix06zvi05h7d7vf3kw0izxrasm"; 161 - "i686-linux" = "1iwizkvn6pglc0azkyfhlmk9ap793krdgcnbihd1kvrvs4cz0mm9"; 162 - "x86_64-darwin" = "14c69ac2dmfwmb5q56ps3xyxxb0mrbc91ahk9h07c8fiqfii3k9g"; 160 + x86_64-linux = "05l5x7kx2acgnv42fj3rr17z73ix06zvi05h7d7vf3kw0izxrasm"; 161 + i686-linux = "1iwizkvn6pglc0azkyfhlmk9ap793krdgcnbihd1kvrvs4cz0mm9"; 162 + x86_64-darwin = "14c69ac2dmfwmb5q56ps3xyxxb0mrbc91ahk9h07c8fiqfii3k9g"; 163 163 }; 164 164 }; 165 165 166 166 binaryCrystal_0_29 = genericBinary { 167 167 version = "0.29.0"; 168 168 sha256s = { 169 - "x86_64-linux" = "1wrk29sfx35akg7hxwpdiikvl18wd40gq1kwirw7x522hnq7vlna"; 170 - "i686-linux" = "1nx0piis2k3nn7kqiijqazzbvlaavhgvsln0l3dxmpfa4i4dz5h2"; 171 - "x86_64-darwin" = "1fd0fbyf05abivnp3igjlrm2axf65n2wdmg4aq6nqj60ipc01rvd"; 169 + x86_64-linux = "1wrk29sfx35akg7hxwpdiikvl18wd40gq1kwirw7x522hnq7vlna"; 170 + i686-linux = "1nx0piis2k3nn7kqiijqazzbvlaavhgvsln0l3dxmpfa4i4dz5h2"; 171 + x86_64-darwin = "1fd0fbyf05abivnp3igjlrm2axf65n2wdmg4aq6nqj60ipc01rvd"; 172 172 }; 173 173 }; 174 174
+1 -1
pkgs/development/compilers/dmd/default.nix
··· 13 13 dmdConfFile = writeTextFile { 14 14 name = "dmd.conf"; 15 15 text = (lib.generators.toINI {} { 16 - "Environment" = { 16 + Environment = { 17 17 DFLAGS = ''-I@out@/include/dmd -L-L@out@/lib -fPIC ${stdenv.lib.optionalString (!targetPackages.stdenv.cc.isClang) "-L--export-dynamic"}''; 18 18 }; 19 19 });
+1 -1
pkgs/development/compilers/elm/packages/node-composition.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ./node-env.nix {
+5 -5
pkgs/development/compilers/ghc/8.2.2-binary.nix
··· 29 29 name = "ghc-${version}-binary"; 30 30 31 31 src = fetchurl ({ 32 - "i686-linux" = { 32 + i686-linux = { 33 33 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz"; 34 34 sha256 = "08w2ik55dp3n95qikmrflc91lsiq01xp53ki3jlhnbj8fqnxfrwy"; 35 35 }; 36 - "x86_64-linux" = { 36 + x86_64-linux = { 37 37 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz"; 38 38 sha256 = "0ahv26304pqi3dm7i78si4pxwvg5f5dc2jwsfgvcrhcx5g30bqj8"; 39 39 }; 40 - "armv7l-linux" = { 40 + armv7l-linux = { 41 41 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-armv7-deb8-linux.tar.xz"; 42 42 sha256 = "1jmv8qmnh5bn324fivbwdcaj55kvw7cb2zq9pafmlmv3qwwx7s46"; 43 43 }; 44 - "aarch64-linux" = { 44 + aarch64-linux = { 45 45 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-aarch64-deb8-linux.tar.xz"; 46 46 sha256 = "1k2amylcp1ad67c75h1pqf7czf9m0zj1i7hdc45ghjklnfq9hrk7"; 47 47 }; 48 - "x86_64-darwin" = { 48 + x86_64-darwin = { 49 49 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz"; 50 50 sha256 = "09swx71gh5habzbx55shz2xykgr96xkcy09nzinnm4z0yxicy3zr"; 51 51 };
+3 -3
pkgs/development/compilers/ghc/8.6.3-binary.nix
··· 29 29 name = "ghc-${version}-binary"; 30 30 31 31 src = fetchurl ({ 32 - "i686-linux" = { 32 + i686-linux = { 33 33 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz"; 34 34 sha256 = "0bw8a7fxcbskf93rb4m542ff66vrmx5i5kj77qx37cbhijx70w5m"; 35 35 }; 36 - "x86_64-linux" = { 36 + x86_64-linux = { 37 37 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz"; 38 38 sha256 = "1m9gaga2pzi2cx5gvasg0rx1dlvr68gmi20l67652kag6xjsa719"; 39 39 }; 40 - "x86_64-darwin" = { 40 + x86_64-darwin = { 41 41 url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz"; 42 42 sha256 = "1hbzk57v45176kxcx848p5jn5p1xbp2129ramkbzsk6plyhnkl3r"; 43 43 };
+7 -7
pkgs/development/compilers/go/1.11.nix
··· 17 17 ''; 18 18 19 19 goarch = platform: { 20 - "i686" = "386"; 21 - "x86_64" = "amd64"; 22 - "aarch64" = "arm64"; 23 - "arm" = "arm"; 24 - "armv5tel" = "arm"; 25 - "armv6l" = "arm"; 26 - "armv7l" = "arm"; 20 + i686 = "386"; 21 + x86_64 = "amd64"; 22 + aarch64 = "arm64"; 23 + arm = "arm"; 24 + armv5tel = "arm"; 25 + armv6l = "arm"; 26 + armv7l = "arm"; 27 27 }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 28 28 29 29 in
+7 -7
pkgs/development/compilers/go/1.12.nix
··· 17 17 ''; 18 18 19 19 goarch = platform: { 20 - "i686" = "386"; 21 - "x86_64" = "amd64"; 22 - "aarch64" = "arm64"; 23 - "arm" = "arm"; 24 - "armv5tel" = "arm"; 25 - "armv6l" = "arm"; 26 - "armv7l" = "arm"; 20 + i686 = "386"; 21 + x86_64 = "amd64"; 22 + aarch64 = "arm64"; 23 + arm = "arm"; 24 + armv5tel = "arm"; 25 + armv6l = "arm"; 26 + armv7l = "arm"; 27 27 }.${platform.parsed.cpu.name} or (throw "Unsupported system"); 28 28 29 29 in
+1 -1
pkgs/development/compilers/go/1.4.nix
··· 4 4 , Security }: 5 5 6 6 let 7 - libc = if stdenv ? "cross" then libcCross else stdenv.cc.libc; 7 + libc = if stdenv ? cross then libcCross else stdenv.cc.libc; 8 8 in 9 9 10 10 stdenv.mkDerivation rec {
+2 -2
pkgs/development/compilers/julia/shared.nix
··· 129 129 makeFlags = 130 130 let 131 131 arch = head (splitString "-" stdenv.system); 132 - march = { "x86_64" = stdenv.hostPlatform.platform.gcc.arch or "x86-64"; "i686" = "pentium4"; }."${arch}" 132 + march = { x86_64 = stdenv.hostPlatform.platform.gcc.arch or "x86-64"; i686 = "pentium4"; }.${arch} 133 133 or (throw "unsupported architecture: ${arch}"); 134 134 # Julia requires Pentium 4 (SSE2) or better 135 - cpuTarget = { "x86_64" = "x86-64"; "i686" = "pentium4"; }."${arch}" 135 + cpuTarget = { x86_64 = "x86-64"; i686 = "pentium4"; }.${arch} 136 136 or (throw "unsupported architecture: ${arch}"); 137 137 in [ 138 138 "ARCH=${arch}"
+2 -2
pkgs/development/compilers/mozart/binary.nix
··· 8 8 version = "2.0.0"; 9 9 10 10 binaries = { 11 - "x86_64-linux" = fetchurl { 11 + x86_64-linux = fetchurl { 12 12 url = "mirror://sourceforge/project/mozart-oz/v${version}-alpha.0/mozart2-${version}-alpha.0+build.4105.5c06ced-x86_64-linux.tar.gz"; 13 13 sha256 = "0rsfrjimjxqbwprpzzlmydl3z3aiwg5qkb052jixdxjyad7gyh5z"; 14 14 }; ··· 21 21 22 22 preferLocalBuild = true; 23 23 24 - src = binaries."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 24 + src = binaries.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 25 25 26 26 libPath = stdenv.lib.makeLibraryPath 27 27 [ stdenv.cc.cc
+3 -3
pkgs/development/compilers/openjdk/8.nix
··· 15 15 * The JRE libraries are in directories that depend on the CPU. 16 16 */ 17 17 architecture = { 18 - "i686-linux" = "i386"; 19 - "x86_64-linux" = "amd64"; 20 - "aarch64-linux" = "aarch64"; 18 + i686-linux = "i386"; 19 + x86_64-linux = "amd64"; 20 + aarch64-linux = "aarch64"; 21 21 }.${stdenv.system} or (throw "Unsupported platform"); 22 22 23 23 update = "222";
+2 -2
pkgs/development/compilers/openjdk/openjfx/11.nix
··· 59 59 outputHashMode = "recursive"; 60 60 # Downloaded AWT jars differ by platform. 61 61 outputHash = { 62 - "i686-linux" = "0mjlyf6jvbis7nrm5d394sjv4hjw6k3753hr1nwdxk8skwc3ry08"; 63 - "x86_64-linux" = "0d4msxswdav1xsfkpr0qd3xgqkcbxzf47v1zdy5jmg5w4bs6a78a"; 62 + i686-linux = "0mjlyf6jvbis7nrm5d394sjv4hjw6k3753hr1nwdxk8skwc3ry08"; 63 + x86_64-linux = "0d4msxswdav1xsfkpr0qd3xgqkcbxzf47v1zdy5jmg5w4bs6a78a"; 64 64 }.${stdenv.system} or (throw "Unsupported platform"); 65 65 }; 66 66
+2 -2
pkgs/development/compilers/openjdk/openjfx/12.nix
··· 59 59 outputHashMode = "recursive"; 60 60 # Downloaded AWT jars differ by platform. 61 61 outputHash = { 62 - "x86_64-linux" = "1z5qar5l28ja4pkf5l5m48xbv3x1yrnilsv9lpf2j3vkdk9h1nci"; 63 - "i686-linux" = "0rbygvjc7w197fi5nxldqdrm6mpiyd3n45042g3gd4s5qk08spjd"; 62 + x86_64-linux = "1z5qar5l28ja4pkf5l5m48xbv3x1yrnilsv9lpf2j3vkdk9h1nci"; 63 + i686-linux = "0rbygvjc7w197fi5nxldqdrm6mpiyd3n45042g3gd4s5qk08spjd"; 64 64 }.${stdenv.system} or (throw "Unsupported platform"); 65 65 }; 66 66
+1 -1
pkgs/development/compilers/rust/bootstrap.nix
··· 32 32 33 33 src = fetchurl { 34 34 url = "https://static.rust-lang.org/dist/rust-${version}-${platform}.tar.gz"; 35 - sha256 = hashes."${platform}"; 35 + sha256 = hashes.${platform}; 36 36 }; 37 37 38 38 in callPackage ./binary.nix
+1 -1
pkgs/development/coq-modules/QuickChick/default.nix
··· 26 26 sha256 = "1c34v1k37rk7v0xk2czv5n79mbjxjrm6nh3llg2mpfmdsqi68wf3"; 27 27 }; 28 28 }; 29 - param = params."${coq.coq-version}"; 29 + param = params.${coq.coq-version}; 30 30 in 31 31 32 32 let recent = stdenv.lib.versionAtLeast coq.coq-version "8.8"; in
+1 -1
pkgs/development/coq-modules/Velisarios/default.nix
··· 20 20 sha256 = "0l9885nxy0n955fj1gnijlxl55lyxiv9yjfmz8hmfrn9hl8vv1m2"; 21 21 }; 22 22 }; 23 - param = params."${coq.coq-version}"; 23 + param = params.${coq.coq-version}; 24 24 in 25 25 26 26 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/bignums/default.nix
··· 22 22 sha256 = "1slw227idwjw9a21vj3s6kal22mrmvvlpg8r7xk590ml99bn6404"; 23 23 }; 24 24 }; 25 - param = params."${coq.coq-version}"; 25 + param = params.${coq.coq-version}; 26 26 in 27 27 28 28 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/category-theory/default.nix
··· 19 19 "8.8" = v20190414; 20 20 "8.9" = v20190414; 21 21 }; 22 - param = params."${coq.coq-version}"; 22 + param = params.${coq.coq-version}; 23 23 in 24 24 25 25 stdenv.mkDerivation rec {
+2 -2
pkgs/development/coq-modules/contribs/default.nix
··· 34 34 rev = "86ac28259030649ef51460e4de2441c8a1017751"; 35 35 sha256 = "09bbk2a7pn0j76mmapl583f8a20zqd3a1m9lkml8rpwml692bzi9"; 36 36 }; 37 - }."${coq.coq-version}"; 37 + }.${coq.coq-version}; 38 38 39 39 abp = mkContrib "abp" [ "8.5" "8.6" "8.7" ] { 40 40 version = "v8.6.0"; ··· 219 219 rev = "aa33052c1edfc5a65885942a67c2773b5d96f8cc"; 220 220 sha256 = "0mjgfdr9bzsch0dlk4vq1frkaig14dqh46r54cv0l15flxapg0iw"; 221 221 }; 222 - }."${coq.coq-version}"; 222 + }.${coq.coq-version}; 223 223 224 224 continuations = mkContrib "continuations" [ ] { 225 225 version = "v8.5.0-13-g6885310";
+1 -1
pkgs/development/coq-modules/coq-elpi/default.nix
··· 7 7 sha256 = "188avk9irwjsbs5ya4ka01mpk3vw4397kv2rmsncqrrrsa1pdddk"; 8 8 }; 9 9 }; 10 - param = params."${coq.coq-version}"; 10 + param = params.${coq.coq-version}; 11 11 in 12 12 13 13 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coq-ext-lib/default.nix
··· 8 8 "8.8" = { version = "0.9.8"; sha256 = "0z1ix855kdjl7zw5ca664h5njd1x8mmvf5wi37fck4dj9dgamwlz"; }; 9 9 "8.9" = { version = "0.10.1"; sha256 = "0r1vspad8fb8bry3zliiz4hfj4w1iib1l2gm115a94m6zbiksd95"; }; 10 10 }; 11 - param = params."${coq.coq-version}"; 11 + param = params.${coq.coq-version}; 12 12 in 13 13 14 14 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coq-haskell/default.nix
··· 26 26 sha256 = "09dq1vvshhlhgjccrhqgbhnq2hrys15xryfszqq11rzpgvl2zgdv"; 27 27 }; 28 28 }; 29 - param = params."${coq.coq-version}"; 29 + param = params.${coq.coq-version}; 30 30 in 31 31 32 32 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coqhammer/default.nix
··· 9 9 sha256 = "0hmqwsry8ldg4g4hhwg4b84dgzibpdrg1wwsajhlyqfx3fb3n3b5"; 10 10 }; 11 11 }; 12 - param = params."${coq.coq-version}"; 12 + param = params.${coq.coq-version}; 13 13 in 14 14 15 15 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coqprime/default.nix
··· 15 15 "8.9" = v_8_8; 16 16 "8.10" = v_8_8; 17 17 }; 18 - param = params."${coq.coq-version}" 18 + param = params.${coq.coq-version} 19 19 ; in 20 20 21 21 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/dpdgraph/default.nix
··· 22 22 sha256 = "0qvar8gfbrcs9fmvkph5asqz4l5fi63caykx3bsn8zf0xllkwv0n"; 23 23 }; 24 24 }; 25 - param = params."${coq.coq-version}"; 25 + param = params.${coq.coq-version}; 26 26 in 27 27 28 28 stdenv.mkDerivation {
+1 -1
pkgs/development/coq-modules/equations/default.nix
··· 32 32 sha256 = "1v5kx0xzxzsbs5r4w08rm1lrmjjggnd3ap0sd1my88ds17jzyasd"; 33 33 }; 34 34 }; 35 - param = params."${coq.coq-version}"; 35 + param = params.${coq.coq-version}; 36 36 in 37 37 38 38 stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/ltac2/default.nix
··· 17 17 sha256 = "0xby1kb26r9gcvk5511wqj05fqm9paynwfxlfqkmwkgnfmzk0x73"; 18 18 }; 19 19 }; 20 - param = params."${coq.coq-version}"; 20 + param = params.${coq.coq-version}; 21 21 in 22 22 23 23 stdenv.mkDerivation rec {
+3 -3
pkgs/development/coq-modules/mathcomp/default.nix
··· 30 30 # COMPUTED using the configuration above (edit with caution) # 31 31 ############################################################## 32 32 default-mathcomp-version = let v = head ( 33 - filter (mc: mathcomp-coq-versions."${mc}" coq.coq-version) 33 + filter (mc: mathcomp-coq-versions.${mc} coq.coq-version) 34 34 mathcomp-version-preference ++ ["0.0.0"]); 35 35 in if v == "0.0.0" then max-mathcomp-version else v; 36 36 ··· 126 126 }; 127 127 }; 128 128 in 129 - {"${mathcomp-pkg}" = stdenv.mkDerivation (attrs // overrides attrs);}; 129 + {${mathcomp-pkg} = stdenv.mkDerivation (attrs // overrides attrs);}; 130 130 131 - getAttrOr = a: n: a."${n}" or (throw a.error); 131 + getAttrOr = a: n: a.${n} or (throw a.error); 132 132 133 133 mathcompCorePkgs_1_7 = mathcompGen "1.7.0"; 134 134 mathcompCorePkgs_1_8 = mathcompGen "1.8.0";
+6 -6
pkgs/development/coq-modules/mathcomp/extra.nix
··· 139 139 else compatibleCoqVersions; 140 140 mc-core-deps = if builtins.isNull core-deps then [ssreflect] else core-deps; 141 141 in 142 - { "${package}" = let from = src; in 142 + { ${package} = let from = src; in 143 143 144 144 stdenv.mkDerivation rec { 145 145 inherit version; ··· 149 149 owner = owner; 150 150 repo = package; 151 151 rev = version; 152 - sha256 = version-sha256."${version}"; 152 + sha256 = version-sha256.${version}; 153 153 } else from; 154 154 155 155 propagatedBuildInputs = [ coq ] ++ mc-core-deps ++ extra-deps; ··· 173 173 }; 174 174 }; 175 175 176 - current-versions = versions."${current-ssreflect.version}" or {}; 176 + current-versions = versions.${current-ssreflect.version} or {}; 177 177 178 178 select = x: mapAttrs (n: pkg: {package = n;} // pkg) (recursiveUpdate param x); 179 179 ··· 181 181 {name = "mathcomp_${suffix}-${n}"; 182 182 value = (packageGen ({ 183 183 ssreflect = coqPackages."mathcomp-ssreflect_${suffix}"; 184 - } // pkg))."${n}";}) 185 - (select versions."${v}")); 184 + } // pkg)).${n};}) 185 + (select versions.${v})); 186 186 187 187 all = (for-version "1.7.0" "1_7") // 188 188 (for-version "1.8.0" "1_8") // 189 189 (for-version "1.9.0" "1_9") // 190 190 (recurseIntoAttrs (mapDerivationAttrset dontDistribute ( 191 - mapAttrs' (n: pkg: {name = "mathcomp-${n}"; value = (packageGen pkg)."${n}";}) 191 + mapAttrs' (n: pkg: {name = "mathcomp-${n}"; value = (packageGen pkg).${n};}) 192 192 (select current-versions)))); 193 193 in 194 194 {
+1 -1
pkgs/development/coq-modules/paramcoq/default.nix
··· 15 15 sha256 = "002xabhjlph394vydw3dx8ipv5ry2nq3py4440bk9a18ljx0w6ll"; 16 16 }; 17 17 }; 18 - param = params."${coq.coq-version}"; 18 + param = params.${coq.coq-version}; 19 19 in 20 20 21 21 stdenv.mkDerivation rec {
+2 -2
pkgs/development/interpreters/acl2/default.nix
··· 17 17 src = fetchFromGitHub { 18 18 owner = "acl2-devel"; 19 19 repo = "acl2-devel"; 20 - rev = revs."${version}"; 21 - sha256 = hashes."${version}"; 20 + rev = revs.${version}; 21 + sha256 = hashes.${version}; 22 22 }; 23 23 24 24 buildInputs = [ sbcl
+1 -1
pkgs/development/interpreters/ruby/default.nix
··· 88 88 (import ./patchsets.nix { 89 89 inherit patchSet useRailsExpress ops; 90 90 patchLevel = ver.patchLevel; 91 - })."${ver.majMinTiny}"; 91 + }).${ver.majMinTiny}; 92 92 93 93 postUnpack = '' 94 94 cp -r ${rubygems} $sourceRoot/rubygems
+8 -8
pkgs/development/libraries/fflas-ffpack/default.nix
··· 30 30 "--with-lapack-libs=-l${blas.linkName}" 31 31 ] ++ stdenv.lib.optionals stdenv.isx86_64 { 32 32 # disable SIMD instructions (which are enabled *when available* by default) 33 - "default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 34 - "westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 35 - "sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 36 - "ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 37 - "haswell" = [ "--disable-fma4" ]; 38 - "broadwell" = [ "--disable-fma4" ]; 39 - "skylake" = [ "--disable-fma4" ]; 40 - "skylake-avx512" = [ "--disable-fma4" ]; 33 + default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 34 + westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 35 + sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 36 + ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 37 + haswell = [ "--disable-fma4" ]; 38 + broadwell = [ "--disable-fma4" ]; 39 + skylake = [ "--disable-fma4" ]; 40 + skylake-avx512 = [ "--disable-fma4" ]; 41 41 }.${stdenv.hostPlatform.platform.gcc.arch or "default"}; 42 42 43 43 doCheck = true;
+8 -8
pkgs/development/libraries/g2o/default.nix
··· 25 25 "-DQGLVIEWER_INCLUDE_DIR=${libsForQt5.libqglviewer}/include/QGLViewer" 26 26 "-DG2O_BUILD_EXAMPLES=OFF" 27 27 ] ++ lib.optionals stdenv.isx86_64 ([ "-DDO_SSE_AUTODETECT=OFF" ] ++ { 28 - "default" = [ "-DDISABLE_SSE3=ON" "-DDISABLE_SSE4_1=ON" "-DDISABLE_SSE4_2=ON" "-DDISABLE_SSE4_A=ON" ]; 29 - "westmere" = [ "-DDISABLE_SSE4_A=ON" ]; 30 - "sandybridge" = [ "-DDISABLE_SSE4_A=ON" ]; 31 - "ivybridge" = [ "-DDISABLE_SSE4_A=ON" ]; 32 - "haswell" = [ "-DDISABLE_SSE4_A=ON" ]; 33 - "broadwell" = [ "-DDISABLE_SSE4_A=ON" ]; 34 - "skylake" = [ "-DDISABLE_SSE4_A=ON" ]; 35 - "skylake-avx512" = [ "-DDISABLE_SSE4_A=ON" ]; 28 + default = [ "-DDISABLE_SSE3=ON" "-DDISABLE_SSE4_1=ON" "-DDISABLE_SSE4_2=ON" "-DDISABLE_SSE4_A=ON" ]; 29 + westmere = [ "-DDISABLE_SSE4_A=ON" ]; 30 + sandybridge = [ "-DDISABLE_SSE4_A=ON" ]; 31 + ivybridge = [ "-DDISABLE_SSE4_A=ON" ]; 32 + haswell = [ "-DDISABLE_SSE4_A=ON" ]; 33 + broadwell = [ "-DDISABLE_SSE4_A=ON" ]; 34 + skylake = [ "-DDISABLE_SSE4_A=ON" ]; 35 + skylake-avx512 = [ "-DDISABLE_SSE4_A=ON" ]; 36 36 }.${stdenv.hostPlatform.platform.gcc.arch or "default"}); 37 37 38 38 postInstall = ''
+8 -8
pkgs/development/libraries/givaro/default.nix
··· 18 18 "--disable-optimization" 19 19 ] ++ stdenv.lib.optionals stdenv.isx86_64 { 20 20 # disable SIMD instructions (which are enabled *when available* by default) 21 - "default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 22 - "westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 23 - "sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 24 - "ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 25 - "haswell" = [ "--disable-fma4" ]; 26 - "broadwell" = [ "--disable-fma4" ]; 27 - "skylake" = [ "--disable-fma4" ]; 28 - "skylake-avx512" = [ "--disable-fma4" ]; 21 + default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 22 + westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 23 + sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 24 + ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 25 + haswell = [ "--disable-fma4" ]; 26 + broadwell = [ "--disable-fma4" ]; 27 + skylake = [ "--disable-fma4" ]; 28 + skylake-avx512 = [ "--disable-fma4" ]; 29 29 }.${stdenv.hostPlatform.platform.gcc.arch or "default"}; 30 30 31 31 # On darwin, tests are linked to dylib in the nix store, so we need to make
+3 -3
pkgs/development/libraries/java/swt/default.nix
··· 5 5 6 6 let 7 7 platformMap = { 8 - "x86_64-linux" = 8 + x86_64-linux = 9 9 { platform = "gtk-linux-x86_64"; 10 10 sha256 = "1qq0pjll6030v4ml0hifcaaik7sx3fl7ghybfdw95vsvxafwp2ff"; }; 11 - "i686-linux" = 11 + i686-linux = 12 12 { platform = "gtk-linux-x86"; 13 13 sha256 = "03mhzraikcs4fsz7d3h5af9pw1bbcfd6dglsvbk2ciwimy9zj30q"; }; 14 - "x86_64-darwin" = 14 + x86_64-darwin = 15 15 { platform = "cocoa-macosx-x86_64"; 16 16 sha256 = "00k1mfbncvyh8klgmk0891w8jwnd5niqb16j1j8yacrm2smmlb05"; }; 17 17 };
+1 -1
pkgs/development/libraries/kde-frameworks/default.nix
··· 64 64 let 65 65 66 66 inherit (args) name; 67 - inherit (srcs."${name}") src version; 67 + inherit (srcs.${name}) src version; 68 68 69 69 outputs = args.outputs or [ "bin" "dev" "out" ]; 70 70 hasSeparateDev = lib.elem "dev" outputs;
+8 -8
pkgs/development/libraries/linbox/default.nix
··· 37 37 "--disable-optimization" 38 38 ] ++ stdenv.lib.optionals stdenv.isx86_64 { 39 39 # disable SIMD instructions (which are enabled *when available* by default) 40 - "default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 41 - "westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 42 - "sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 43 - "ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 44 - "haswell" = [ "--disable-fma4" ]; 45 - "broadwell" = [ "--disable-fma4" ]; 46 - "skylake" = [ "--disable-fma4" ]; 47 - "skylake-avx512" = [ "--disable-fma4" ]; 40 + default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 41 + westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 42 + sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 43 + ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ]; 44 + haswell = [ "--disable-fma4" ]; 45 + broadwell = [ "--disable-fma4" ]; 46 + skylake = [ "--disable-fma4" ]; 47 + skylake-avx512 = [ "--disable-fma4" ]; 48 48 }.${stdenv.hostPlatform.platform.gcc.arch or "default"} 49 49 ++ stdenv.lib.optionals withSage [ 50 50 "--enable-sage"
+4 -4
pkgs/development/libraries/openssl/default.nix
··· 44 44 # TODO(@Ericson2314): Improve with mass rebuild 45 45 configurePlatforms = []; 46 46 configureScript = { 47 - "x86_64-darwin" = "./Configure darwin64-x86_64-cc"; 48 - "x86_64-solaris" = "./Configure solaris64-x86_64-gcc"; 49 - "armv6l-linux" = "./Configure linux-armv4 -march=armv6"; 50 - "armv7l-linux" = "./Configure linux-armv4 -march=armv7-a"; 47 + x86_64-darwin = "./Configure darwin64-x86_64-cc"; 48 + x86_64-solaris = "./Configure solaris64-x86_64-gcc"; 49 + armv6l-linux = "./Configure linux-armv4 -march=armv6"; 50 + armv7l-linux = "./Configure linux-armv4 -march=armv7-a"; 51 51 }.${stdenv.hostPlatform.system} or ( 52 52 if stdenv.hostPlatform == stdenv.buildPlatform 53 53 then "./config"
+6 -6
pkgs/development/libraries/oracle-instantclient/default.nix
··· 17 17 throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}"; 18 18 19 19 arch = { 20 - "x86_64-linux" = "linux.x64"; 21 - "x86_64-darwin" = "macos.x64"; 22 - }."${stdenv.hostPlatform.system}" or throwSystem; 20 + x86_64-linux = "linux.x64"; 21 + x86_64-darwin = "macos.x64"; 22 + }.${stdenv.hostPlatform.system} or throwSystem; 23 23 24 24 srcs = { 25 - "x86_64-linux" = [ 25 + x86_64-linux = [ 26 26 (requireSource "basic" arch version "" "5015e3c9fba84e009f7519893f798a1622c37d1ae2c55104ff502c52a0fe5194") 27 27 (requireSource "sdk" arch version "" "7f404c3573c062ce487a51ac4cfe650c878d7edf8e73b364ec852645ed1098cb") 28 28 (requireSource "sqlplus" arch version "" "d49b2bd97376591ca07e7a836278933c3f251875c215044feac73ba9f451dfc2") ] 29 29 ++ optional odbcSupport (requireSource "odbc" arch version "2" "365a4ae32c7062d9fbc3fb41add748e7881f774484a175a4b41a2c294ce9095d"); 30 - "x86_64-darwin" = [ 30 + x86_64-darwin = [ 31 31 (requireSource "basic" arch version "2" "3ed3102e5a24f0da638694191edb34933309fb472eb1df21ad5c86eedac3ebb9") 32 32 (requireSource "sdk" arch version "2" "e0befca9c4e71ebc9f444957ffa70f01aeeec5976ea27c40406471b04c34848b") 33 33 (requireSource "sqlplus" arch version "2" "d147cbb5b2a954fdcb4b642df4f0bd1153fd56e0f56e7fa301601b4f7e2abe0e") ] 34 34 ++ optional odbcSupport (requireSource "odbc" arch version "2" "1805c1ab6c8c5e8df7bdcc35d7f2b94c329ecf4dff9bde55d5f9b159ecd8b64e"); 35 - }."${stdenv.hostPlatform.system}" or throwSystem; 35 + }.${stdenv.hostPlatform.system} or throwSystem; 36 36 37 37 extLib = stdenv.hostPlatform.extensions.sharedLibrary; 38 38 in stdenv.mkDerivation rec {
+8 -8
pkgs/development/libraries/qt-5/modules/qtbase.nix
··· 255 255 if (!stdenv.hostPlatform.isx86_64) 256 256 then [ "-no-sse2" ] 257 257 else lib.optionals (compareVersion "5.9.0" >= 0) { 258 - "default" = [ "-sse2" "-no-sse3" "-no-ssse3" "-no-sse4.1" "-no-sse4.2" "-no-avx" "-no-avx2" ]; 259 - "westmere" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-no-avx" "-no-avx2" ]; 260 - "sandybridge" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ]; 261 - "ivybridge" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ]; 262 - "haswell" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 263 - "broadwell" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 264 - "skylake" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 265 - "skylake-avx512" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 258 + default = [ "-sse2" "-no-sse3" "-no-ssse3" "-no-sse4.1" "-no-sse4.2" "-no-avx" "-no-avx2" ]; 259 + westmere = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-no-avx" "-no-avx2" ]; 260 + sandybridge = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ]; 261 + ivybridge = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ]; 262 + haswell = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 263 + broadwell = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 264 + skylake = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 265 + skylake-avx512 = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ]; 266 266 }.${stdenv.hostPlatform.platform.gcc.arch or "default"} 267 267 ) 268 268 ++ [
+3 -3
pkgs/development/libraries/qt-5/qtModule.nix
··· 8 8 9 9 let 10 10 inherit (args) name; 11 - version = args.version or srcs."${name}".version; 12 - src = args.src or srcs."${name}".src; 11 + version = args.version or srcs.${name}.version; 12 + src = args.src or srcs.${name}.src; 13 13 in 14 14 15 15 mkDerivation (args // { 16 16 name = "${name}-${version}"; 17 17 inherit src; 18 - patches = args.patches or patches."${name}" or []; 18 + patches = args.patches or patches.${name} or []; 19 19 20 20 nativeBuildInputs = (args.nativeBuildInputs or []) ++ [ perl self.qmake ]; 21 21 propagatedBuildInputs = args.qtInputs ++ (args.propagatedBuildInputs or []);
+3 -3
pkgs/development/libraries/science/math/tensorflow/binary-hashes.nix
··· 1 1 { 2 2 version = "1.14.0"; 3 - "cpu-linux-x86_64" = { 3 + cpu-linux-x86_64 = { 4 4 url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-linux-x86_64-1.14.0.tar.gz"; 5 5 sha256 = "04bi3ijq4sbb8c5vk964zlv0j9mrjnzzxd9q9knq3h273nc1a36k"; 6 6 }; 7 - "gpu-linux-x86_64" = { 7 + gpu-linux-x86_64 = { 8 8 url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-gpu-linux-x86_64-1.14.0.tar.gz"; 9 9 sha256 = "1ffnpyj9jjgwxpjfiyjvq4dm3n6nwiksim5jld9zw7fdswh215x6"; 10 10 }; 11 - "cpu-darwin-x86_64" = { 11 + cpu-darwin-x86_64 = { 12 12 url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-darwin-x86_64-1.14.0.tar.gz"; 13 13 sha256 = "0zsd5ils1a17j6jzh0c7q1z56fw46gkzybbnms7h2rgg8al0rh92"; 14 14 };
+2 -2
pkgs/development/libraries/v8/5_x.nix
··· 17 17 sharedFlag = if static then "static_library" else "shared_library"; 18 18 19 19 deps = { 20 - "build" = fetchgit { 20 + build = fetchgit { 21 21 url = "${git_url}/chromium/src/build.git"; 22 22 rev = "2c67d4d74b6b3673228fab191918500a582ef3b0"; 23 23 sha256 = "0jc7hci5yh792pw0ahjfxrk5xzllnlrv9llmwlgcgn2x8x6bn34q"; ··· 32 32 rev = "b5ecbb29a26532f72ef482569b223d5a51fd50bf"; 33 33 sha256 = "0ld47wdnk8grcba221z67l3pnphv9zwifk4y44f5b946w3iwmpns"; 34 34 }; 35 - "buildtools" = fetchgit { 35 + buildtools = fetchgit { 36 36 url = "${git_url}/chromium/buildtools.git"; 37 37 rev = "60f7f9a8b421ebf9a46041dfa2ff11c0fe59c582"; 38 38 sha256 = "0i10bw7yhslklqwcx5krs3k05sicb73cpwd0mkaz96yxsvmkvjq0";
+1 -1
pkgs/development/libraries/v8/default.nix
··· 14 14 rev = "936ba8a963284a6b3737cf2f0474a7131073abee"; 15 15 sha256 = "14nr22fqdpxma1kzjflj6a865vr3hfnnm2gs4vcixyq4kmfzfcy2"; 16 16 }; 17 - "build" = fetchgit { 17 + build = fetchgit { 18 18 url = "${git_url}/chromium/src/build.git"; 19 19 rev = "325e95d6dae64f35b160b3dc7d73218cee5ec079"; 20 20 sha256 = "0dddyxa76p2xpjhmxif05v63i5ar6h5v684fdl667sg84f5bhhxf";
+2 -2
pkgs/development/libraries/v8/plv8_6_x.nix
··· 24 24 rev = "0e9a47d74970bee1bbfc063c47215406f8918699"; 25 25 sha256 = "07rbzrlscp8adh4z86yl5jxdnvgkc3xs950xldpk318wf9i3bh6c"; 26 26 }; 27 - "build" = fetchgit { 27 + build = fetchgit { 28 28 url = "${git_url}/chromium/src/build.git"; 29 29 rev = "9338ce52d0b9bcef34c38285fbd5023b62739fac"; 30 30 sha256 = "1s2sa8dy3waidsirjylc82ggb18l1108bczjc8z0v4ywyj4k0cvh"; 31 31 }; 32 - "buildtools" = fetchgit { 32 + buildtools = fetchgit { 33 33 url = "${git_url}/chromium/buildtools.git"; 34 34 rev = "505de88083136eefd056e5ee4ca0f01fe9b33de8"; 35 35 sha256 = "0vj216nhb803bggsl0hnyagj8njrm96pn8sim6xcnqb7nhz1vabw";
+12 -12
pkgs/development/mobile/androidenv/compose-android-packages.nix
··· 79 79 platform-tools = import ./platform-tools.nix { 80 80 inherit deployAndroidPackage os autoPatchelfHook pkgs; 81 81 inherit (stdenv) lib; 82 - package = packages.platform-tools."${platformToolsVersion}"; 82 + package = packages.platform-tools.${platformToolsVersion}; 83 83 }; 84 84 85 85 build-tools = map (version: 86 86 import ./build-tools.nix { 87 87 inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686; 88 88 inherit (stdenv) lib; 89 - package = packages.build-tools."${version}"; 89 + package = packages.build-tools.${version}; 90 90 } 91 91 ) buildToolsVersions; 92 92 ··· 98 98 emulator = import ./emulator.nix { 99 99 inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686; 100 100 inherit (stdenv) lib; 101 - package = packages.emulator."${emulatorVersion}"."${os}"; 101 + package = packages.emulator.${emulatorVersion}.${os}; 102 102 }; 103 103 104 104 platforms = map (version: 105 105 deployAndroidPackage { 106 106 inherit os; 107 - package = packages.platforms."${version}"; 107 + package = packages.platforms.${version}; 108 108 } 109 109 ) platformVersions; 110 110 111 111 sources = map (version: 112 112 deployAndroidPackage { 113 113 inherit os; 114 - package = packages.sources."${version}"; 114 + package = packages.sources.${version}; 115 115 } 116 116 ) platformVersions; 117 117 ··· 130 130 import ./lldb.nix { 131 131 inherit deployAndroidPackage os autoPatchelfHook pkgs; 132 132 inherit (stdenv) lib; 133 - package = packages.lldb."${version}"; 133 + package = packages.lldb.${version}; 134 134 } 135 135 ) lldbVersions; 136 136 ··· 138 138 import ./cmake.nix { 139 139 inherit deployAndroidPackage os autoPatchelfHook pkgs; 140 140 inherit (stdenv) lib; 141 - package = packages.cmake."${version}"; 141 + package = packages.cmake.${version}; 142 142 } 143 143 ) cmakeVersions; 144 144 145 145 ndk-bundle = import ./ndk-bundle { 146 146 inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs platform-tools; 147 147 inherit (stdenv) lib; 148 - package = packages.ndk-bundle."${ndkVersion}"; 148 + package = packages.ndk-bundle.${ndkVersion}; 149 149 }; 150 150 151 151 google-apis = map (version: 152 152 deployAndroidPackage { 153 153 inherit os; 154 - package = addons.addons."${version}".google_apis; 154 + package = addons.addons.${version}.google_apis; 155 155 } 156 156 ) (builtins.filter (platformVersion: platformVersion < "26") platformVersions); # API level 26 and higher include Google APIs by default 157 157 158 158 google-tv-addons = map (version: 159 159 deployAndroidPackage { 160 160 inherit os; 161 - package = addons.addons."${version}".google_tv_addon; 161 + package = addons.addons.${version}.google_tv_addon; 162 162 } 163 163 ) platformVersions; 164 164 ··· 226 226 # Link extras 227 227 ${stdenv.lib.concatMapStrings (identifier: 228 228 let 229 - path = addons.extras."${identifier}".path; 229 + path = addons.extras.${identifier}.path; 230 230 addon = deployAndroidPackage { 231 231 inherit os; 232 - package = addons.extras."${identifier}"; 232 + package = addons.extras.${identifier}; 233 233 }; 234 234 in 235 235 ''
+2 -2
pkgs/development/mobile/androidenv/tools.nix
··· 19 19 }; 20 20 } else if toolsVersion == "26.1.1" then import ./tools/26.nix { 21 21 inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall; 22 - package = packages.tools."${toolsVersion}"; 22 + package = packages.tools.${toolsVersion}; 23 23 } else import ./tools/25.nix { 24 24 inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall; 25 - package = packages.tools."${toolsVersion}"; 25 + package = packages.tools.${toolsVersion}; 26 26 }
+1 -1
pkgs/development/node-packages/composition-v10.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ./node-env.nix {
+1 -1
pkgs/development/node-packages/composition-v12.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-6_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-6_x}: 6 6 7 7 let 8 8 nodeEnv = import ./node-env.nix {
+1 -1
pkgs/development/ocaml-modules/labltk/default.nix
··· 25 25 key = "1764"; 26 26 sha256 = "0wgx65y1wkgf22ihpqmspqfp95fqbj3pldhp1p3b1mi8rmc37zwj"; 27 27 }; 28 - }."${builtins.substring 0 4 ocaml.version}"; 28 + }.${builtins.substring 0 4 ocaml.version}; 29 29 in 30 30 31 31 stdenv.mkDerivation rec {
+1 -1
pkgs/development/ocaml-modules/lwt/legacy.nix
··· 14 14 "3.0.0" = "0wwhnl9hppixcsdisinj1wmffx0nv6hkpm01z9qvkngkrazi3i88"; 15 15 "2.7.1" = "0w7f59havrl2fsnvs84lm7wlqpsrldg80gy5afpnpr21zkw22g8w"; 16 16 "2.6.0" = "0f1h83zh60rspm4fxd96z9h5bkhq1n1q968hgq92sq4a6bfi1c2w"; 17 - }."${version}"; in 17 + }.${version}; in 18 18 19 19 let optionals = stdenv.lib.optionals (!stdenv.lib.versionAtLeast version "3"); in 20 20
+1 -1
pkgs/development/ocaml-modules/ppx_tools/default.nix
··· 20 20 "4.07" = { 21 21 version = "5.1+4.06.0"; 22 22 sha256 = "1ww4cspdpgjjsgiv71s0im5yjkr3544x96wsq1vpdacq7dr7zwiw"; }; 23 - }."${ocaml.meta.branch}"; 23 + }.${ocaml.meta.branch}; 24 24 in 25 25 stdenv.mkDerivation { 26 26 name = "ocaml${ocaml.version}-ppx_tools-${param.version}";
+1 -1
pkgs/development/python-modules/numpy/default.nix
··· 5 5 cfg = writeTextFile { 6 6 name = "site.cfg"; 7 7 text = (lib.generators.toINI {} { 8 - "${blasImplementation}" = { 8 + ${blasImplementation} = { 9 9 include_dirs = "${blas}/include"; 10 10 library_dirs = "${blas}/lib"; 11 11 } // lib.optionalAttrs (blasImplementation == "mkl") {
+1 -1
pkgs/development/python-modules/spacy/models.nix
··· 13 13 meta = with stdenv.lib; { 14 14 description = "Models for the spaCy NLP library"; 15 15 homepage = "https://github.com/explosion/spacy-models"; 16 - license = licenses."${license}"; 16 + license = licenses.${license}; 17 17 maintainers = with maintainers; [ rvl ]; 18 18 }; 19 19 };
+2 -2
pkgs/development/ruby-modules/bundled-common/default.nix
··· 52 52 name 53 53 else 54 54 let 55 - gem = gems."${pname}"; 55 + gem = gems.${pname}; 56 56 version = gem.version; 57 57 in 58 58 "${pname}-${version}"; ··· 70 70 71 71 maybeCopyAll = pkgname: if pkgname == null then "" else 72 72 let 73 - mainGem = gems."${pkgname}" or (throw "bundlerEnv: gem ${pkgname} not found"); 73 + mainGem = gems.${pkgname} or (throw "bundlerEnv: gem ${pkgname} not found"); 74 74 in 75 75 copyIfBundledByPath mainGem; 76 76
+6 -6
pkgs/development/ruby-modules/bundled-common/functions.nix
··· 42 42 converge expandDependencies directlyMatchingGems; 43 43 44 44 platformMatches = {rubyEngine, version, ...}: attrs: ( 45 - !(attrs ? "platforms") || 45 + !(attrs ? platforms) || 46 46 builtins.length attrs.platforms == 0 || 47 47 builtins.any (platform: 48 48 platform.engine == rubyEngine && 49 - (!(platform ? "version") || platform.version == version.majMin) 49 + (!(platform ? version) || platform.version == version.majMin) 50 50 ) attrs.platforms 51 51 ); 52 52 53 53 groupMatches = groups: attrs: 54 - groups == null || !(attrs ? "groups") || 54 + groups == null || !(attrs ? groups) || 55 55 (intersectLists (groups ++ [ "default" ]) attrs.groups) != []; 56 56 57 57 applyGemConfigs = attrs: 58 - (if gemConfig ? "${attrs.gemName}" 59 - then attrs // gemConfig."${attrs.gemName}" attrs 58 + (if gemConfig ? ${attrs.gemName} 59 + then attrs // gemConfig.${attrs.gemName} attrs 60 60 else attrs); 61 61 62 62 genStubsScript = { lib, ruby, confFiles, bundler, groups, binPaths, ... }: '' ··· 88 88 inherit (attrs.source) type; 89 89 source = removeAttrs attrs.source ["type"]; 90 90 gemName = name; 91 - gemPath = map (gemName: gems."${gemName}") (attrs.dependencies or []); 91 + gemPath = map (gemName: gems.${gemName}) (attrs.dependencies or []); 92 92 }); 93 93 }
+1 -1
pkgs/development/ruby-modules/bundler-env/default.nix
··· 49 49 postBuild = genStubsScript { 50 50 inherit lib ruby bundler groups; 51 51 confFiles = basicEnv.confFiles; 52 - binPaths = [ basicEnv.gems."${pname}" ]; 52 + binPaths = [ basicEnv.gems.${pname} ]; 53 53 } + lib.optionalString (postBuild != null) postBuild; 54 54 55 55 meta = { platforms = ruby.meta.platforms; } // meta;
+4 -4
pkgs/development/tools/build-managers/bazel/default.nix
··· 46 46 srcs.io_bazel_rules_sass 47 47 srcs.platforms 48 48 (if stdenv.hostPlatform.isDarwin 49 - then srcs.${"java_tools_javac11_darwin-v2.0.zip"} 50 - else srcs.${"java_tools_javac11_linux-v2.0.zip"}) 51 - srcs.${"coverage_output_generator-v1.0.zip"} 49 + then srcs."java_tools_javac11_darwin-v2.0.zip" 50 + else srcs."java_tools_javac11_linux-v2.0.zip") 51 + srcs."coverage_output_generator-v1.0.zip" 52 52 srcs.build_bazel_rules_nodejs 53 - srcs.${"android_tools_pkg-0.7.tar.gz"} 53 + srcs."android_tools_pkg-0.7.tar.gz" 54 54 ]); 55 55 56 56 distDir = runCommand "bazel-deps" {} ''
+5 -5
pkgs/development/tools/build-managers/meson/default.nix
··· 3 3 let 4 4 # See https://mesonbuild.com/Reference-tables.html#cpu-families 5 5 cpuFamilies = { 6 - "aarch64" = "aarch64"; 7 - "armv6l" = "arm"; 8 - "armv7l" = "arm"; 9 - "i686" = "x86"; 10 - "x86_64" = "x86_64"; 6 + aarch64 = "aarch64"; 7 + armv6l = "arm"; 8 + armv7l = "arm"; 9 + i686 = "x86"; 10 + x86_64 = "x86_64"; 11 11 }; 12 12 in 13 13 python3Packages.buildPythonApplication rec {
+6 -6
pkgs/development/tools/misc/kibana/5.x.nix
··· 4 4 let 5 5 inherit (builtins) elemAt; 6 6 archOverrides = { 7 - "i686" = "x86"; 7 + i686 = "x86"; 8 8 }; 9 9 info = splitString "-" stdenv.hostPlatform.system; 10 10 arch = (elemAt info 0); 11 - elasticArch = archOverrides."${arch}" or arch; 11 + elasticArch = archOverrides.${arch} or arch; 12 12 plat = elemAt info 1; 13 13 shas = { 14 - "x86_64-linux" = "0hzr47hyw54b9j4c33n6f6n3pala6kjhyvinfszgikbghyhb7fsa"; 15 - "i686-linux" = "0bka4h31cw10ii4pfygc81pwc3wr32pzw3v4k4bi8rnqbk280fmn"; 16 - "x86_64-darwin" = "0jqc2g89rqkla0alqxr14sh4pccfn514jrwr7mkjivxdapygh1ll"; 14 + x86_64-linux = "0hzr47hyw54b9j4c33n6f6n3pala6kjhyvinfszgikbghyhb7fsa"; 15 + i686-linux = "0bka4h31cw10ii4pfygc81pwc3wr32pzw3v4k4bi8rnqbk280fmn"; 16 + x86_64-darwin = "0jqc2g89rqkla0alqxr14sh4pccfn514jrwr7mkjivxdapygh1ll"; 17 17 }; 18 18 in stdenv.mkDerivation rec { 19 19 pname = "kibana"; ··· 21 21 22 22 src = fetchurl { 23 23 url = "https://artifacts.elastic.co/downloads/kibana/${pname}-${version}-${plat}-${elasticArch}.tar.gz"; 24 - sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture"); 24 + sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture"); 25 25 }; 26 26 27 27 buildInputs = [ makeWrapper ];
+5 -5
pkgs/development/tools/misc/kibana/6.x.nix
··· 18 18 shas = 19 19 if enableUnfree 20 20 then { 21 - "x86_64-linux" = "1i3zmzxihplwd8n994lfxhhgygdg3qxjqgrj1difa8w3vss0zbfn"; 22 - "x86_64-darwin" = "09a96ms9id77infxd9xxfs6r7j01mn0rz5yw3g9sl92j9ri7r52c"; 21 + x86_64-linux = "1i3zmzxihplwd8n994lfxhhgygdg3qxjqgrj1difa8w3vss0zbfn"; 22 + x86_64-darwin = "09a96ms9id77infxd9xxfs6r7j01mn0rz5yw3g9sl92j9ri7r52c"; 23 23 } 24 24 else { 25 - "x86_64-linux" = "166rhxr0qlv1yarj2mg1c3b8mxvhl70jhz53azq7ic6laj55q7fk"; 26 - "x86_64-darwin" = "0ngngkbl036p2mzwhp8qafi3aqzk398a218w12srfqny5n630vdk"; 25 + x86_64-linux = "166rhxr0qlv1yarj2mg1c3b8mxvhl70jhz53azq7ic6laj55q7fk"; 26 + x86_64-darwin = "0ngngkbl036p2mzwhp8qafi3aqzk398a218w12srfqny5n630vdk"; 27 27 }; 28 28 29 29 in stdenv.mkDerivation rec { ··· 32 32 33 33 src = fetchurl { 34 34 url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz"; 35 - sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture"); 35 + sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture"); 36 36 }; 37 37 38 38 patches = [
+5 -5
pkgs/development/tools/misc/kibana/7.x.nix
··· 18 18 shas = 19 19 if enableUnfree 20 20 then { 21 - "x86_64-linux" = "1mzycd0ljnkslz9p9jhq279bkpk35r7svhngxjnmsh11ampsvxb8"; 22 - "x86_64-darwin" = "1bz409njdpmsagh5dg062114wpa96w7pmxwfjsizwksqyyjdwdv7"; 21 + x86_64-linux = "1mzycd0ljnkslz9p9jhq279bkpk35r7svhngxjnmsh11ampsvxb8"; 22 + x86_64-darwin = "1bz409njdpmsagh5dg062114wpa96w7pmxwfjsizwksqyyjdwdv7"; 23 23 } 24 24 else { 25 - "x86_64-linux" = "1x3gjc9xa03m4jfnl5vjxigzcnb8ysnhxgd8618v85x4l0010v38"; 26 - "x86_64-darwin" = "1nsbmrswv2jv2z7686i2sf6rrmxysbqi5ih6jjrbrqnk64xi18j2"; 25 + x86_64-linux = "1x3gjc9xa03m4jfnl5vjxigzcnb8ysnhxgd8618v85x4l0010v38"; 26 + x86_64-darwin = "1nsbmrswv2jv2z7686i2sf6rrmxysbqi5ih6jjrbrqnk64xi18j2"; 27 27 }; 28 28 29 29 in stdenv.mkDerivation rec { ··· 32 32 33 33 src = fetchurl { 34 34 url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz"; 35 - sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture"); 35 + sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture"); 36 36 }; 37 37 38 38 patches = [
+1 -1
pkgs/development/tools/ocaml/camlp4/default.nix
··· 22 22 "4.08" = { 23 23 version = "4.08+1"; 24 24 sha256 = "0qplawvxwai25bi27niw2cgz2al01kcnkj8wxwhxslpi21z6pyx1"; }; 25 - }."${ocaml.meta.branch}"; 25 + }.${ocaml.meta.branch}; 26 26 in 27 27 28 28 stdenv.mkDerivation rec {
+1 -1
pkgs/development/tools/ocaml/js_of_ocaml/default.nix
··· 14 14 sha256 = { 15 15 "2.7" = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj"; 16 16 "2.8.4" = "098ph50s9kqw6rc3qjn39zv9b5swdf4qr44afwqfkkjgjs5d7vbl"; 17 - }."${version}"; 17 + }.${version}; 18 18 }; 19 19 20 20 buildInputs = [ ocaml findlib menhir ocsigen_deriving ocamlbuild
+3 -3
pkgs/development/tools/selenium/chromedriver/default.nix
··· 4 4 }: 5 5 let 6 6 allSpecs = { 7 - "x86_64-linux" = { 7 + x86_64-linux = { 8 8 system = "linux64"; 9 9 sha256 = "04wb6h57daxmnv3a3xrcsznawbx7r8wyi1vk1g26z2l2ppcnsbzv"; 10 10 }; 11 11 12 - "x86_64-darwin" = { 12 + x86_64-darwin = { 13 13 system = "mac64"; 14 14 sha256 = "0f8j7m8ardaaw8pv02vxhwkqbcm34366bln0np0j0ig21d4fag09"; 15 15 }; 16 16 }; 17 17 18 - spec = allSpecs."${stdenv.hostPlatform.system}" 18 + spec = allSpecs.${stdenv.hostPlatform.system} 19 19 or (throw "missing chromedriver binary for ${stdenv.hostPlatform.system}"); 20 20 21 21 libs = stdenv.lib.makeLibraryPath [
+1 -1
pkgs/development/web/remarkjs/nodepkgs.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../node-packages/node-env.nix {
+6 -6
pkgs/games/dwarf-fortress/game.nix
··· 18 18 # Other srcs are avilable like 32-bit mac & win, but I have only 19 19 # included the ones most likely to be needed by Nixpkgs users. 20 20 platforms = { 21 - "x86_64-linux" = "linux"; 22 - "i686-linux" = "linux32"; 23 - "x86_64-darwin" = "osx"; 24 - "i686-darwin" = "osx32"; 25 - "x86_64-cygwin" = "win"; 26 - "i686-cygwin" = "win32"; 21 + x86_64-linux = "linux"; 22 + i686-linux = "linux32"; 23 + x86_64-darwin = "osx"; 24 + i686-darwin = "osx32"; 25 + x86_64-cygwin = "win"; 26 + i686-cygwin = "win32"; 27 27 }; 28 28 29 29 dfVersionTriple = splitString "." dfVersion;
+1 -1
pkgs/misc/base16-builder/node-packages.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../development/node-packages/node-env.nix {
+6 -6
pkgs/misc/drivers/hplip/3.16.11.nix
··· 28 28 }; 29 29 30 30 hplipPlatforms = { 31 - "i686-linux" = "x86_32"; 32 - "x86_64-linux" = "x86_64"; 33 - "armv6l-linux" = "arm32"; 34 - "armv7l-linux" = "arm32"; 35 - "aarch64-linux" = "arm64"; 31 + i686-linux = "x86_32"; 32 + x86_64-linux = "x86_64"; 33 + armv6l-linux = "arm32"; 34 + armv7l-linux = "arm32"; 35 + aarch64-linux = "arm64"; 36 36 }; 37 37 38 - hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}" 38 + hplipArch = hplipPlatforms.${stdenv.hostPlatform.system} 39 39 or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}"); 40 40 41 41 pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
+6 -6
pkgs/misc/drivers/hplip/3.18.5.nix
··· 30 30 }; 31 31 32 32 hplipPlatforms = { 33 - "i686-linux" = "x86_32"; 34 - "x86_64-linux" = "x86_64"; 35 - "armv6l-linux" = "arm32"; 36 - "armv7l-linux" = "arm32"; 37 - "aarch64-linux" = "arm64"; 33 + i686-linux = "x86_32"; 34 + x86_64-linux = "x86_64"; 35 + armv6l-linux = "arm32"; 36 + armv7l-linux = "arm32"; 37 + aarch64-linux = "arm64"; 38 38 }; 39 39 40 - hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}" 40 + hplipArch = hplipPlatforms.${stdenv.hostPlatform.system} 41 41 or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}"); 42 42 43 43 pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
+5 -5
pkgs/misc/drivers/hplip/default.nix
··· 30 30 }; 31 31 32 32 hplipPlatforms = { 33 - "i686-linux" = "x86_32"; 34 - "x86_64-linux" = "x86_64"; 35 - "armv6l-linux" = "arm32"; 36 - "armv7l-linux" = "arm32"; 33 + i686-linux = "x86_32"; 34 + x86_64-linux = "x86_64"; 35 + armv6l-linux = "arm32"; 36 + armv7l-linux = "arm32"; 37 37 }; 38 38 39 - hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}" 39 + hplipArch = hplipPlatforms.${stdenv.hostPlatform.system} 40 40 or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}"); 41 41 42 42 pluginArches = [ "x86_32" "x86_64" "arm32" ];
+2 -2
pkgs/misc/vim-plugins/vim-utils.nix
··· 264 264 ${lib.concatMapStrings (plugin: '' 265 265 let g:nix_plugin_locations['${plugin.pname}'] = "${plugin.rtp}" 266 266 '') plugins} 267 - let g:nix_plugin_locations['vim-addon-manager'] = "${knownPlugins."vim-addon-manager".rtp}" 267 + let g:nix_plugin_locations['vim-addon-manager'] = "${knownPlugins.vim-addon-manager.rtp}" 268 268 269 269 let g:vim_addon_manager = {} 270 270 ··· 513 513 name = "vim_with_custom_plugin"; 514 514 vimrcConfig.vam.knownPlugins = 515 515 vimPlugins // ({ 516 - "vim-trailing-whitespace" = buildVimPluginFrom2Nix { 516 + vim-trailing-whitespace = buildVimPluginFrom2Nix { 517 517 name = "vim-trailing-whitespace"; 518 518 src = fetchFromGitHub { 519 519 owner = "bronson";
+3 -3
pkgs/misc/vscode-extensions/python/default.nix
··· 23 23 else throw "Only x86_64 Linux and Darwin are supported."; 24 24 25 25 languageServerSha256 = { 26 - "linux-x64" = "0j9251f8dfccmg0x9gzg1cai4k5zd0alcfpb0443gs4jqakl0lr2"; 27 - "osx-x64" = "070qwwl08fa24rsnln4i5x9mfriqaw920l6v2j8d1r0zylxnyjsa"; 28 - }."${arch}"; 26 + linux-x64 = "0j9251f8dfccmg0x9gzg1cai4k5zd0alcfpb0443gs4jqakl0lr2"; 27 + osx-x64 = "070qwwl08fa24rsnln4i5x9mfriqaw920l6v2j8d1r0zylxnyjsa"; 28 + }.${arch}; 29 29 30 30 # version is languageServerVersion in the package.json 31 31 languageServer = extractNuGet rec {
+4 -4
pkgs/os-specific/bsd/netbsd/default.nix
··· 38 38 HOST_SH = "${buildPackages.bash}/bin/sh"; 39 39 40 40 MACHINE_ARCH = { 41 - "i686" = "i386"; 41 + i686 = "i386"; 42 42 }.${stdenv'.hostPlatform.parsed.cpu.name} 43 43 or stdenv'.hostPlatform.parsed.cpu.name; 44 44 45 45 MACHINE = { 46 - "x86_64" = "amd64"; 47 - "aarch64" = "evbarm64"; 48 - "i686" = "i386"; 46 + x86_64 = "amd64"; 47 + aarch64 = "evbarm64"; 48 + i686 = "i386"; 49 49 }.${stdenv'.hostPlatform.parsed.cpu.name} 50 50 or stdenv'.hostPlatform.parsed.cpu.name; 51 51
+3 -3
pkgs/os-specific/darwin/xcode/sdk-pkgs.nix
··· 14 14 minSdkVersion = "9.0"; 15 15 16 16 iosPlatformArch = { parsed, ... }: { 17 - "armv7a" = "armv7"; 18 - "aarch64" = "arm64"; 19 - "x86_64" = "x86_64"; 17 + armv7a = "armv7"; 18 + aarch64 = "arm64"; 19 + x86_64 = "x86_64"; 20 20 }.${parsed.cpu.name}; 21 21 22 22 in
+3 -3
pkgs/os-specific/linux/kernel/linux-rpi.nix
··· 16 16 }; 17 17 18 18 defconfig = { 19 - "armv6l-linux" = "bcmrpi_defconfig"; 20 - "armv7l-linux" = "bcm2709_defconfig"; 21 - "aarch64-linux" = "bcmrpi3_defconfig"; 19 + armv6l-linux = "bcmrpi_defconfig"; 20 + armv7l-linux = "bcm2709_defconfig"; 21 + aarch64-linux = "bcmrpi3_defconfig"; 22 22 }.${stdenv.hostPlatform.system} or (throw "linux_rpi not supported on '${stdenv.hostPlatform.system}'"); 23 23 24 24 features = {
+7 -7
pkgs/servers/nosql/arangodb/default.nix
··· 33 33 "-DUSE_OPTIMIZE_FOR_ARCHITECTURE=OFF" 34 34 # also avoid using builder's /proc/cpuinfo 35 35 ] ++ 36 - { "westmere" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 37 - "sandybridge" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 38 - "ivybridge" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 39 - "haswell" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 40 - "broadwell" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 41 - "skylake" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 42 - "skylake-avx512" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 36 + { westmere = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 37 + sandybridge = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 38 + ivybridge = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 39 + haswell = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 40 + broadwell = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 41 + skylake = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 42 + skylake-avx512 = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ]; 43 43 }.${stdenv.hostPlatform.platform.gcc.arch or ""} or [ "-DHAVE_SSE42=OFF" "-DASM_OPTIMIZATIONS=OFF" ]; 44 44 45 45 enableParallelBuilding = true;
+5 -5
pkgs/servers/search/elasticsearch/7.x.nix
··· 17 17 shas = 18 18 if enableUnfree 19 19 then { 20 - "x86_64-linux" = "1jkfllafcjqhfydsy90jx2ghpv5cmm6gabv206niwg9qc6y6r1ik"; 21 - "x86_64-darwin" = "1lgyxq3yahdww0wpqmpc1mz57kmk5hy2drb1dha69k9l0ibmjf18"; 20 + x86_64-linux = "1jkfllafcjqhfydsy90jx2ghpv5cmm6gabv206niwg9qc6y6r1ik"; 21 + x86_64-darwin = "1lgyxq3yahdww0wpqmpc1mz57kmk5hy2drb1dha69k9l0ibmjf18"; 22 22 } 23 23 else { 24 - "x86_64-linux" = "0pg22wi2xcjla44azfvn9c58r4xq3x9jiwh7qb0d8f3nv30vfd10"; 25 - "x86_64-darwin" = "0d9xg3bf06mr7mw2bd16gb2xrfjncrhj19846rrj4j5gb2qjz0x2"; 24 + x86_64-linux = "0pg22wi2xcjla44azfvn9c58r4xq3x9jiwh7qb0d8f3nv30vfd10"; 25 + x86_64-darwin = "0d9xg3bf06mr7mw2bd16gb2xrfjncrhj19846rrj4j5gb2qjz0x2"; 26 26 }; 27 27 in 28 28 stdenv.mkDerivation (rec { ··· 31 31 32 32 src = fetchurl { 33 33 url = "https://artifacts.elastic.co/downloads/elasticsearch/${name}-${plat}-${arch}.tar.gz"; 34 - sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture"); 34 + sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture"); 35 35 }; 36 36 37 37 patches = [ ./es-home-6.x.patch ];
+1 -1
pkgs/servers/web-apps/cryptpad/node-packages.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../../development/node-packages/node-env.nix {
+21 -21
pkgs/stdenv/default.nix
··· 39 39 if crossSystem != localSystem || crossOverlays != [] then stagesCross 40 40 else if config ? replaceStdenv then stagesCustom 41 41 else { # switch 42 - "i686-linux" = stagesLinux; 43 - "x86_64-linux" = stagesLinux; 44 - "armv5tel-linux" = stagesLinux; 45 - "armv6l-linux" = stagesLinux; 46 - "armv6m-linux" = stagesLinux; 47 - "armv7a-linux" = stagesLinux; 48 - "armv7l-linux" = stagesLinux; 49 - "armv7r-linux" = stagesLinux; 50 - "armv7m-linux" = stagesLinux; 51 - "armv8a-linux" = stagesLinux; 52 - "armv8r-linux" = stagesLinux; 53 - "armv8m-linux" = stagesLinux; 54 - "aarch64-linux" = stagesLinux; 55 - "mipsel-linux" = stagesLinux; 56 - "powerpc-linux" = /* stagesLinux */ stagesNative; 57 - "powerpc64le-linux" = stagesLinux; 58 - "x86_64-darwin" = stagesDarwin; 59 - "x86_64-solaris" = stagesNix; 60 - "i686-cygwin" = stagesNative; 61 - "x86_64-cygwin" = stagesNative; 62 - "x86_64-freebsd" = stagesFreeBSD; 42 + i686-linux = stagesLinux; 43 + x86_64-linux = stagesLinux; 44 + armv5tel-linux = stagesLinux; 45 + armv6l-linux = stagesLinux; 46 + armv6m-linux = stagesLinux; 47 + armv7a-linux = stagesLinux; 48 + armv7l-linux = stagesLinux; 49 + armv7r-linux = stagesLinux; 50 + armv7m-linux = stagesLinux; 51 + armv8a-linux = stagesLinux; 52 + armv8r-linux = stagesLinux; 53 + armv8m-linux = stagesLinux; 54 + aarch64-linux = stagesLinux; 55 + mipsel-linux = stagesLinux; 56 + powerpc-linux = /* stagesLinux */ stagesNative; 57 + powerpc64le-linux = stagesLinux; 58 + x86_64-darwin = stagesDarwin; 59 + x86_64-solaris = stagesNix; 60 + i686-cygwin = stagesNative; 61 + x86_64-cygwin = stagesNative; 62 + x86_64-freebsd = stagesFreeBSD; 63 63 }.${localSystem.system} or stagesNative
+1 -1
pkgs/stdenv/generic/check-meta.nix
··· 152 152 153 153 '' + (builtins.getAttr reason remediation) attrs; 154 154 155 - handler = if config ? "handleEvalIssue" 155 + handler = if config ? handleEvalIssue 156 156 then config.handleEvalIssue reason 157 157 else throw; 158 158 in handler msg;
+14 -14
pkgs/stdenv/linux/default.nix
··· 8 8 9 9 , bootstrapFiles ? 10 10 let table = { 11 - "glibc" = { 12 - "i686-linux" = import ./bootstrap-files/i686.nix; 13 - "x86_64-linux" = import ./bootstrap-files/x86_64.nix; 14 - "armv5tel-linux" = import ./bootstrap-files/armv5tel.nix; 15 - "armv6l-linux" = import ./bootstrap-files/armv6l.nix; 16 - "armv7l-linux" = import ./bootstrap-files/armv7l.nix; 17 - "aarch64-linux" = import ./bootstrap-files/aarch64.nix; 18 - "mipsel-linux" = import ./bootstrap-files/loongson2f.nix; 19 - "powerpc64le-linux" = import ./bootstrap-files/ppc64le.nix; 11 + glibc = { 12 + i686-linux = import ./bootstrap-files/i686.nix; 13 + x86_64-linux = import ./bootstrap-files/x86_64.nix; 14 + armv5tel-linux = import ./bootstrap-files/armv5tel.nix; 15 + armv6l-linux = import ./bootstrap-files/armv6l.nix; 16 + armv7l-linux = import ./bootstrap-files/armv7l.nix; 17 + aarch64-linux = import ./bootstrap-files/aarch64.nix; 18 + mipsel-linux = import ./bootstrap-files/loongson2f.nix; 19 + powerpc64le-linux = import ./bootstrap-files/ppc64le.nix; 20 20 }; 21 - "musl" = { 22 - "aarch64-linux" = import ./bootstrap-files/aarch64-musl.nix; 23 - "armv6l-linux" = import ./bootstrap-files/armv6l-musl.nix; 24 - "x86_64-linux" = import ./bootstrap-files/x86_64-musl.nix; 25 - "powerpc64le-linux" = import ./bootstrap-files/ppc64le-musl.nix; 21 + musl = { 22 + aarch64-linux = import ./bootstrap-files/aarch64-musl.nix; 23 + armv6l-linux = import ./bootstrap-files/armv6l-musl.nix; 24 + x86_64-linux = import ./bootstrap-files/x86_64-musl.nix; 25 + powerpc64le-linux = import ./bootstrap-files/ppc64le-musl.nix; 26 26 }; 27 27 }; 28 28
+2 -2
pkgs/stdenv/native/default.nix
··· 121 121 122 122 cc = let 123 123 nativePrefix = { # switch 124 - "i686-solaris" = "/usr/gnu"; 125 - "x86_64-solaris" = "/opt/local/gcc47"; 124 + i686-solaris = "/usr/gnu"; 125 + x86_64-solaris = "/opt/local/gcc47"; 126 126 }.${system} or "/usr"; 127 127 in 128 128 import ../../build-support/cc-wrapper {
+2 -2
pkgs/tools/admin/pulumi/default.nix
··· 8 8 9 9 # switch the dropdown to “manual” on https://pulumi.io/quickstart/install.html # TODO: update script 10 10 pulumiArchPackage = { 11 - "x86_64-linux" = { 11 + x86_64-linux = { 12 12 url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-linux-x64.tar.gz"; 13 13 sha256 = "13ajgc8x5l3s93hmz6jg88if10bvd319jmkljy4n26zdp30vfqmw"; 14 14 }; 15 - "x86_64-darwin" = { 15 + x86_64-darwin = { 16 16 url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-darwin-x64.tar.gz"; 17 17 sha256 = "0chpbnz2s4icwgmfq6kl8blz5mg4lpdqg061w3nh0p04adpgrn48"; 18 18 };
+1 -1
pkgs/tools/backup/lvmsync/default.nix
··· 3 3 let 4 4 5 5 pname = "lvmsync"; 6 - version = (import ./gemset.nix)."${pname}".version; 6 + version = (import ./gemset.nix).${pname}.version; 7 7 8 8 in stdenv.mkDerivation rec { 9 9
+3 -3
pkgs/tools/bootloaders/refind/default.nix
··· 2 2 3 3 let 4 4 archids = { 5 - "x86_64-linux" = { hostarch = "x86_64"; efiPlatform = "x64"; }; 6 - "i686-linux" = rec { hostarch = "ia32"; efiPlatform = hostarch; }; 7 - "aarch64-linux" = rec { hostarch = "aarch64"; efiPlatform = "aa64"; }; 5 + x86_64-linux = { hostarch = "x86_64"; efiPlatform = "x64"; }; 6 + i686-linux = rec { hostarch = "ia32"; efiPlatform = hostarch; }; 7 + aarch64-linux = rec { hostarch = "aarch64"; efiPlatform = "aa64"; }; 8 8 }; 9 9 10 10 inherit
+8 -8
pkgs/tools/misc/grub/2.0x.nix
··· 10 10 with stdenv.lib; 11 11 let 12 12 pcSystems = { 13 - "i686-linux".target = "i386"; 14 - "x86_64-linux".target = "i386"; 13 + i686-linux.target = "i386"; 14 + x86_64-linux.target = "i386"; 15 15 }; 16 16 17 17 efiSystemsBuild = { 18 - "i686-linux".target = "i386"; 19 - "x86_64-linux".target = "x86_64"; 20 - "aarch64-linux".target = "aarch64"; 18 + i686-linux.target = "i386"; 19 + x86_64-linux.target = "x86_64"; 20 + aarch64-linux.target = "aarch64"; 21 21 }; 22 22 23 23 # For aarch64, we need to use '--target=aarch64-efi' when building, 24 24 # but '--target=arm64-efi' when installing. Insanity! 25 25 efiSystemsInstall = { 26 - "i686-linux".target = "i386"; 27 - "x86_64-linux".target = "x86_64"; 28 - "aarch64-linux".target = "arm64"; 26 + i686-linux.target = "i386"; 27 + x86_64-linux.target = "x86_64"; 28 + aarch64-linux.target = "arm64"; 29 29 }; 30 30 31 31 canEfi = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) efiSystemsBuild);
+3 -3
pkgs/tools/misc/grub/pvgrub_image/default.nix
··· 3 3 with stdenv.lib; 4 4 let 5 5 efiSystemsBuild = { 6 - "i686-linux".target = "i386"; 7 - "x86_64-linux".target = "x86_64"; 8 - "aarch64-linux".target = "aarch64"; 6 + i686-linux.target = "i386"; 7 + x86_64-linux.target = "x86_64"; 8 + aarch64-linux.target = "aarch64"; 9 9 }; 10 10 11 11 in (
+2 -2
pkgs/tools/misc/grub/trusted.nix
··· 6 6 with stdenv.lib; 7 7 let 8 8 pcSystems = { 9 - "i686-linux".target = "i386"; 10 - "x86_64-linux".target = "i386"; 9 + i686-linux.target = "i386"; 10 + x86_64-linux.target = "i386"; 11 11 }; 12 12 13 13 inPCSystems = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) pcSystems);
+1 -1
pkgs/tools/networking/airfield/node.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../../development/node-packages/node-env.nix {
+1 -1
pkgs/tools/networking/envoy/default.nix
··· 127 127 # Generate the BUILD file. 128 128 buildFile = 129 129 let field = name: attrs: 130 - if attrs ? "${name}" then " ${name} = ${attrs.${name}},\n" else ""; 130 + if attrs ? ${name} then " ${name} = ${attrs.${name}},\n" else ""; 131 131 in 132 132 '' 133 133 licenses(["notice"]) # Apache 2
+1 -1
pkgs/tools/networking/s6-networking/default.nix
··· 11 11 inherit (stdenv) lib; 12 12 sslSupportEnabled = sslSupport != false; 13 13 sslLibs = { 14 - "libressl" = libressl; 14 + libressl = libressl; 15 15 }; 16 16 17 17 in
+1 -1
pkgs/tools/package-management/nixui/nixui.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../../development/node-packages/node-env.nix {
+1 -1
pkgs/tools/security/bitwarden-cli/node-packages.nix
··· 2 2 3 3 {pkgs ? import <nixpkgs> { 4 4 inherit system; 5 - }, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}: 5 + }, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}: 6 6 7 7 let 8 8 nodeEnv = import ../../../development/node-packages/node-env.nix {
+2 -2
pkgs/tools/security/bitwarden/default.nix
··· 16 16 pname = "bitwarden"; 17 17 18 18 version = { 19 - "x86_64-linux" = "1.15.2"; 19 + x86_64-linux = "1.15.2"; 20 20 }.${system} or ""; 21 21 22 22 sha256 = { 23 - "x86_64-linux" = "0yz4hkqqwq2zrdjfxk5kybhs90n80k6bkn0625m47b09lwl2di4f"; 23 + x86_64-linux = "0yz4hkqqwq2zrdjfxk5kybhs90n80k6bkn0625m47b09lwl2di4f"; 24 24 }.${system} or ""; 25 25 26 26 meta = with stdenv.lib; {
+6 -6
pkgs/tools/security/vault/vault-bin.nix
··· 6 6 sources = let 7 7 base = "https://releases.hashicorp.com/vault/${version}"; 8 8 in { 9 - "x86_64-linux" = fetchurl { 9 + x86_64-linux = fetchurl { 10 10 url = "${base}/vault_${version}_linux_amd64.zip"; 11 11 sha256 = "293b88f4d31f6bcdcc8b508eccb7b856a0423270adebfa0f52f04144c5a22ae0"; 12 12 }; 13 - "i686-linux" = fetchurl { 13 + i686-linux = fetchurl { 14 14 url = "${base}/vault_${version}_linux_386.zip"; 15 15 sha256 = "9f2fb99e08fa3d25af1497516d08b5d2d8a73bcacd5354ddec024e9628795867"; 16 16 }; 17 - "x86_64-darwin" = fetchurl { 17 + x86_64-darwin = fetchurl { 18 18 url = "${base}/vault_${version}_darwin_amd64.zip"; 19 19 sha256 = "a0a7a242f8299ac4a00af8aa10ccedaf63013c8a068f56eadfb9d730b87155ea"; 20 20 }; 21 - "i686-darwin" = fetchurl { 21 + i686-darwin = fetchurl { 22 22 url = "${base}/vault_${version}_darwin_386.zip"; 23 23 sha256 = "50542cfb37abb06e8bb6b8ba41f5ca7d72a4d6a4396d4e3f4a8391bed14f63be"; 24 24 }; 25 - "aarch64-linux" = fetchurl { 25 + aarch64-linux = fetchurl { 26 26 url = "${base}/vault_${version}_linux_arm64.zip"; 27 27 sha256 = "c243dce14b2e48e3667c2aa5b7fb37009dd7043b56032d6ebe50dd456715fd3f"; 28 28 }; ··· 32 32 pname = "vault-bin"; 33 33 inherit version; 34 34 35 - src = sources."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 35 + src = sources.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}"); 36 36 37 37 nativeBuildInputs = [ unzip ]; 38 38
+14 -14
pkgs/tools/typesetting/kindlegen/default.nix
··· 5 5 fileVersion = builtins.replaceStrings [ "." ] [ "_" ] version; 6 6 7 7 sha256 = { 8 - "x86_64-linux" = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q"; 9 - "i686-linux" = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q"; 10 - "x86_64-darwin" = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs"; 11 - "i686-darwin" = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs"; 12 - "x86_64-cygwin" = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h"; 13 - "i686-cygwin" = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h"; 14 - }."${stdenv.hostPlatform.system}" or (throw "system #{stdenv.hostPlatform.system.} is not supported"); 8 + x86_64-linux = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q"; 9 + i686-linux = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q"; 10 + x86_64-darwin = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs"; 11 + i686-darwin = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs"; 12 + x86_64-cygwin = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h"; 13 + i686-cygwin = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h"; 14 + }.${stdenv.hostPlatform.system} or (throw "system #{stdenv.hostPlatform.system.} is not supported"); 15 15 16 16 url = { 17 - "x86_64-linux" = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz"; 18 - "i686-linux" = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz"; 19 - "x86_64-darwin" = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip"; 20 - "i686-darwin" = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip"; 21 - "x86_64-cygwin" = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip"; 22 - "i686-cygwin" = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip"; 23 - }."${stdenv.hostPlatform.system}" or (throw "system #{stdenv.hostPlatform.system.} is not supported"); 17 + x86_64-linux = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz"; 18 + i686-linux = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz"; 19 + x86_64-darwin = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip"; 20 + i686-darwin = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip"; 21 + x86_64-cygwin = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip"; 22 + i686-cygwin = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip"; 23 + }.${stdenv.hostPlatform.system} or (throw "system #{stdenv.hostPlatform.system.} is not supported"); 24 24 25 25 in stdenv.mkDerivation rec { 26 26 pname = "kindlegen";
+2 -2
pkgs/tools/typesetting/tex/texlive/default.nix
··· 84 84 # the fake derivations are used for filtering of hyphenation patterns 85 85 else { inherit pname version; tlType = "run"; } 86 86 )] 87 - ++ lib.optional (attrs.sha512 ? "doc") (mkPkgV "doc") 88 - ++ lib.optional (attrs.sha512 ? "source") (mkPkgV "source") 87 + ++ lib.optional (attrs.sha512 ? doc) (mkPkgV "doc") 88 + ++ lib.optional (attrs.sha512 ? source) (mkPkgV "source") 89 89 ++ lib.optional (bin ? ${pname}) 90 90 ( bin.${pname} // { inherit pname; tlType = "bin"; } ) 91 91 ++ combinePkgs (attrs.deps or {});
+4 -4
pkgs/top-level/haskell-packages.nix
··· 105 105 (pkgs.lib.attrNames compiler); 106 106 in pkgs.recurseIntoAttrs (pkgs.lib.genAttrs 107 107 integerSimpleGhcNames 108 - (name: compiler."${name}".override { enableIntegerSimple = true; })); 108 + (name: compiler.${name}.override { enableIntegerSimple = true; })); 109 109 }; 110 110 111 111 # Default overrides that are applied to all package sets. ··· 176 176 integerSimpleGhcNames = pkgs.lib.filter 177 177 (name: ! builtins.elem name integerSimpleExcludes) 178 178 (pkgs.lib.attrNames packages); 179 - in pkgs.lib.genAttrs integerSimpleGhcNames (name: packages."${name}".override { 180 - ghc = bh.compiler.integer-simple."${name}"; 181 - buildHaskellPackages = bh.packages.integer-simple."${name}"; 179 + in pkgs.lib.genAttrs integerSimpleGhcNames (name: packages.${name}.override { 180 + ghc = bh.compiler.integer-simple.${name}; 181 + buildHaskellPackages = bh.packages.integer-simple.${name}; 182 182 overrides = _self : _super : { 183 183 integer-simple = null; 184 184 integer-gmp = null;
+6 -6
pkgs/top-level/stage.nix
··· 169 169 then "localSystem" else "crossSystem"} = { 170 170 parsed = stdenv.hostPlatform.parsed // { 171 171 abi = { 172 - "gnu" = lib.systems.parse.abis.musl; 173 - "gnueabi" = lib.systems.parse.abis.musleabi; 174 - "gnueabihf" = lib.systems.parse.abis.musleabihf; 172 + gnu = lib.systems.parse.abis.musl; 173 + gnueabi = lib.systems.parse.abis.musleabi; 174 + gnueabihf = lib.systems.parse.abis.musleabihf; 175 175 }.${stdenv.hostPlatform.parsed.abi.name} 176 176 or lib.systems.parse.abis.musl; 177 177 }; ··· 217 217 crossSystem = { 218 218 parsed = stdenv.hostPlatform.parsed // { 219 219 abi = { 220 - "gnu" = lib.systems.parse.abis.musl; 221 - "gnueabi" = lib.systems.parse.abis.musleabi; 222 - "gnueabihf" = lib.systems.parse.abis.musleabihf; 220 + gnu = lib.systems.parse.abis.musl; 221 + gnueabi = lib.systems.parse.abis.musleabi; 222 + gnueabihf = lib.systems.parse.abis.musleabihf; 223 223 }.${stdenv.hostPlatform.parsed.abi.name} 224 224 or lib.systems.parse.abis.musl; 225 225 };