Merge pull request #43863 from volth/unused4

[bot] nixos/*: remove unused arguments in lambdas

authored by

Jörg Thalheim and committed by
GitHub
e9ff0f94 f43b593b

+419 -424
+1 -1
nixos/lib/build-vms.nix
··· 47 47 machinesNumbered = zipLists machines (range 1 254); 48 48 49 49 nodes_ = flip map machinesNumbered (m: nameValuePair m.fst 50 - [ ( { config, pkgs, nodes, ... }: 50 + [ ( { config, nodes, ... }: 51 51 let 52 52 interfacesNumbered = zipLists config.virtualisation.vlans (range 1 255); 53 53 interfaces = flip map interfacesNumbered ({ fst, snd }:
-3
nixos/lib/make-disk-image.nix
··· 24 24 # most likely fails as GRUB will probably refuse to install. 25 25 partitionTableType ? "legacy" 26 26 27 - # Whether to invoke switch-to-configuration boot during image creation 28 - , installBootLoader ? true 29 - 30 27 , # The root file system type. 31 28 fsType ? "ext4" 32 29
+1 -1
nixos/lib/make-iso9660-image.nix
··· 1 - { stdenv, perl, closureInfo, xorriso, syslinux 1 + { stdenv, closureInfo, xorriso, syslinux 2 2 3 3 , # The file name of the resulting ISO image. 4 4 isoName ? "cd.iso"
+1 -1
nixos/lib/testing.nix
··· 222 222 runInMachineWithX = { require ? [], ... } @ args: 223 223 let 224 224 client = 225 - { config, pkgs, ... }: 225 + { ... }: 226 226 { 227 227 inherit require; 228 228 virtualisation.memorySize = 1024;
+2 -2
nixos/maintainers/option-usages.nix
··· 149 149 else testOptions; 150 150 checkAll = checkList == []; 151 151 in 152 - flip filter graph ({option, usedBy}: 152 + flip filter graph ({option, ...}: 153 153 (checkAll || elem option checkList) 154 154 && !(elem option excludedTestOptions) 155 155 ); ··· 165 165 ''; 166 166 167 167 graphToText = graph: 168 - concatMapStrings ({option, usedBy}: 168 + concatMapStrings ({usedBy, ...}: 169 169 concatMapStrings (user: '' 170 170 ${user} 171 171 '') usedBy
+1 -1
nixos/modules/config/no-x-libs.nix
··· 1 1 # This module gets rid of all dependencies on X11 client libraries 2 2 # (including fontconfig). 3 3 4 - { config, lib, pkgs, ... }: 4 + { config, lib, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/config/nsswitch.nix
··· 1 1 # Configuration for the Name Service Switch (/etc/nsswitch.conf). 2 2 3 - { config, lib, pkgs, ... }: 3 + { config, lib, ... }: 4 4 5 5 with lib; 6 6
+1 -1
nixos/modules/config/power-management.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/config/sysctl.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/config/unix-odbc-drivers.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/config/users-groups.nix
··· 282 282 283 283 }; 284 284 285 - groupOpts = { name, config, ... }: { 285 + groupOpts = { name, ... }: { 286 286 287 287 options = { 288 288
+1 -1
nixos/modules/config/vpnc.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/hardware/network/smc-2632w/default.nix
··· 1 - {lib, config, ...}: 1 + {lib, ...}: 2 2 3 3 { 4 4 hardware = {
+1 -1
nixos/modules/hardware/network/zydas-zd1211.nix
··· 1 - {pkgs, config, ...}: 1 + {pkgs, ...}: 2 2 3 3 { 4 4 hardware.firmware = [ pkgs.zd1211fw ];
+1 -1
nixos/modules/hardware/video/ati.nix
··· 1 1 # This module provides the proprietary ATI X11 / OpenGL drivers. 2 2 3 - { config, lib, pkgs, pkgs_i686, ... }: 3 + { config, lib, pkgs_i686, ... }: 4 4 5 5 with lib; 6 6
+1 -1
nixos/modules/hardware/video/capture/mwprocapture.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -3
nixos/modules/hardware/video/uvcvideo/uvcdynctrl-udev-rules.nix
··· 1 - { lib 2 - , stdenv 3 - , buildEnv 1 + { buildEnv 4 2 , libwebcam 5 3 , makeWrapper 6 4 , runCommand
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-graphical-kde-new-kernel.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4 imports = [ ./installation-cd-graphical-kde.nix ];
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4 imports = [ ./installation-cd-minimal.nix ];
+1 -1
nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
··· 1 1 # This module defines a small NixOS installation CD. It does not 2 2 # contain any graphical stuff. 3 3 4 - { config, lib, pkgs, ... }: 4 + { ... }: 5 5 6 6 { 7 7 imports =
+1 -1
nixos/modules/installer/netboot/netboot-base.nix
··· 1 1 # This module contains the basic configuration for building netboot 2 2 # images 3 3 4 - { config, lib, pkgs, ... }: 4 + { lib, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/installer/netboot/netboot-minimal.nix
··· 1 1 # This module defines a small netboot environment. 2 2 3 - { config, lib, ... }: 3 + { ... }: 4 4 5 5 { 6 6 imports =
+1 -1
nixos/modules/installer/scan/detected.nix
··· 1 1 # List all devices which are detected by nixos-generate-config. 2 2 # Common devices are enabled by default. 3 - { config, lib, pkgs, ... }: 3 + { lib, ... }: 4 4 5 5 with lib; 6 6
+1 -1
nixos/modules/installer/tools/tools.nix
··· 1 1 # This module generates nixos-install, nixos-rebuild, 2 2 # nixos-generate-config, etc. 3 3 4 - { config, lib, pkgs, modulesPath, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/installer/virtualbox-demo.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/misc/assertions.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/misc/extra-arguments.nix
··· 1 - { lib, pkgs, config, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4 _module.args = {
+1 -1
nixos/modules/misc/ids.nix
··· 9 9 # Systemd can also change ownership of service directories using the 10 10 # RuntimeDirectory/StateDirectory options. 11 11 12 - { config, pkgs, lib, ... }: 12 + { lib, ... }: 13 13 14 14 { 15 15 options = {
+1 -1
nixos/modules/misc/label.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/misc/lib.nix
··· 1 - { config, lib, ... }: 1 + { lib, ... }: 2 2 3 3 { 4 4 options = {
+1 -1
nixos/modules/misc/locate.nix
··· 1 - { config, options, lib, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/misc/meta.nix
··· 1 - { config, lib, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/misc/passthru.nix
··· 1 1 # This module allows you to export something from configuration 2 2 # Use case: export kernel source expression for ease of configuring 3 3 4 - { config, lib, ... }: 4 + { lib, ... }: 5 5 6 6 { 7 7 options = {
+1 -1
nixos/modules/profiles/all-hardware.nix
··· 3 3 # enabled in the initrd. Its primary use is in the NixOS installation 4 4 # CDs. 5 5 6 - { config, pkgs, ... }: 6 + { ... }: 7 7 8 8 { 9 9
+1 -1
nixos/modules/profiles/base.nix
··· 1 1 # This module defines the software packages included in the "minimal" 2 2 # installation CD. It might be useful elsewhere. 3 3 4 - { config, lib, pkgs, ... }: 4 + { lib, pkgs, ... }: 5 5 6 6 { 7 7 # Include some utilities that are useful for installing or repairing
+1 -1
nixos/modules/profiles/demo.nix
··· 1 - { config, pkgs, ... }: 1 + { ... }: 2 2 3 3 { 4 4 imports = [ ./graphical.nix ];
+1 -1
nixos/modules/profiles/graphical.nix
··· 1 1 # This module defines a NixOS configuration with the Plasma 5 desktop. 2 2 # It's used by the graphical installation CD. 3 3 4 - { config, pkgs, ... }: 4 + { pkgs, ... }: 5 5 6 6 { 7 7 services.xserver = {
+1 -1
nixos/modules/profiles/hardened.nix
··· 1 1 # A profile with most (vanilla) hardening options enabled by default, 2 2 # potentially at the cost of features and performance. 3 3 4 - { config, lib, pkgs, ... }: 4 + { lib, pkgs, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/profiles/headless.nix
··· 1 1 # Common configuration for headless machines (e.g., Amazon EC2 2 2 # instances). 3 3 4 - { config, lib, pkgs, ... }: 4 + { lib, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/profiles/minimal.nix
··· 1 1 # This module defines a small NixOS configuration. It does not 2 2 # contain any graphical stuff. 3 3 4 - { config, lib, pkgs, ... }: 4 + { config, lib, ... }: 5 5 6 6 with lib; 7 7
+1 -1
nixos/modules/profiles/qemu-guest.nix
··· 1 1 # Common configuration for virtual machines running under QEMU (using 2 2 # virtio). 3 3 4 - { config, pkgs, ... }: 4 + { ... }: 5 5 6 6 { 7 7 boot.initrd.availableKernelModules = [ "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "9p" "9pnet_virtio" ];
+1 -1
nixos/modules/programs/atop.nix
··· 1 1 # Global configuration for atop. 2 2 3 - { config, lib, pkgs, ... }: 3 + { config, lib, ... }: 4 4 5 5 with lib; 6 6
+1 -1
nixos/modules/programs/bcc.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 { 3 3 options.programs.bcc.enable = lib.mkEnableOption "bcc"; 4 4
+1 -1
nixos/modules/programs/environment.nix
··· 2 2 3 3 # Most of the stuff here should probably be moved elsewhere sometime. 4 4 5 - { config, lib, pkgs, ... }: 5 + { config, lib, ... }: 6 6 7 7 with lib; 8 8
+1 -1
nixos/modules/programs/shell.nix
··· 1 1 # This module defines a standard configuration for NixOS shells. 2 2 3 - { config, lib, pkgs, ... }: 3 + { config, lib, ... }: 4 4 5 5 with lib; 6 6
+1 -1
nixos/modules/programs/systemtap.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/security/hidepid.nix
··· 1 - { config, pkgs, lib, ... }: 1 + { config, lib, ... }: 2 2 with lib; 3 3 4 4 {
+1 -1
nixos/modules/security/oath.nix
··· 1 1 # This module provides configuration for the OATH PAM modules. 2 2 3 - { config, lib, pkgs, ... }: 3 + { lib, ... }: 4 4 5 5 with lib; 6 6
+2 -2
nixos/modules/services/backup/bacula.nix
··· 97 97 ${dir_cfg.extraConfig} 98 98 ''; 99 99 100 - directorOptions = {name, config, ...}: 100 + directorOptions = {...}: 101 101 { 102 102 options = { 103 103 password = mkOption { ··· 117 117 }; 118 118 }; 119 119 120 - deviceOptions = {name, config, ...}: 120 + deviceOptions = {...}: 121 121 { 122 122 options = { 123 123 archiveDevice = mkOption {
+1 -1
nixos/modules/services/backup/borgbackup.nix
··· 510 510 ''; 511 511 default = { }; 512 512 type = types.attrsOf (types.submodule ( 513 - { name, config, ... }: { 513 + { ... }: { 514 514 options = { 515 515 516 516 path = mkOption {
+1 -1
nixos/modules/services/backup/restic.nix
··· 6 6 description = '' 7 7 Periodic backups to create with Restic. 8 8 ''; 9 - type = types.attrsOf (types.submodule ({ name, config, ... }: { 9 + type = types.attrsOf (types.submodule ({ name, ... }: { 10 10 options = { 11 11 passwordFile = mkOption { 12 12 type = types.str;
+1 -1
nixos/modules/services/continuous-integration/jenkins/slave.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 with lib; 3 3 let 4 4 cfg = config.services.jenkinsSlave;
+1 -1
nixos/modules/services/hardware/actkbd.nix
··· 15 15 ${cfg.extraConfig} 16 16 ''; 17 17 18 - bindingCfg = { config, ... }: { 18 + bindingCfg = { ... }: { 19 19 options = { 20 20 21 21 keys = mkOption {
+1 -1
nixos/modules/services/hardware/nvidia-optimus.nix
··· 1 - { config, pkgs, lib, ... }: 1 + { config, lib, ... }: 2 2 3 3 let kernel = config.boot.kernelPackages; in 4 4
+1 -1
nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
··· 9 9 10 10 etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; }; 11 11 12 - netDeviceOpts = { name, config, ... }: { 12 + netDeviceOpts = { name, ... }: { 13 13 14 14 options = { 15 15
+1 -1
nixos/modules/services/logging/journalwatch.nix
··· 1 - { config, lib, pkgs, services, ... }: 1 + { config, lib, pkgs, ... }: 2 2 with lib; 3 3 4 4 let
+1 -1
nixos/modules/services/mail/dovecot.nix
··· 110 110 special_use = \${toString mailbox.specialUse} 111 111 '' + "}"; 112 112 113 - mailboxes = { lib, pkgs, ... }: { 113 + mailboxes = { ... }: { 114 114 options = { 115 115 name = mkOption { 116 116 type = types.strMatching ''[^"]+'';
+1 -1
nixos/modules/services/mail/mail.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/emby.nix
··· 1 - { config, pkgs, lib, mono, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/jackett.nix
··· 1 - { config, pkgs, lib, mono, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/nix-gc.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/nix-optimise.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/nix-ssh-serve.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4 let cfg = config.nix.sshServe;
+1 -1
nixos/modules/services/misc/radarr.nix
··· 1 - { config, pkgs, lib, mono, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/sonarr.nix
··· 1 - { config, pkgs, lib, mono, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/misc/taskserver/default.nix
··· 84 84 in flatten (mapAttrsToList mkSublist attrs); 85 85 in all isNull (findPkiDefinitions [] manualPkiOptions); 86 86 87 - orgOptions = { name, ... }: { 87 + orgOptions = { ... }: { 88 88 options.users = mkOption { 89 89 type = types.uniq (types.listOf types.str); 90 90 default = [];
+1 -1
nixos/modules/services/monitoring/prometheus/exporters.nix
··· 94 94 }; 95 95 }); 96 96 97 - mkSubModule = { name, port, extraOpts, serviceOpts }: { 97 + mkSubModule = { name, port, extraOpts, ... }: { 98 98 ${name} = mkOption { 99 99 type = types.submodule { 100 100 options = (mkExporterOpts {
+1 -1
nixos/modules/services/monitoring/smartd.nix
··· 64 64 "DEVICESCAN ${notifyOpts}${cfg.defaults.autodetected}"} 65 65 ''; 66 66 67 - smartdDeviceOpts = { name, ... }: { 67 + smartdDeviceOpts = { ... }: { 68 68 69 69 options = { 70 70
+1 -1
nixos/modules/services/network-filesystems/beegfs.nix
··· 139 139 description = '' 140 140 BeeGFS configurations. Every mount point requires a separate configuration. 141 141 ''; 142 - type = with types; attrsOf (submodule ({ config, ... } : { 142 + type = with types; attrsOf (submodule ({ ... } : { 143 143 options = { 144 144 mgmtdHost = mkOption { 145 145 type = types.str;
+1 -1
nixos/modules/services/network-filesystems/openafs/lib.nix
··· 1 - { config, lib, pkgs, ...}: 1 + { config, lib, ...}: 2 2 3 3 let 4 4 inherit (lib) concatStringsSep mkOption types;
+1 -1
nixos/modules/services/networking/avahi-daemon.nix
··· 1 1 # Avahi daemon. 2 - { config, lib, utils, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 4 with lib; 5 5
+1 -1
nixos/modules/services/networking/cjdns.nix
··· 9 9 cfg = config.services.cjdns; 10 10 11 11 connectToSubmodule = 12 - { options, ... }: 12 + { ... }: 13 13 { options = 14 14 { password = mkOption { 15 15 type = types.str;
+2 -2
nixos/modules/services/networking/i2pd.nix
··· 405 405 outTunnels = mkOption { 406 406 default = {}; 407 407 type = with types; loaOf (submodule ( 408 - { name, config, ... }: { 408 + { name, ... }: { 409 409 options = { 410 410 destinationPort = mkOption { 411 411 type = types.int; ··· 426 426 inTunnels = mkOption { 427 427 default = {}; 428 428 type = with types; loaOf (submodule ( 429 - { name, config, ... }: { 429 + { name, ... }: { 430 430 options = { 431 431 inPort = mkOption { 432 432 type = types.int;
+1 -1
nixos/modules/services/networking/nghttpx/nghttpx-options.nix
··· 1 - { config, lib, ... }: 1 + { lib, ... }: 2 2 { options.services.nghttpx = { 3 3 enable = lib.mkEnableOption "nghttpx"; 4 4
+1 -1
nixos/modules/services/networking/nylon.nix
··· 22 22 Deny-IP=${concatStringsSep " " cfg.deniedIPRanges} 23 23 ''; 24 24 25 - nylonOpts = { name, config, ... }: { 25 + nylonOpts = { name, ... }: { 26 26 27 27 options = { 28 28
+1 -1
nixos/modules/services/networking/pptpd.nix
··· 1 - { config, stdenv, pkgs, lib, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/networking/shout.nix
··· 1 - { pkgs, lib, config, options, ... }: 1 + { pkgs, lib, config, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/networking/ssh/sshd.nix
··· 479 479 480 480 assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true; 481 481 message = "cannot enable X11 forwarding without setting xauth location";}] 482 - ++ flip map cfg.listenAddresses ({ addr, port, ... }: { 482 + ++ flip map cfg.listenAddresses ({ addr, ... }: { 483 483 assertion = addr != null; 484 484 message = "addr must be specified in each listenAddresses entry"; 485 485 });
+1 -1
nixos/modules/services/networking/toxvpn.nix
··· 1 - { config, stdenv, pkgs, lib, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/networking/tvheadend.nix
··· 1 - { config, coreutils, lib, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/networking/wireguard.nix
··· 10 10 11 11 # interface options 12 12 13 - interfaceOpts = { name, ... }: { 13 + interfaceOpts = { ... }: { 14 14 15 15 options = { 16 16
+1 -1
nixos/modules/services/networking/xl2tpd.nix
··· 1 - { config, stdenv, pkgs, lib, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/networking/zerobin.nix
··· 1 - { config, pkgs, lib, nodes, ... }: 1 + { config, pkgs, lib, ... }: 2 2 with lib; 3 3 let 4 4 cfg = config.services.zerobin;
+1 -1
nixos/modules/services/security/oauth2_proxy_nginx.nix
··· 1 - { pkgs, config, lib, ... }: 1 + { config, lib, ... }: 2 2 with lib; 3 3 let 4 4 cfg = config.services.oauth2_proxy.nginx;
+2 -2
nixos/modules/services/security/tor.nix
··· 578 578 ]; 579 579 } 580 580 ''; 581 - type = types.loaOf (types.submodule ({name, config, ...}: { 581 + type = types.loaOf (types.submodule ({name, ...}: { 582 582 options = { 583 583 584 584 name = mkOption { ··· 638 638 authorizeClient = mkOption { 639 639 default = null; 640 640 description = "If configured, the hidden service is accessible for authorized clients only."; 641 - type = types.nullOr (types.submodule ({config, ...}: { 641 + type = types.nullOr (types.submodule ({...}: { 642 642 643 643 options = { 644 644
+1 -1
nixos/modules/services/torrent/flexget.nix
··· 1 - { config, lib, pkgs, timezone, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/web-apps/matomo.nix
··· 1 - { config, lib, pkgs, services, ... }: 1 + { config, lib, pkgs, ... }: 2 2 with lib; 3 3 let 4 4 cfg = config.services.matomo;
+1 -1
nixos/modules/services/web-apps/youtrack.nix
··· 1 - { config, lib, pkgs, options, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/web-servers/apache-httpd/limesurvey.nix
··· 1 - { config, lib, pkgs, serverInfo, php, ... }: 1 + { config, lib, pkgs, serverInfo, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/web-servers/apache-httpd/mercurial.nix
··· 1 - { config, pkgs, serverInfo, lib, ... }: 1 + { config, pkgs, lib, ... }: 2 2 3 3 let 4 4 inherit (pkgs) mercurial;
+1 -1
nixos/modules/services/web-servers/apache-httpd/wordpress.nix
··· 1 - { config, lib, pkgs, serverInfo, php, ... }: 1 + { config, lib, pkgs, serverInfo, ... }: 2 2 # http://codex.wordpress.org/Hardening_WordPress 3 3 4 4 with lib;
+1 -1
nixos/modules/services/web-servers/nginx/vhost-options.nix
··· 3 3 # has additional options that affect the web server as a whole, like 4 4 # the user/group to run under.) 5 5 6 - { config, lib }: 6 + { lib, ... }: 7 7 8 8 with lib; 9 9 {
+1 -1
nixos/modules/services/web-servers/zope2.nix
··· 6 6 7 7 cfg = config.services.zope2; 8 8 9 - zope2Opts = { name, config, ... }: { 9 + zope2Opts = { name, ... }: { 10 10 options = { 11 11 12 12 name = mkOption {
+1 -1
nixos/modules/services/x11/display-managers/auto.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/x11/terminal-server.nix
··· 5 5 # not, a X server (Xvfb) is started for that user. The Xvfb instances 6 6 # persist across VNC sessions. 7 7 8 - { config, lib, pkgs, ... }: 8 + { lib, pkgs, ... }: 9 9 10 10 with lib; 11 11
+1 -1
nixos/modules/services/x11/window-managers/default.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/services/x11/window-managers/wmii.nix
··· 1 - { config, lib, pkgs, options, modulesPath, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4 let
+1 -1
nixos/modules/services/x11/xserver.nix
··· 1 - { config, lib, pkgs, pkgs_i686, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/system/activation/top-level.nix
··· 226 226 default = []; 227 227 example = lib.literalExample "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]"; 228 228 type = types.listOf (types.submodule ( 229 - { options, ... }: { 229 + { ... }: { 230 230 options.original = mkOption { 231 231 type = types.package; 232 232 description = "The original package to override.";
+1 -1
nixos/modules/system/boot/kexec.nix
··· 1 - { config, pkgs, lib, ... }: 1 + { pkgs, lib, ... }: 2 2 3 3 { 4 4 config = lib.mkIf (pkgs.kexectools.meta.available) {
+1 -1
nixos/modules/system/boot/loader/loader.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/system/boot/networkd.nix
··· 523 523 524 524 }; 525 525 526 - networkConfig = { name, config, ... }: { 526 + networkConfig = { config, ... }: { 527 527 config = { 528 528 matchConfig = optionalAttrs (config.name != null) { 529 529 Name = config.name;
+1 -1
nixos/modules/system/boot/resolved.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4 let
+3 -3
nixos/modules/system/boot/systemd.nix
··· 193 193 x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${mkScriptName name}"; inherit text; }; 194 194 in "${x}/bin/${mkScriptName name}"; 195 195 196 - unitConfig = { name, config, ... }: { 196 + unitConfig = { config, ... }: { 197 197 config = { 198 198 unitConfig = 199 199 optionalAttrs (config.requires != []) ··· 275 275 ]; 276 276 }; 277 277 278 - mountConfig = { name, config, ... }: { 278 + mountConfig = { config, ... }: { 279 279 config = { 280 280 mountConfig = 281 281 { What = config.what; ··· 288 288 }; 289 289 }; 290 290 291 - automountConfig = { name, config, ... }: { 291 + automountConfig = { config, ... }: { 292 292 config = { 293 293 automountConfig = 294 294 { Where = config.where;
+1 -1
nixos/modules/system/boot/timesyncd.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/tasks/bcache.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4
+1 -1
nixos/modules/tasks/filesystems/ext.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4 config = {
+1 -1
nixos/modules/tasks/network-interfaces-systemd.nix
··· 1 - { config, lib, pkgs, utils, ... }: 1 + { config, lib, utils, ... }: 2 2 3 3 with utils; 4 4 with lib;
+1 -1
nixos/modules/tasks/network-interfaces.nix
··· 1 - { config, options, lib, pkgs, utils, stdenv, ... }: 1 + { config, options, lib, pkgs, utils, ... }: 2 2 3 3 with lib; 4 4 with utils;
+1 -1
nixos/modules/tasks/swraid.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 3 3 { 4 4
+1 -1
nixos/modules/tasks/trackpoint.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/testing/service-runner.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, pkgs, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/virtualisation/amazon-options.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { config, lib, ... }: 2 2 { 3 3 options = { 4 4 ec2 = {
+1 -1
nixos/modules/virtualisation/azure-common.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, pkgs, ... }: 2 2 3 3 with lib; 4 4 {
+1 -1
nixos/modules/virtualisation/azure-config-user.nix
··· 1 - { config, pkgs, modulesPath, ... }: 1 + { modulesPath, ... }: 2 2 3 3 { 4 4 # To build the configuration or use nix-env, you need to run
+1 -1
nixos/modules/virtualisation/azure-config.nix
··· 1 - { config, pkgs, modulesPath, ... }: 1 + { modulesPath, ... }: 2 2 3 3 { 4 4 imports = [ "${modulesPath}/virtualisation/azure-image.nix" ];
+1 -1
nixos/modules/virtualisation/brightbox-config.nix
··· 1 - { config, pkgs, modulesPath, ... }: 1 + { modulesPath, ... }: 2 2 3 3 { 4 4 imports = [ "${modulesPath}/virtualisation/brightbox-image.nix" ];
+2 -2
nixos/modules/virtualisation/containers.nix
··· 257 257 258 258 system = config.nixpkgs.localSystem.system; 259 259 260 - bindMountOpts = { name, config, ... }: { 260 + bindMountOpts = { name, ... }: { 261 261 262 262 options = { 263 263 mountPoint = mkOption { ··· 284 284 285 285 }; 286 286 287 - allowedDeviceOpts = { name, config, ... }: { 287 + allowedDeviceOpts = { ... }: { 288 288 options = { 289 289 node = mkOption { 290 290 example = "/dev/net/tun";
+1 -1
nixos/modules/virtualisation/docker-image.nix
··· 1 - { config, pkgs, ... }: 1 + { ... }: 2 2 3 3 { 4 4 imports = [
+1 -1
nixos/modules/virtualisation/google-compute-config.nix
··· 1 - { config, pkgs, ... }: 1 + { ... }: 2 2 3 3 { 4 4 imports = [ <nixpkgs/nixos/modules/virtualisation/google-compute-image.nix> ];
+1 -1
nixos/modules/virtualisation/lxc-container.nix
··· 1 - { config, pkgs, lib, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/virtualisation/nova-config.nix
··· 1 - { config, lib, pkgs, ... }: 1 + { lib, ... }: 2 2 3 3 with lib; 4 4
+1 -1
nixos/modules/virtualisation/xen-domU.nix
··· 1 1 # Common configuration for Xen DomU NixOS virtual machines. 2 2 3 - { config, pkgs, ... }: 3 + { ... }: 4 4 5 5 { 6 6 boot.loader.grub.version = 2;
+15 -15
nixos/release.nix
··· 45 45 46 46 47 47 makeIso = 48 - { module, type, maintainers ? ["eelco"], system }: 48 + { module, type, system, ... }: 49 49 50 50 with import nixpkgs { inherit system; }; 51 51 ··· 56 56 57 57 58 58 makeSdImage = 59 - { module, maintainers ? ["dezgeg"], system }: 59 + { module, system, ... }: 60 60 61 61 with import nixpkgs { inherit system; }; 62 62 ··· 96 96 buildFromConfig = module: sel: forAllSystems (system: hydraJob (sel (import ./lib/eval-config.nix { 97 97 inherit system; 98 98 modules = [ module versionModule ] ++ singleton 99 - ({ config, lib, ... }: 99 + ({ ... }: 100 100 { fileSystems."/".device = mkDefault "/dev/sda1"; 101 101 boot.loader.grub.device = mkDefault "/dev/sda"; 102 102 }); ··· 128 128 129 129 channel = import lib/make-channel.nix { inherit pkgs nixpkgs version versionSuffix; }; 130 130 131 - manual = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manual); 132 - manualEpub = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manualEpub)); 133 - manpages = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.manpages); 134 - manualGeneratedSources = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.generatedSources); 135 - options = (buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.manual.optionsJSON)).x86_64-linux; 131 + manual = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manual); 132 + manualEpub = (buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manualEpub)); 133 + manpages = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.manpages); 134 + manualGeneratedSources = buildFromConfig ({ ... }: { }) (config: config.system.build.manual.generatedSources); 135 + options = (buildFromConfig ({ ... }: { }) (config: config.system.build.manual.optionsJSON)).x86_64-linux; 136 136 137 137 138 138 # Build the initial ramdisk so Hydra can keep track of its size over time. 139 - initialRamdisk = buildFromConfig ({ pkgs, ... }: { }) (config: config.system.build.initialRamdisk); 139 + initialRamdisk = buildFromConfig ({ ... }: { }) (config: config.system.build.initialRamdisk); 140 140 141 141 netboot = forMatchingSystems [ "x86_64-linux" "aarch64-linux" ] (system: makeNetboot { 142 142 inherit system; ··· 195 195 dummy = forAllSystems (system: pkgs.runCommand "dummy" 196 196 { toplevel = (import lib/eval-config.nix { 197 197 inherit system; 198 - modules = singleton ({ config, pkgs, ... }: 198 + modules = singleton ({ ... }: 199 199 { fileSystems."/".device = mkDefault "/dev/sda1"; 200 200 boot.loader.grub.device = mkDefault "/dev/sda"; 201 201 system.nixos.stateVersion = mkDefault "18.03"; ··· 424 424 425 425 closures = { 426 426 427 - smallContainer = makeClosure ({ pkgs, ... }: 427 + smallContainer = makeClosure ({ ... }: 428 428 { boot.isContainer = true; 429 429 services.openssh.enable = true; 430 430 }); 431 431 432 - tinyContainer = makeClosure ({ pkgs, ... }: 432 + tinyContainer = makeClosure ({ ... }: 433 433 { boot.isContainer = true; 434 434 imports = [ modules/profiles/minimal.nix ]; 435 435 }); 436 436 437 - ec2 = makeClosure ({ pkgs, ... }: 437 + ec2 = makeClosure ({ ... }: 438 438 { imports = [ modules/virtualisation/amazon-image.nix ]; 439 439 }); 440 440 441 - kde = makeClosure ({ pkgs, ... }: 441 + kde = makeClosure ({ ... }: 442 442 { services.xserver.enable = true; 443 443 services.xserver.displayManager.sddm.enable = true; 444 444 services.xserver.desktopManager.plasma5.enable = true; 445 445 }); 446 446 447 - xfce = makeClosure ({ pkgs, ... }: 447 + xfce = makeClosure ({ ... }: 448 448 { services.xserver.enable = true; 449 449 services.xserver.desktopManager.xfce.enable = true; 450 450 });
+1 -1
nixos/tests/acme.nix
··· 1 1 let 2 - commonConfig = { config, lib, pkgs, nodes, ... }: { 2 + commonConfig = { lib, nodes, ... }: { 3 3 networking.nameservers = [ 4 4 nodes.letsencrypt.config.networking.primaryIPAddress 5 5 ];
+1 -1
nixos/tests/ammonite.nix
··· 6 6 7 7 nodes = { 8 8 amm = 9 - { config, pkgs, ... }: 9 + { pkgs, ... }: 10 10 { 11 11 environment.systemPackages = [ pkgs.ammonite ]; 12 12 };
+2 -2
nixos/tests/atd.nix
··· 1 - import ./make-test.nix ({ pkgs, lib, ... }: 1 + import ./make-test.nix ({ pkgs, ... }: 2 2 3 3 { 4 4 name = "atd"; ··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, ... }: 10 + { ... }: 11 11 { services.atd.enable = true; 12 12 users.users.alice = { isNormalUser = true; }; 13 13 };
+1 -1
nixos/tests/avahi.nix
··· 6 6 }; 7 7 8 8 nodes = let 9 - cfg = { config, pkgs, ... }: { 9 + cfg = { ... }: { 10 10 services.avahi = { 11 11 enable = true; 12 12 nssmdns = true;
+3 -3
nixos/tests/beegfs.nix
··· 1 - import ./make-test.nix ({ pkgs, ... } : 1 + import ./make-test.nix ({ ... } : 2 2 3 3 let 4 4 connAuthFile="beegfs/auth-def.key"; 5 5 6 - client = { config, pkgs, lib, ... } : { 6 + client = { pkgs, ... } : { 7 7 networking.firewall.enable = false; 8 8 services.beegfsEnable = true; 9 9 services.beegfs.default = { ··· 31 31 }; 32 32 33 33 34 - server = service : { config, pkgs, lib, ... } : { 34 + server = service : { pkgs, ... } : { 35 35 networking.firewall.enable = false; 36 36 boot.initrd.postDeviceCommands = '' 37 37 ${pkgs.e2fsprogs}/bin/mkfs.ext4 -L data /dev/vdb
+4 -4
nixos/tests/bittorrent.nix
··· 30 30 31 31 nodes = 32 32 { tracker = 33 - { config, pkgs, ... }: 33 + { pkgs, ... }: 34 34 { environment.systemPackages = [ pkgs.transmission pkgs.opentracker ]; 35 35 36 36 # We need Apache on the tracker to serve the torrents. ··· 42 42 }; 43 43 44 44 router = 45 - { config, pkgs, ... }: 45 + { pkgs, ... }: 46 46 { environment.systemPackages = [ pkgs.miniupnpd ]; 47 47 virtualisation.vlans = [ 1 2 ]; 48 48 networking.nat.enable = true; ··· 52 52 }; 53 53 54 54 client1 = 55 - { config, pkgs, nodes, ... }: 55 + { pkgs, nodes, ... }: 56 56 { environment.systemPackages = [ pkgs.transmission ]; 57 57 virtualisation.vlans = [ 2 ]; 58 58 networking.defaultGateway = ··· 61 61 }; 62 62 63 63 client2 = 64 - { config, pkgs, ... }: 64 + { pkgs, ... }: 65 65 { environment.systemPackages = [ pkgs.transmission ]; 66 66 networking.firewall.enable = false; 67 67 };
+2 -2
nixos/tests/borgbackup.nix
··· 41 41 }; 42 42 43 43 nodes = { 44 - client = { config, pkgs, ... }: { 44 + client = { ... }: { 45 45 services.borgbackup.jobs = { 46 46 47 47 local = rec { ··· 84 84 }; 85 85 }; 86 86 87 - server = { config, pkgs, ... }: { 87 + server = { ... }: { 88 88 services.openssh = { 89 89 enable = true; 90 90 passwordAuthentication = false;
+3 -3
nixos/tests/buildbot.nix
··· 4 4 name = "buildbot"; 5 5 6 6 nodes = { 7 - bbmaster = { config, pkgs, ... }: { 7 + bbmaster = { pkgs, ... }: { 8 8 services.buildbot-master = { 9 9 enable = true; 10 10 package = pkgs.buildbot-full; ··· 22 22 environment.systemPackages = with pkgs; [ git buildbot-full ]; 23 23 }; 24 24 25 - bbworker = { config, pkgs, ... }: { 25 + bbworker = { pkgs, ... }: { 26 26 services.buildbot-worker = { 27 27 enable = true; 28 28 masterUrl = "bbmaster:9989"; ··· 30 30 environment.systemPackages = with pkgs; [ git buildbot-worker ]; 31 31 }; 32 32 33 - gitrepo = { config, pkgs, ... }: { 33 + gitrepo = { pkgs, ... }: { 34 34 services.openssh.enable = true; 35 35 networking.firewall.allowedTCPPorts = [ 22 9418 ]; 36 36 environment.systemPackages = with pkgs; [ git ];
+2 -2
nixos/tests/cadvisor.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - machine = { config, pkgs, ... }: { 8 + machine = { ... }: { 9 9 services.cadvisor.enable = true; 10 10 }; 11 11 12 - influxdb = { config, pkgs, lib, ... }: with lib; { 12 + influxdb = { lib, ... }: with lib; { 13 13 services.cadvisor.enable = true; 14 14 services.cadvisor.storageDriver = "influxdb"; 15 15 services.influxdb.enable = true;
+3 -3
nixos/tests/cassandra.nix
··· 24 24 name = "cassandra-ci"; 25 25 26 26 nodes = { 27 - cass0 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.1" {}; 28 - cass1 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.2" {}; 29 - cass2 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.3" { 27 + cass0 = { nodes, ... }: nodeCfg nodes "192.168.1.1" {}; 28 + cass1 = { nodes, ... }: nodeCfg nodes "192.168.1.2" {}; 29 + cass2 = { nodes, ... }: nodeCfg nodes "192.168.1.3" { 30 30 extraParams = [ 31 31 ''JVM_OPTS="$JVM_OPTS -Dcassandra.replace_address=192.168.1.2"'' 32 32 ];
+2 -2
nixos/tests/ceph.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - aio = { config, pkgs, ... }: { 8 + aio = { pkgs, ... }: { 9 9 virtualisation = { 10 10 emptyDiskImages = [ 20480 20480 ]; 11 11 vlans = [ 1 ]; ··· 55 55 }; 56 56 }; 57 57 58 - testScript = { nodes, ... }: '' 58 + testScript = { ... }: '' 59 59 startAll; 60 60 61 61 $aio->waitForUnit("network.target");
+4 -4
nixos/tests/cjdns.nix
··· 4 4 carolPassword = "678287829ce4c67bc8b227e56d94422ee1b85fa11618157b2f591de6c6322b52"; 5 5 6 6 basicConfig = 7 - { config, pkgs, ... }: 7 + { ... }: 8 8 { services.cjdns.enable = true; 9 9 10 10 # Turning off DHCP isn't very realistic but makes ··· 29 29 nodes = rec 30 30 { # Alice finds peers over over ETHInterface. 31 31 alice = 32 - { config, ... }: 32 + { ... }: 33 33 { imports = [ basicConfig ]; 34 34 35 35 services.cjdns.ETHInterface.bind = "eth1"; ··· 41 41 42 42 # Bob explicitly connects to Carol over UDPInterface. 43 43 bob = 44 - { config, lib, nodes, ... }: 44 + { ... }: 45 45 46 46 { imports = [ basicConfig ]; 47 47 ··· 63 63 # Carol listens on ETHInterface and UDPInterface, 64 64 # but knows neither Alice or Bob. 65 65 carol = 66 - { config, lib, nodes, ... }: 66 + { ... }: 67 67 { imports = [ basicConfig ]; 68 68 69 69 environment.etc."cjdns.keys".text = ''
+1 -1
nixos/tests/cloud-init.nix
··· 31 31 maintainers = [ lewo ]; 32 32 }; 33 33 machine = 34 - { config, pkgs, ... }: 34 + { ... }: 35 35 { 36 36 virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ]; 37 37 services.cloud-init.enable = true;
+1 -1
nixos/tests/common/user-account.nix
··· 1 - { lib, ... }: 1 + { ... }: 2 2 3 3 { users.users.alice = 4 4 { isNormalUser = true;
+1 -1
nixos/tests/containers-bridge.nix
··· 14 14 }; 15 15 16 16 machine = 17 - { config, pkgs, ... }: 17 + { pkgs, ... }: 18 18 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 19 19 virtualisation.writableStore = true; 20 20 virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-extra_veth.nix
··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, ... }: 10 + { pkgs, ... }: 11 11 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 12 12 virtualisation.writableStore = true; 13 13 virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-hosts.nix
··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, lib, ... }: 10 + { lib, ... }: 11 11 { 12 12 virtualisation.memorySize = 256; 13 13 virtualisation.vlans = [];
+1 -1
nixos/tests/containers-ipv4.nix
··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, ... }: 10 + { pkgs, ... }: 11 11 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 12 12 virtualisation.writableStore = true; 13 13 virtualisation.memorySize = 768;
+1 -1
nixos/tests/containers-ipv6.nix
··· 12 12 }; 13 13 14 14 machine = 15 - { config, pkgs, ... }: 15 + { pkgs, ... }: 16 16 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 17 17 virtualisation.writableStore = true; 18 18 virtualisation.memorySize = 768;
+2 -2
nixos/tests/containers-macvlans.nix
··· 15 15 nodes = { 16 16 17 17 machine1 = 18 - { config, pkgs, lib, ... }: 18 + { lib, ... }: 19 19 { 20 20 virtualisation.memorySize = 256; 21 21 virtualisation.vlans = [ 1 ]; ··· 55 55 }; 56 56 57 57 machine2 = 58 - { config, pkgs, ... }: 58 + { ... }: 59 59 { 60 60 virtualisation.memorySize = 256; 61 61 virtualisation.vlans = [ 1 ];
+4 -4
nixos/tests/containers-physical_interfaces.nix
··· 6 6 }; 7 7 8 8 nodes = { 9 - server = { config, pkgs, ... }: 9 + server = { ... }: 10 10 { 11 11 virtualisation.memorySize = 256; 12 12 virtualisation.vlans = [ 1 ]; ··· 23 23 }; 24 24 }; 25 25 }; 26 - bridged = { config, pkgs, ... }: { 26 + bridged = { ... }: { 27 27 virtualisation.memorySize = 128; 28 28 virtualisation.vlans = [ 1 ]; 29 29 ··· 41 41 }; 42 42 }; 43 43 44 - bonded = { config, pkgs, ... }: { 44 + bonded = { ... }: { 45 45 virtualisation.memorySize = 128; 46 46 virtualisation.vlans = [ 1 ]; 47 47 ··· 62 62 }; 63 63 }; 64 64 65 - bridgedbond = { config, pkgs, ... }: { 65 + bridgedbond = { ... }: { 66 66 virtualisation.memorySize = 128; 67 67 virtualisation.vlans = [ 1 ]; 68 68
+1 -1
nixos/tests/containers-portforward.nix
··· 14 14 }; 15 15 16 16 machine = 17 - { config, pkgs, ... }: 17 + { pkgs, ... }: 18 18 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 19 19 virtualisation.writableStore = true; 20 20 virtualisation.memorySize = 768;
+3 -3
nixos/tests/containers-reloadable.nix
··· 21 21 }; 22 22 23 23 nodes = { 24 - client = { lib, pkgs, ... }: { 24 + client = { ... }: { 25 25 imports = [ client_base ]; 26 26 }; 27 27 28 - client_c1 = { lib, pkgs, ... }: { 28 + client_c1 = { lib, ... }: { 29 29 imports = [ client_base ]; 30 30 31 31 containers.test1.config = { ··· 34 34 services.httpd.adminAddr = "nixos@example.com"; 35 35 }; 36 36 }; 37 - client_c2 = { lib, pkgs, ... }: { 37 + client_c2 = { lib, ... }: { 38 38 imports = [ client_base ]; 39 39 40 40 containers.test1.config = {
+4 -4
nixos/tests/containers-restart_networking.nix
··· 17 17 }; 18 18 }; 19 19 }; 20 - in import ./make-test.nix ({ pkgs, lib, ...} : 20 + in import ./make-test.nix ({ pkgs, ...} : 21 21 { 22 22 name = "containers-restart_networking"; 23 23 meta = with pkgs.stdenv.lib.maintainers; { ··· 25 25 }; 26 26 27 27 nodes = { 28 - client = { lib, pkgs, ... }: client_base // { 28 + client = { lib, ... }: client_base // { 29 29 virtualisation.vlans = [ 1 ]; 30 30 31 31 networking.bridges.br0 = { ··· 38 38 }; 39 39 40 40 }; 41 - client_eth1 = { lib, pkgs, ... }: client_base // { 41 + client_eth1 = { lib, ... }: client_base // { 42 42 networking.bridges.br0 = { 43 43 interfaces = [ "eth1" ]; 44 44 rstp = false; ··· 48 48 br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ]; 49 49 }; 50 50 }; 51 - client_eth1_rstp = { lib, pkgs, ... }: client_base // { 51 + client_eth1_rstp = { lib, ... }: client_base // { 52 52 networking.bridges.br0 = { 53 53 interfaces = [ "eth1" ]; 54 54 rstp = true;
+1 -1
nixos/tests/containers-tmpfs.nix
··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, ... }: 10 + { pkgs, ... }: 11 11 { imports = [ ../modules/installer/cd-dvd/channel.nix ]; 12 12 virtualisation.writableStore = true; 13 13 virtualisation.memorySize = 768;
+2 -2
nixos/tests/couchdb.nix
··· 10 10 11 11 nodes = { 12 12 couchdb1 = 13 - { pkgs, config, ... }: 13 + { pkgs, ... }: 14 14 15 15 { environment.systemPackages = with pkgs; [ jq ]; 16 16 services.couchdb.enable = true; 17 17 }; 18 18 19 19 couchdb2 = 20 - { pkgs, config, ... }: 20 + { pkgs, ... }: 21 21 22 22 { environment.systemPackages = with pkgs; [ jq ]; 23 23 services.couchdb.enable = true;
+1 -1
nixos/tests/deluge.nix
··· 6 6 7 7 nodes = { 8 8 server = 9 - { pkgs, config, ... }: 9 + { ... }: 10 10 11 11 { services.deluge = { 12 12 enable = true;
+1 -1
nixos/tests/dnscrypt-proxy.nix
··· 8 8 # A client running the recommended setup: DNSCrypt proxy as a forwarder 9 9 # for a caching DNS client. 10 10 client = 11 - { config, pkgs, ... }: 11 + { ... }: 12 12 let localProxyPort = 43; in 13 13 { 14 14 security.apparmor.enable = true;
+1 -1
nixos/tests/docker-edge.nix
··· 8 8 9 9 nodes = { 10 10 docker = 11 - { config, pkgs, ... }: 11 + { pkgs, ... }: 12 12 { 13 13 virtualisation.docker.enable = true; 14 14 virtualisation.docker.package = pkgs.docker-edge;
+3 -3
nixos/tests/docker-registry.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - registry = { config, pkgs, ... }: { 10 + registry = { ... }: { 11 11 services.dockerRegistry.enable = true; 12 12 services.dockerRegistry.enableDelete = true; 13 13 services.dockerRegistry.port = 8080; ··· 16 16 networking.firewall.allowedTCPPorts = [ 8080 ]; 17 17 }; 18 18 19 - client1 = { config, pkgs, ...}: { 19 + client1 = { ... }: { 20 20 virtualisation.docker.enable = true; 21 21 virtualisation.docker.extraOptions = "--insecure-registry registry:8080"; 22 22 }; 23 23 24 - client2 = { config, pkgs, ...}: { 24 + client2 = { ... }: { 25 25 virtualisation.docker.enable = true; 26 26 virtualisation.docker.extraOptions = "--insecure-registry registry:8080"; 27 27 };
+1 -1
nixos/tests/docker-tools-overlay.nix
··· 9 9 10 10 nodes = { 11 11 docker = 12 - { config, pkgs, ... }: 12 + { ... }: 13 13 { 14 14 virtualisation.docker.enable = true; 15 15 virtualisation.docker.storageDriver = "overlay"; # defaults to overlay2
+1 -1
nixos/tests/docker-tools.nix
··· 8 8 9 9 nodes = { 10 10 docker = 11 - { config, pkgs, ... }: { 11 + { ... }: { 12 12 virtualisation = { 13 13 diskSize = 2048; 14 14 docker.enable = true;
+1 -1
nixos/tests/docker.nix
··· 8 8 9 9 nodes = { 10 10 docker = 11 - { config, pkgs, ... }: 11 + { pkgs, ... }: 12 12 { 13 13 virtualisation.docker.enable = true; 14 14 virtualisation.docker.package = pkgs.docker;
+2 -2
nixos/tests/ecryptfs.nix
··· 1 - import ./make-test.nix ({ pkgs, ... }: 1 + import ./make-test.nix ({ ... }: 2 2 { 3 3 name = "ecryptfs"; 4 4 5 - machine = { config, pkgs, ... }: { 5 + machine = { pkgs, ... }: { 6 6 imports = [ ./common/user-account.nix ]; 7 7 boot.kernelModules = [ "ecryptfs" ]; 8 8 security.pam.enableEcryptfs = true;
+1 -1
nixos/tests/elk.nix
··· 11 11 }; 12 12 nodes = { 13 13 one = 14 - { config, pkgs, ... }: { 14 + { pkgs, ... }: { 15 15 # Not giving the machine at least 2060MB results in elasticsearch failing with the following error: 16 16 # 17 17 # OpenJDK 64-Bit Server VM warning:
+1 -1
nixos/tests/emacs-daemon.nix
··· 7 7 enableOCR = true; 8 8 9 9 machine = 10 - { config, pkgs, ... }: 10 + { ... }: 11 11 12 12 { imports = [ ./common/x11.nix ]; 13 13 services.emacs = {
+1 -1
nixos/tests/env.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { config, lib, pkgs, ... }: 7 + machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages; 10 10 environment.etc."plainFile".text = ''
+3 -3
nixos/tests/etcd-cluster.nix
··· 102 102 }; 103 103 104 104 nodes = { 105 - node1 = { config, pkgs, nodes, ... }: { 105 + node1 = { ... }: { 106 106 require = [nodeConfig]; 107 107 services.etcd = { 108 108 initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"]; ··· 110 110 }; 111 111 }; 112 112 113 - node2 = { config, pkgs, ... }: { 113 + node2 = { ... }: { 114 114 require = [nodeConfig]; 115 115 services.etcd = { 116 116 initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"]; ··· 118 118 }; 119 119 }; 120 120 121 - node3 = { config, pkgs, ... }: { 121 + node3 = { ... }: { 122 122 require = [nodeConfig]; 123 123 services.etcd = { 124 124 initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380" "node3=https://node3:2380"];
+1 -1
nixos/tests/etcd.nix
··· 8 8 }; 9 9 10 10 nodes = { 11 - node = { config, pkgs, nodes, ... }: { 11 + node = { ... }: { 12 12 services.etcd.enable = true; 13 13 }; 14 14 };
+2 -2
nixos/tests/ferm.nix
··· 7 7 8 8 nodes = 9 9 { client = 10 - { config, pkgs, ... }: 10 + { pkgs, ... }: 11 11 with pkgs.lib; 12 12 { 13 13 networking = { ··· 16 16 }; 17 17 }; 18 18 server = 19 - { config, pkgs, ... }: 19 + { pkgs, ... }: 20 20 with pkgs.lib; 21 21 { 22 22 networking = {
+1 -1
nixos/tests/firefox.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, pkgs, ... }: 8 + { pkgs, ... }: 9 9 10 10 { imports = [ ./common/x11.nix ]; 11 11 environment.systemPackages = [ pkgs.firefox pkgs.xdotool ];
+3 -3
nixos/tests/firewall.nix
··· 8 8 9 9 nodes = 10 10 { walled = 11 - { config, pkgs, nodes, ... }: 11 + { ... }: 12 12 { networking.firewall.enable = true; 13 13 networking.firewall.logRefusedPackets = true; 14 14 services.httpd.enable = true; ··· 20 20 # original walled configuration so that there is a change in the service 21 21 # file. 22 22 walled2 = 23 - { config, pkgs, nodes, ... }: 23 + { ... }: 24 24 { networking.firewall.enable = true; 25 25 networking.firewall.rejectPackets = true; 26 26 }; 27 27 28 28 attacker = 29 - { config, pkgs, ... }: 29 + { ... }: 30 30 { services.httpd.enable = true; 31 31 services.httpd.adminAddr = "foo@example.org"; 32 32 networking.firewall.enable = false;
+3 -3
nixos/tests/flannel.nix
··· 17 17 networking.firewall.allowedUDPPorts = [ 8472 ]; 18 18 }; 19 19 in { 20 - etcd = { config, pkgs, ... }: { 20 + etcd = { ... }: { 21 21 services = { 22 22 etcd = { 23 23 enable = true; ··· 31 31 networking.firewall.allowedTCPPorts = [ 2379 ]; 32 32 }; 33 33 34 - node1 = { config, ... }: { 34 + node1 = { ... }: { 35 35 require = [flannelConfig]; 36 36 }; 37 37 38 - node2 = { config, ... }: { 38 + node2 = { ... }: { 39 39 require = [flannelConfig]; 40 40 }; 41 41 };
+1 -1
nixos/tests/flatpak.nix
··· 7 7 maintainers = pkgs.flatpak.meta.maintainers; 8 8 }; 9 9 10 - machine = { config, pkgs, ... }: { 10 + machine = { pkgs, ... }: { 11 11 imports = [ ./common/x11.nix ]; 12 12 services.xserver.desktopManager.gnome3.enable = true; # TODO: figure out minimal environment where the tests work 13 13 environment.gnome3.excludePackages = pkgs.gnome3.optionalPackages;
+1 -1
nixos/tests/fwupd.nix
··· 6 6 maintainers = pkgs.fwupd.meta.maintainers; 7 7 }; 8 8 9 - machine = { config, pkgs, ... }: { 9 + machine = { pkgs, ... }: { 10 10 services.fwupd.enable = true; 11 11 environment.systemPackages = with pkgs; [ gnome-desktop-testing ]; 12 12 environment.variables.XDG_DATA_DIRS = [ "${pkgs.fwupd.installedTests}/share" ];
+1 -1
nixos/tests/gitlab.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - gitlab = { config, pkgs, ... }: { 10 + gitlab = { ... }: { 11 11 virtualisation.memorySize = 768; 12 12 13 13 services.nginx = {
+2 -2
nixos/tests/gitolite.nix
··· 58 58 nodes = { 59 59 60 60 server = 61 - { config, pkgs, lib, ... }: 61 + { ... }: 62 62 { 63 63 services.gitolite = { 64 64 enable = true; ··· 68 68 }; 69 69 70 70 client = 71 - { config, pkgs, lib, ... }: 71 + { pkgs, ... }: 72 72 { 73 73 environment.systemPackages = [ pkgs.git ]; 74 74 programs.ssh.extraConfig = ''
+1 -1
nixos/tests/gnome3-gdm.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, pkgs, ... }: 8 + { ... }: 9 9 10 10 { imports = [ ./common/user-account.nix ]; 11 11
+1 -1
nixos/tests/gnome3.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, pkgs, ... }: 8 + { ... }: 9 9 10 10 { imports = [ ./common/user-account.nix ]; 11 11
+1 -1
nixos/tests/gocd-agent.nix
··· 17 17 18 18 nodes = { 19 19 gocd_agent = 20 - { config, pkgs, ... }: 20 + { ... }: 21 21 { 22 22 virtualisation.memorySize = 2046; 23 23 services.gocd-agent = {
+1 -1
nixos/tests/gocd-server.nix
··· 12 12 13 13 nodes = { 14 14 gocd_server = 15 - { config, pkgs, ... }: 15 + { ... }: 16 16 { 17 17 virtualisation.memorySize = 2046; 18 18 services.gocd-server.enable = true;
+1 -1
nixos/tests/grafana.nix
··· 6 6 maintainers = [ willibutz ]; 7 7 }; 8 8 9 - machine = { config, pkgs, ... }: { 9 + machine = { ... }: { 10 10 services.grafana = { 11 11 enable = true; 12 12 addr = "localhost";
+2 -2
nixos/tests/graphite.nix
··· 1 - import ./make-test.nix ({ pkgs, ...} : 1 + import ./make-test.nix ({ ... } : 2 2 { 3 3 name = "graphite"; 4 4 nodes = { 5 5 one = 6 - { config, pkgs, ... }: { 6 + { ... }: { 7 7 virtualisation.memorySize = 1024; 8 8 time.timeZone = "UTC"; 9 9 services.graphite = {
+3 -3
nixos/tests/hadoop/hdfs.nix
··· 1 - import ../make-test.nix ({pkgs, ...}: { 1 + import ../make-test.nix ({...}: { 2 2 nodes = { 3 - namenode = {pkgs, config, ...}: { 3 + namenode = {pkgs, ...}: { 4 4 services.hadoop = { 5 5 package = pkgs.hadoop_3_1; 6 6 hdfs.namenode.enabled = true; ··· 18 18 8020 # namenode.rpc-address 19 19 ]; 20 20 }; 21 - datanode = {pkgs, config, ...}: { 21 + datanode = {pkgs, ...}: { 22 22 services.hadoop = { 23 23 package = pkgs.hadoop_3_1; 24 24 hdfs.datanode.enabled = true;
+3 -3
nixos/tests/hadoop/yarn.nix
··· 1 - import ../make-test.nix ({pkgs, ...}: { 1 + import ../make-test.nix ({...}: { 2 2 nodes = { 3 - resourcemanager = {pkgs, config, ...}: { 3 + resourcemanager = {pkgs, ...}: { 4 4 services.hadoop.package = pkgs.hadoop_3_1; 5 5 services.hadoop.yarn.resourcemanager.enabled = true; 6 6 services.hadoop.yarnSite = { ··· 11 11 8031 # resourcemanager.resource-tracker.address 12 12 ]; 13 13 }; 14 - nodemanager = {pkgs, config, ...}: { 14 + nodemanager = {pkgs, ...}: { 15 15 services.hadoop.package = pkgs.hadoop_3_1; 16 16 services.hadoop.yarn.nodemanager.enabled = true; 17 17 services.hadoop.yarnSite = {
+1 -1
nixos/tests/haka.nix
··· 8 8 9 9 nodes = { 10 10 haka = 11 - { config, pkgs, ... }: 11 + { ... }: 12 12 { 13 13 services.haka.enable = true; 14 14 };
+1 -1
nixos/tests/haproxy.nix
··· 1 1 import ./make-test.nix ({ pkgs, ...}: { 2 2 name = "haproxy"; 3 3 nodes = { 4 - machine = { config, ...}: { 4 + machine = { ... }: { 5 5 imports = [ ../modules/profiles/minimal.nix ]; 6 6 services.haproxy = { 7 7 enable = true;
+1 -1
nixos/tests/hardened.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, lib, pkgs, ... }: 8 + { lib, pkgs, ... }: 9 9 with lib; 10 10 { users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; }; 11 11 users.users.sybil = { isNormalUser = true; group = "wheel"; };
+1 -1
nixos/tests/hibernate.nix
··· 16 16 systemd.services.listener.serviceConfig.ExecStart = "${pkgs.netcat}/bin/nc -l 4444 -k"; 17 17 }; 18 18 19 - probe = { config, lib, pkgs, ...}: { 19 + probe = { pkgs, ...}: { 20 20 environment.systemPackages = [ pkgs.netcat ]; 21 21 }; 22 22 };
+1 -1
nixos/tests/hitch/default.nix
··· 4 4 meta = with pkgs.stdenv.lib.maintainers; { 5 5 maintainers = [ jflanglois ]; 6 6 }; 7 - machine = { config, pkgs, ... }: { 7 + machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.curl ]; 9 9 services.hitch = { 10 10 enable = true;
+1 -1
nixos/tests/hocker-fetchdocker/machine.nix
··· 1 - { config, pkgs, ... }: 1 + { pkgs, ... }: 2 2 { nixpkgs.config.packageOverrides = pkgs': { 3 3 hello-world-container = pkgs'.callPackage ./hello-world-container.nix { }; 4 4 };
+1 -1
nixos/tests/home-assistant.nix
··· 12 12 13 13 nodes = { 14 14 hass = 15 - { config, pkgs, ... }: 15 + { pkgs, ... }: 16 16 { 17 17 environment.systemPackages = with pkgs; [ 18 18 mosquitto
+1 -1
nixos/tests/hound.nix
··· 4 4 meta = with pkgs.stdenv.lib.maintainers; { 5 5 maintainers = [ grahamc ]; 6 6 }; 7 - machine = { config, pkgs, ... }: { 7 + machine = { pkgs, ... }: { 8 8 services.hound = { 9 9 enable = true; 10 10 config = ''
+1 -1
nixos/tests/hydra/default.nix
··· 31 31 }; 32 32 33 33 machine = 34 - { config, pkgs, ... }: 34 + { pkgs, ... }: 35 35 36 36 { 37 37 virtualisation.memorySize = 1024;
+2 -2
nixos/tests/i3wm.nix
··· 4 4 maintainers = [ aszlig ]; 5 5 }; 6 6 7 - machine = { lib, pkgs, ... }: { 7 + machine = { lib, ... }: { 8 8 imports = [ ./common/x11.nix ./common/user-account.nix ]; 9 9 services.xserver.displayManager.auto.user = "alice"; 10 10 services.xserver.windowManager.default = lib.mkForce "i3"; 11 11 services.xserver.windowManager.i3.enable = true; 12 12 }; 13 13 14 - testScript = { nodes, ... }: '' 14 + testScript = { ... }: '' 15 15 $machine->waitForX; 16 16 $machine->waitForFile("/home/alice/.Xauthority"); 17 17 $machine->succeed("xauth merge ~alice/.Xauthority");
+1 -1
nixos/tests/influxdb.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - one = { config, pkgs, ... }: { 10 + one = { ... }: { 11 11 services.influxdb.enable = true; 12 12 }; 13 13 };
+3 -3
nixos/tests/initrd-network-ssh/default.nix
··· 1 - import ../make-test.nix ({ pkgs, lib, ... }: 1 + import ../make-test.nix ({ lib, ... }: 2 2 3 3 { 4 4 name = "initrd-network-ssh"; ··· 8 8 9 9 nodes = with lib; rec { 10 10 server = 11 - { config, pkgs, ... }: 11 + { config, ... }: 12 12 { 13 13 boot.kernelParams = [ 14 14 "ip=${config.networking.primaryIPAddress}:::255.255.255.0::eth1:none" ··· 33 33 }; 34 34 35 35 client = 36 - { config, pkgs, ... }: 36 + { config, ... }: 37 37 { 38 38 environment.etc.knownHosts = { 39 39 text = concatStrings [
+1 -1
nixos/tests/initrd-network.nix
··· 3 3 4 4 meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ]; 5 5 6 - machine = { config, pkgs, ... }: { 6 + machine = { ... }: { 7 7 imports = [ ../modules/profiles/minimal.nix ]; 8 8 boot.initrd.network.enable = true; 9 9 boot.initrd.network.postCommands =
+1 -1
nixos/tests/installer.nix
··· 203 203 204 204 # The configuration of the machine used to run "nixos-install". 205 205 machine = 206 - { config, lib, pkgs, ... }: 206 + { pkgs, ... }: 207 207 208 208 { imports = 209 209 [ ../modules/profiles/installation-device.nix
+2 -2
nixos/tests/ipfs.nix
··· 7 7 8 8 nodes = { 9 9 adder = 10 - { config, pkgs, ... }: 10 + { ... }: 11 11 { 12 12 services.ipfs = { 13 13 enable = true; ··· 18 18 networking.firewall.allowedTCPPorts = [ 4001 ]; 19 19 }; 20 20 getter = 21 - { config, pkgs, ... }: 21 + { ... }: 22 22 { 23 23 services.ipfs = { 24 24 enable = true;
+3 -3
nixos/tests/ipv6.nix
··· 8 8 }; 9 9 10 10 nodes = 11 - { client = { config, pkgs, ... }: { }; 11 + { client = { ... }: { }; 12 12 13 13 server = 14 - { config, pkgs, ... }: 14 + { ... }: 15 15 { services.httpd.enable = true; 16 16 services.httpd.adminAddr = "foo@example.org"; 17 17 networking.firewall.allowedTCPPorts = [ 80 ]; 18 18 }; 19 19 20 20 router = 21 - { config, pkgs, ... }: 21 + { ... }: 22 22 { services.radvd.enable = true; 23 23 services.radvd.config = 24 24 ''
+2 -2
nixos/tests/jenkins.nix
··· 12 12 nodes = { 13 13 14 14 master = 15 - { config, pkgs, ... }: 15 + { ... }: 16 16 { services.jenkins.enable = true; 17 17 18 18 # should have no effect ··· 24 24 }; 25 25 26 26 slave = 27 - { config, pkgs, ... }: 27 + { ... }: 28 28 { services.jenkinsSlave.enable = true; 29 29 30 30 users.users.jenkins.extraGroups = [ "users" ];
+2 -2
nixos/tests/kafka.nix
··· 10 10 }; 11 11 12 12 nodes = { 13 - zookeeper1 = { config, ... }: { 13 + zookeeper1 = { ... }: { 14 14 services.zookeeper = { 15 15 enable = true; 16 16 }; ··· 18 18 networking.firewall.allowedTCPPorts = [ 2181 ]; 19 19 virtualisation.memorySize = 1024; 20 20 }; 21 - kafka = { config, ... }: { 21 + kafka = { ... }: { 22 22 services.apache-kafka = { 23 23 enable = true; 24 24 extraProperties = ''
+1 -1
nixos/tests/kernel-copperhead.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { config, lib, pkgs, ... }: 7 + machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages_copperhead_lts; 10 10 };
+1 -1
nixos/tests/kernel-latest.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { config, lib, pkgs, ... }: 7 + machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages_latest; 10 10 };
+1 -1
nixos/tests/kernel-lts.nix
··· 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6 7 - machine = { config, lib, pkgs, ... }: 7 + machine = { pkgs, ... }: 8 8 { 9 9 boot.kernelPackages = pkgs.linuxPackages; 10 10 };
+1 -1
nixos/tests/kexec.nix
··· 6 6 maintainers = [ eelco chaoflow ]; 7 7 }; 8 8 9 - machine = { config, pkgs, ... }: 9 + machine = { ... }: 10 10 { virtualisation.vlans = [ ]; }; 11 11 12 12 testScript =
+1 -1
nixos/tests/krb5/deprecated-config.nix
··· 8 8 }; 9 9 10 10 machine = 11 - { config, pkgs, ... }: { 11 + { ... }: { 12 12 krb5 = { 13 13 enable = true; 14 14 defaultRealm = "ATHENA.MIT.EDU";
+1 -1
nixos/tests/krb5/example-config.nix
··· 8 8 }; 9 9 10 10 machine = 11 - { config, pkgs, ... }: { 11 + { pkgs, ... }: { 12 12 krb5 = { 13 13 enable = true; 14 14 kerberos = pkgs.krb5Full;
+2 -2
nixos/tests/kubernetes/certs.nix
··· 1 1 { 2 2 pkgs ? import <nixpkgs> {}, 3 - internalDomain ? "cloud.yourdomain.net", 4 3 externalDomain ? "myawesomecluster.cluster.yourdomain.net", 5 4 serviceClusterIp ? "10.0.0.1", 6 - kubelets 5 + kubelets, 6 + ... 7 7 }: 8 8 let 9 9 runWithCFSSL = name: cmd:
+1 -1
nixos/tests/kubernetes/dns.nix
··· 60 60 config.Entrypoint = "/bin/tail"; 61 61 }; 62 62 63 - extraConfiguration = { config, pkgs, lib, nodes, ... }: { 63 + extraConfiguration = { config, pkgs, ... }: { 64 64 environment.systemPackages = [ pkgs.bind.host ]; 65 65 # virtualisation.docker.extraOptions = "--dns=${config.services.kubernetes.addons.dns.clusterIp}"; 66 66 services.dnsmasq.enable = true;
+2 -2
nixos/tests/ldap.nix
··· 37 37 memberUid: ${ldapUser} 38 38 ''; 39 39 mkClient = useDaemon: 40 - { config, pkgs, lib, ... }: 40 + { lib, ... }: 41 41 { 42 42 virtualisation.memorySize = 256; 43 43 virtualisation.vlans = [ 1 ]; ··· 61 61 nodes = { 62 62 63 63 server = 64 - { config, pkgs, lib, ... }: 64 + { pkgs, ... }: 65 65 { 66 66 virtualisation.memorySize = 256; 67 67 virtualisation.vlans = [ 1 ];
+1 -1
nixos/tests/lightdm.nix
··· 4 4 maintainers = [ aszlig ]; 5 5 }; 6 6 7 - machine = { lib, ... }: { 7 + machine = { ... }: { 8 8 imports = [ ./common/user-account.nix ]; 9 9 services.xserver.enable = true; 10 10 services.xserver.displayManager.lightdm.enable = true;
+1 -1
nixos/tests/login.nix
··· 7 7 }; 8 8 9 9 machine = 10 - { config, pkgs, lib, ... }: 10 + { pkgs, lib, ... }: 11 11 { boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest; 12 12 }; 13 13
+1 -1
nixos/tests/mathics.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - machine = { config, pkgs, ... }: { 8 + machine = { ... }: { 9 9 services.mathics.enable = true; 10 10 services.mathics.port = 8888; 11 11 };
+1 -1
nixos/tests/memcached.nix
··· 3 3 4 4 nodes = { 5 5 machine = 6 - { config, pkgs, ... }: 6 + { ... }: 7 7 { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 services.memcached.enable = true;
+2 -2
nixos/tests/mesos.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - master = { config, pkgs, ... }: { 8 + master = { ... }: { 9 9 networking.firewall.enable = false; 10 10 services.zookeeper.enable = true; 11 11 services.mesos.master = { ··· 14 14 }; 15 15 }; 16 16 17 - slave = { config, pkgs, ... }: { 17 + slave = { ... }: { 18 18 networking.firewall.enable = false; 19 19 networking.nat.enable = true; 20 20 virtualisation.docker.enable = true;
+1 -1
nixos/tests/minio.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - machine = { config, pkgs, ... }: { 8 + machine = { pkgs, ... }: { 9 9 services.minio = { 10 10 enable = true; 11 11 accessKey = "BKIKJAA5BMMU2RHO6IBB";
+1 -1
nixos/tests/misc.nix
··· 9 9 foo = pkgs.writeText "foo" "Hello World"; 10 10 11 11 machine = 12 - { config, lib, pkgs, ... }: 12 + { lib, ... }: 13 13 with lib; 14 14 { swapDevices = mkOverride 0 15 15 [ { device = "/root/swapfile"; size = 128; } ];
+1 -1
nixos/tests/mongodb.nix
··· 13 13 14 14 nodes = { 15 15 one = 16 - { config, pkgs, ... }: 16 + { ... }: 17 17 { 18 18 services = { 19 19 mongodb.enable = true;
+2 -2
nixos/tests/morty.nix
··· 9 9 nodes = 10 10 { mortyProxyWithKey = 11 11 12 - { config, pkgs, ... }: 12 + { ... }: 13 13 { services.morty = { 14 14 enable = true; 15 15 key = "78a9cd0cfee20c672f78427efb2a2a96036027f0"; ··· 20 20 }; 21 21 22 22 testScript = 23 - { nodes , ... }: 23 + { ... }: 24 24 '' 25 25 $mortyProxyWithKey->waitForUnit("default.target"); 26 26
+3 -3
nixos/tests/mpd.nix
··· 47 47 48 48 nodes = 49 49 { client = 50 - { config, pkgs, ... }: { }; 50 + { ... }: { }; 51 51 52 52 serverALSA = 53 - { config, pkgs, ... }: (mkServer { 53 + { ... }: (mkServer { 54 54 mpd = defaultMpdCfg // { 55 55 network.listenAddress = "any"; 56 56 extraConfig = '' ··· 66 66 }) // { networking.firewall.allowedTCPPorts = [ 6600 ]; }; 67 67 68 68 serverPulseAudio = 69 - { config, pkgs, ... }: (mkServer { 69 + { ... }: (mkServer { 70 70 mpd = defaultMpdCfg // { 71 71 extraConfig = '' 72 72 audio_output {
+2 -2
nixos/tests/mumble.nix
··· 1 1 import ./make-test.nix ({ pkgs, ...} : 2 2 3 3 let 4 - client = { config, pkgs, ... }: { 4 + client = { pkgs, ... }: { 5 5 imports = [ ./common/x11.nix ]; 6 6 environment.systemPackages = [ pkgs.mumble ]; 7 7 }; ··· 13 13 }; 14 14 15 15 nodes = { 16 - server = { config, pkgs, ... }: { 16 + server = { config, ... }: { 17 17 services.murmur.enable = true; 18 18 services.murmur.registerName = "NixOS tests"; 19 19 networking.firewall.allowedTCPPorts = [ config.services.murmur.port ];
+1 -1
nixos/tests/munin.nix
··· 9 9 10 10 nodes = { 11 11 one = 12 - { config, pkgs, ... }: 12 + { config, ... }: 13 13 { 14 14 services = { 15 15 munin-node.enable = true;
+2 -2
nixos/tests/mutable-users.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - machine = { config, lib, pkgs, ... }: { 10 + machine = { ... }: { 11 11 users.mutableUsers = false; 12 12 }; 13 - mutable = { config, lib, pkgs, ... }: { 13 + mutable = { ... }: { 14 14 users.mutableUsers = true; 15 15 }; 16 16 };
+1 -1
nixos/tests/mysql-backup.nix
··· 6 6 }; 7 7 8 8 nodes = { 9 - master = { config, pkgs, ... }: { 9 + master = { pkgs, ... }: { 10 10 services.mysql = { 11 11 enable = true; 12 12 initialDatabases = [ { name = "testdb"; schema = ./testdb.sql; } ];
+3 -3
nixos/tests/mysql-replication.nix
··· 13 13 14 14 nodes = { 15 15 master = 16 - { pkgs, config, ... }: 16 + { pkgs, ... }: 17 17 18 18 { 19 19 services.mysql.enable = true; ··· 27 27 }; 28 28 29 29 slave1 = 30 - { pkgs, config, nodes, ... }: 30 + { pkgs, nodes, ... }: 31 31 32 32 { 33 33 services.mysql.enable = true; ··· 40 40 }; 41 41 42 42 slave2 = 43 - { pkgs, config, nodes, ... }: 43 + { pkgs, nodes, ... }: 44 44 45 45 { 46 46 services.mysql.enable = true;
+1 -1
nixos/tests/mysql.nix
··· 6 6 7 7 nodes = { 8 8 master = 9 - { pkgs, config, ... }: 9 + { pkgs, ... }: 10 10 11 11 { 12 12 services.mysql.enable = true;
+4 -4
nixos/tests/nat.nix
··· 30 30 31 31 nodes = 32 32 { client = 33 - { config, pkgs, nodes, ... }: 33 + { pkgs, nodes, ... }: 34 34 lib.mkMerge [ 35 35 { virtualisation.vlans = [ 1 ]; 36 36 networking.firewall.allowPing = true; ··· 44 44 ]; 45 45 46 46 router = 47 - { config, pkgs, ... }: lib.mkMerge [ 47 + { ... }: lib.mkMerge [ 48 48 routerBase 49 49 { networking.nat.enable = true; } 50 50 ]; 51 51 52 52 routerDummyNoNat = 53 - { config, pkgs, ... }: lib.mkMerge [ 53 + { ... }: lib.mkMerge [ 54 54 routerBase 55 55 { networking.nat.enable = false; } 56 56 ]; 57 57 58 58 server = 59 - { config, pkgs, ... }: 59 + { ... }: 60 60 { virtualisation.vlans = [ 2 ]; 61 61 networking.firewall.enable = false; 62 62 services.httpd.enable = true;
+1 -1
nixos/tests/netdata.nix
··· 8 8 9 9 nodes = { 10 10 netdata = 11 - { config, pkgs, ... }: 11 + { pkgs, ... }: 12 12 { 13 13 environment.systemPackages = with pkgs; [ curl jq ]; 14 14 services.netdata.enable = true;
+4 -4
nixos/tests/networking-proxy.nix
··· 19 19 nodes = { 20 20 # no proxy 21 21 machine = 22 - { config, pkgs, ... }: 22 + { ... }: 23 23 24 24 default-config; 25 25 26 26 # proxy default 27 27 machine2 = 28 - { config, pkgs, ... }: 28 + { ... }: 29 29 30 30 default-config // { 31 31 networking.proxy.default = "http://user:pass@host:port"; ··· 33 33 34 34 # specific proxy options 35 35 machine3 = 36 - { config, pkgs, ... }: 36 + { ... }: 37 37 38 38 default-config // 39 39 { ··· 51 51 52 52 # mix default + proxy options 53 53 machine4 = 54 - { config, pkgs, ... }: 54 + { ... }: 55 55 56 56 default-config // { 57 57 networking.proxy = {
+20 -20
nixos/tests/networking.nix
··· 81 81 static = { 82 82 name = "Static"; 83 83 nodes.router = router; 84 - nodes.client = { config, pkgs, ... }: with pkgs.lib; { 84 + nodes.client = { pkgs, ... }: with pkgs.lib; { 85 85 virtualisation.vlans = [ 1 2 ]; 86 86 networking = { 87 87 useNetworkd = networkd; ··· 98 98 ]; 99 99 }; 100 100 }; 101 - testScript = { nodes, ... }: 101 + testScript = { ... }: 102 102 '' 103 103 startAll; 104 104 ··· 134 134 dhcpSimple = { 135 135 name = "SimpleDHCP"; 136 136 nodes.router = router; 137 - nodes.client = { config, pkgs, ... }: with pkgs.lib; { 137 + nodes.client = { pkgs, ... }: with pkgs.lib; { 138 138 virtualisation.vlans = [ 1 2 ]; 139 139 networking = { 140 140 useNetworkd = networkd; ··· 150 150 }; 151 151 }; 152 152 }; 153 - testScript = { nodes, ... }: 153 + testScript = { ... }: 154 154 '' 155 155 startAll; 156 156 ··· 189 189 dhcpOneIf = { 190 190 name = "OneInterfaceDHCP"; 191 191 nodes.router = router; 192 - nodes.client = { config, pkgs, ... }: with pkgs.lib; { 192 + nodes.client = { pkgs, ... }: with pkgs.lib; { 193 193 virtualisation.vlans = [ 1 2 ]; 194 194 networking = { 195 195 useNetworkd = networkd; ··· 202 202 interfaces.eth2.ipv4.addresses = mkOverride 0 [ ]; 203 203 }; 204 204 }; 205 - testScript = { nodes, ... }: 205 + testScript = { ... }: 206 206 '' 207 207 startAll; 208 208 ··· 229 229 ''; 230 230 }; 231 231 bond = let 232 - node = address: { config, pkgs, ... }: with pkgs.lib; { 232 + node = address: { pkgs, ... }: with pkgs.lib; { 233 233 virtualisation.vlans = [ 1 2 ]; 234 234 networking = { 235 235 useNetworkd = networkd; ··· 249 249 name = "Bond"; 250 250 nodes.client1 = node "192.168.1.1"; 251 251 nodes.client2 = node "192.168.1.2"; 252 - testScript = { nodes, ... }: 252 + testScript = { ... }: 253 253 '' 254 254 startAll; 255 255 ··· 266 266 ''; 267 267 }; 268 268 bridge = let 269 - node = { address, vlan }: { config, pkgs, ... }: with pkgs.lib; { 269 + node = { address, vlan }: { pkgs, ... }: with pkgs.lib; { 270 270 virtualisation.vlans = [ vlan ]; 271 271 networking = { 272 272 useNetworkd = networkd; ··· 280 280 name = "Bridge"; 281 281 nodes.client1 = node { address = "192.168.1.2"; vlan = 1; }; 282 282 nodes.client2 = node { address = "192.168.1.3"; vlan = 2; }; 283 - nodes.router = { config, pkgs, ... }: with pkgs.lib; { 283 + nodes.router = { pkgs, ... }: with pkgs.lib; { 284 284 virtualisation.vlans = [ 1 2 ]; 285 285 networking = { 286 286 useNetworkd = networkd; ··· 293 293 [ { address = "192.168.1.1"; prefixLength = 24; } ]; 294 294 }; 295 295 }; 296 - testScript = { nodes, ... }: 296 + testScript = { ... }: 297 297 '' 298 298 startAll; 299 299 ··· 319 319 macvlan = { 320 320 name = "MACVLAN"; 321 321 nodes.router = router; 322 - nodes.client = { config, pkgs, ... }: with pkgs.lib; { 322 + nodes.client = { pkgs, ... }: with pkgs.lib; { 323 323 virtualisation.vlans = [ 1 ]; 324 324 networking = { 325 325 useNetworkd = networkd; ··· 329 329 interfaces.eth1.ipv4.addresses = mkOverride 0 [ ]; 330 330 }; 331 331 }; 332 - testScript = { nodes, ... }: 332 + testScript = { ... }: 333 333 '' 334 334 startAll; 335 335 ··· 356 356 ''; 357 357 }; 358 358 sit = let 359 - node = { address4, remote, address6 }: { config, pkgs, ... }: with pkgs.lib; { 359 + node = { address4, remote, address6 }: { pkgs, ... }: with pkgs.lib; { 360 360 virtualisation.vlans = [ 1 ]; 361 361 networking = { 362 362 useNetworkd = networkd; ··· 377 377 name = "Sit"; 378 378 nodes.client1 = node { address4 = "192.168.1.1"; remote = "192.168.1.2"; address6 = "fc00::1"; }; 379 379 nodes.client2 = node { address4 = "192.168.1.2"; remote = "192.168.1.1"; address6 = "fc00::2"; }; 380 - testScript = { nodes, ... }: 380 + testScript = { ... }: 381 381 '' 382 382 startAll; 383 383 ··· 398 398 ''; 399 399 }; 400 400 vlan = let 401 - node = address: { config, pkgs, ... }: with pkgs.lib; { 401 + node = address: { pkgs, ... }: with pkgs.lib; { 402 402 #virtualisation.vlans = [ 1 ]; 403 403 networking = { 404 404 useNetworkd = networkd; ··· 418 418 name = "vlan"; 419 419 nodes.client1 = node "192.168.1.1"; 420 420 nodes.client2 = node "192.168.1.2"; 421 - testScript = { nodes, ... }: 421 + testScript = { ... }: 422 422 '' 423 423 startAll; 424 424 ··· 476 476 }; 477 477 privacy = { 478 478 name = "Privacy"; 479 - nodes.router = { config, pkgs, ... }: { 479 + nodes.router = { ... }: { 480 480 virtualisation.vlans = [ 1 ]; 481 481 boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true; 482 482 networking = { ··· 502 502 ''; 503 503 }; 504 504 }; 505 - nodes.client = { config, pkgs, ... }: with pkgs.lib; { 505 + nodes.client = { pkgs, ... }: with pkgs.lib; { 506 506 virtualisation.vlans = [ 1 ]; 507 507 networking = { 508 508 useNetworkd = networkd; ··· 514 514 }; 515 515 }; 516 516 }; 517 - testScript = { nodes, ... }: 517 + testScript = { ... }: 518 518 '' 519 519 startAll; 520 520
+1 -1
nixos/tests/nexus.nix
··· 12 12 nodes = { 13 13 14 14 server = 15 - { config, pkgs, ... }: 15 + { ... }: 16 16 { virtualisation.memorySize = 2047; # qemu-system-i386 has a 2047M limit 17 17 virtualisation.diskSize = 2048; 18 18
+2 -2
nixos/tests/nfs.nix
··· 3 3 let 4 4 5 5 client = 6 - { config, pkgs, ... }: 6 + { pkgs, ... }: 7 7 { fileSystems = pkgs.lib.mkVMOverride 8 8 [ { mountPoint = "/data"; 9 9 device = "server:/data"; ··· 27 27 client2 = client; 28 28 29 29 server = 30 - { config, pkgs, ... }: 30 + { ... }: 31 31 { services.nfs.server.enable = true; 32 32 services.nfs.server.exports = 33 33 ''
+1 -1
nixos/tests/nginx.nix
··· 10 10 11 11 nodes = { 12 12 webserver = 13 - { config, pkgs, ... }: 13 + { ... }: 14 14 { services.nginx.enable = true; 15 15 services.nginx.commonHttpConfig = '' 16 16 log_format ceeformat '@cee: {"status":"$status",'
+1 -1
nixos/tests/novacomd.nix
··· 4 4 maintainers = [ dtzWill ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + machine = { ... }: { 8 8 services.novacomd.enable = true; 9 9 }; 10 10
+3 -3
nixos/tests/openssh.nix
··· 11 11 nodes = { 12 12 13 13 server = 14 - { config, pkgs, ... }: 14 + { ... }: 15 15 16 16 { 17 17 services.openssh.enable = true; ··· 23 23 }; 24 24 25 25 server_lazy = 26 - { config, pkgs, ... }: 26 + { ... }: 27 27 28 28 { 29 29 services.openssh = { enable = true; startWhenNeeded = true; }; ··· 35 35 }; 36 36 37 37 client = 38 - { config, pkgs, ... }: { }; 38 + { ... }: { }; 39 39 40 40 }; 41 41
+2 -2
nixos/tests/owncloud.nix
··· 1 - import ./make-test.nix ({ pkgs, ... }: 1 + import ./make-test.nix ({ ... }: 2 2 3 3 { 4 4 name = "owncloud"; 5 5 nodes = 6 6 { web = 7 - { config, pkgs, ... }: 7 + { ... }: 8 8 { 9 9 services.postgresql.enable = true; 10 10 services.httpd = {
+2 -2
nixos/tests/pam-oath-login.nix
··· 1 - import ./make-test.nix ({ pkgs, latestKernel ? false, ... }: 1 + import ./make-test.nix ({ ... }: 2 2 3 3 let 4 4 oathSnakeoilSecret = "cdd4083ef8ff1fa9178c6d46bfb1a3"; ··· 22 22 name = "pam-oath-login"; 23 23 24 24 machine = 25 - { config, pkgs, lib, ... }: 25 + { ... }: 26 26 { 27 27 security.pam.oath = { 28 28 enable = true;
+1 -1
nixos/tests/partition.nix
··· 65 65 in { 66 66 name = "partitiion"; 67 67 68 - machine = { config, pkgs, ... }: { 68 + machine = { pkgs, ... }: { 69 69 environment.systemPackages = [ 70 70 pkgs.pythonPackages.nixpart0 71 71 pkgs.file pkgs.btrfs-progs pkgs.xfsprogs pkgs.lvm2
+1 -1
nixos/tests/peerflix.nix
··· 8 8 9 9 nodes = { 10 10 peerflix = 11 - { config, pkgs, ... }: 11 + { ... }: 12 12 { 13 13 services.peerflix.enable = true; 14 14 };
+1 -1
nixos/tests/pgjwt.nix
··· 14 14 }; 15 15 16 16 nodes = { 17 - master = { pkgs, config, ... }: 17 + master = { ... }: 18 18 { 19 19 services.postgresql = { 20 20 enable = true;
+3 -3
nixos/tests/phabricator.nix
··· 6 6 7 7 nodes = { 8 8 storage = 9 - { config, pkgs, ... }: 9 + { ... }: 10 10 { services.nfs.server.enable = true; 11 11 services.nfs.server.exports = '' 12 12 /repos 192.168.1.0/255.255.255.0(rw,no_root_squash) ··· 15 15 }; 16 16 17 17 webserver = 18 - { config, pkgs, ... }: 18 + { pkgs, ... }: 19 19 { fileSystems = pkgs.lib.mkVMOverride 20 20 [ { mountPoint = "/repos"; 21 21 device = "storage:/repos"; ··· 52 52 }; 53 53 54 54 client = 55 - { config, pkgs, ... }: 55 + { ... }: 56 56 { imports = [ ./common/x11.nix ]; 57 57 services.xserver.desktopManager.plasma5.enable = true; 58 58 };
+3 -3
nixos/tests/php-pcre.nix
··· 1 1 2 2 let testString = "can-use-subgroups"; in 3 3 4 - import ./make-test.nix ({ pkgs, ...}: { 4 + import ./make-test.nix ({ ...}: { 5 5 name = "php-httpd-pcre-jit-test"; 6 - machine = { config, lib, pkgs, ... }: { 6 + machine = { lib, pkgs, ... }: { 7 7 time.timeZone = "UTC"; 8 8 services.httpd = { 9 9 enable = true; ··· 34 34 }; 35 35 }; 36 36 }; 37 - testScript = { nodes, ... }: 37 + testScript = { ... }: 38 38 '' 39 39 $machine->waitForUnit('httpd.service'); 40 40 # Ensure php evaluation by matching on the var_dump syntax
+1 -1
nixos/tests/plasma5.nix
··· 6 6 maintainers = [ ttuegel ]; 7 7 }; 8 8 9 - machine = { lib, ... }: 9 + machine = { ... }: 10 10 let 11 11 sddm_theme = pkgs.stdenv.mkDerivation { 12 12 name = "breeze-ocr-theme";
+1 -1
nixos/tests/plotinus.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, pkgs, ... }: 8 + { pkgs, ... }: 9 9 10 10 { imports = [ ./common/x11.nix ]; 11 11 programs.plotinus.enable = true;
+1 -1
nixos/tests/postgis.nix
··· 6 6 7 7 nodes = { 8 8 master = 9 - { pkgs, config, ... }: 9 + { pkgs, ... }: 10 10 11 11 { 12 12 services.postgresql = let mypg = pkgs.postgresql100; in {
+1 -1
nixos/tests/postgresql.nix
··· 22 22 maintainers = [ zagy ]; 23 23 }; 24 24 25 - machine = {pkgs, config, ...}: 25 + machine = {...}: 26 26 { 27 27 services.postgresql.package=postgresql-package; 28 28 services.postgresql.enable = true;
+1 -1
nixos/tests/powerdns.nix
··· 1 1 import ./make-test.nix ({ pkgs, ... }: { 2 2 name = "powerdns"; 3 3 4 - nodes.server = { config, pkgs, ... }: { 4 + nodes.server = { ... }: { 5 5 services.powerdns.enable = true; 6 6 }; 7 7
+1 -1
nixos/tests/predictable-interface-names.nix
··· 9 9 name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}"; 10 10 meta = {}; 11 11 12 - machine = { config, lib, ... }: { 12 + machine = { lib, ... }: { 13 13 networking.usePredictableInterfaceNames = lib.mkForce predictable; 14 14 networking.useNetworkd = withNetworkd; 15 15 networking.dhcpcd.enable = !withNetworkd;
+2 -2
nixos/tests/printing.nix
··· 9 9 nodes = { 10 10 11 11 server = 12 - { config, pkgs, ... }: 12 + { ... }: 13 13 { services.printing.enable = true; 14 14 services.printing.listenAddresses = [ "*:631" ]; 15 15 services.printing.defaultShared = true; ··· 24 24 }; 25 25 26 26 client = 27 - { config, pkgs, nodes, ... }: 27 + { ... }: 28 28 { services.printing.enable = true; 29 29 }; 30 30
+1 -1
nixos/tests/prometheus.nix
··· 2 2 name = "prometheus"; 3 3 4 4 nodes = { 5 - one = { config, pkgs, ... }: { 5 + one = { ... }: { 6 6 services.prometheus = { 7 7 enable = true; 8 8 scrapeConfigs = [{
+1 -1
nixos/tests/prosody.nix
··· 1 1 import ./make-test.nix { 2 2 name = "prosody"; 3 3 4 - machine = { config, pkgs, ... }: { 4 + machine = { pkgs, ... }: { 5 5 services.prosody = { 6 6 enable = true; 7 7 # TODO: use a self-signed certificate
+3 -3
nixos/tests/proxy.nix
··· 3 3 let 4 4 5 5 backend = 6 - { config, pkgs, ... }: 6 + { pkgs, ... }: 7 7 8 8 { services.httpd.enable = true; 9 9 services.httpd.adminAddr = "foo@example.org"; ··· 21 21 22 22 nodes = 23 23 { proxy = 24 - { config, pkgs, nodes, ... }: 24 + { nodes, ... }: 25 25 26 26 { services.httpd.enable = true; 27 27 services.httpd.adminAddr = "bar@example.org"; ··· 57 57 backend1 = backend; 58 58 backend2 = backend; 59 59 60 - client = { config, pkgs, ... }: { }; 60 + client = { ... }: { }; 61 61 }; 62 62 63 63 testScript =
+5 -5
nixos/tests/quagga.nix
··· 30 30 nodes = { 31 31 32 32 client = 33 - { config, pkgs, nodes, ... }: 33 + { nodes, ... }: 34 34 { 35 35 virtualisation.vlans = [ 1 ]; 36 36 networking.defaultGateway = ifAddr nodes.router1 "eth1"; 37 37 }; 38 38 39 39 router1 = 40 - { config, pkgs, nodes, ... }: 40 + { ... }: 41 41 { 42 42 virtualisation.vlans = [ 1 2 ]; 43 43 boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; ··· 49 49 }; 50 50 51 51 router2 = 52 - { config, pkgs, nodes, ... }: 52 + { ... }: 53 53 { 54 54 virtualisation.vlans = [ 3 2 ]; 55 55 boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; ··· 61 61 }; 62 62 63 63 server = 64 - { config, pkgs, nodes, ... }: 64 + { nodes, ... }: 65 65 { 66 66 virtualisation.vlans = [ 3 ]; 67 67 networking.defaultGateway = ifAddr nodes.router2 "eth1"; ··· 73 73 }; 74 74 75 75 testScript = 76 - { nodes, ... }: 76 + { ... }: 77 77 '' 78 78 startAll; 79 79
+2 -2
nixos/tests/quake3.nix
··· 29 29 #makeCoverageReport = true; 30 30 31 31 client = 32 - { config, pkgs, ... }: 32 + { pkgs, ... }: 33 33 34 34 { imports = [ ./common/x11.nix ]; 35 35 hardware.opengl.driSupport = true; ··· 40 40 41 41 nodes = 42 42 { server = 43 - { config, pkgs, ... }: 43 + { pkgs, ... }: 44 44 45 45 { systemd.services."quake3-server" = 46 46 { wantedBy = [ "multi-user.target" ];
+1 -1
nixos/tests/rabbitmq.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - one = { config, pkgs, ... }: { 10 + one = { ... }: { 11 11 services.rabbitmq.enable = true; 12 12 }; 13 13 };
+1 -1
nixos/tests/radicale.nix
··· 28 28 29 29 in 30 30 31 - import ./make-test.nix ({ pkgs, lib, ... }@args: { 31 + import ./make-test.nix ({ lib, ... }@args: { 32 32 name = "radicale"; 33 33 meta.maintainers = with lib.maintainers; [ aneeshusa infinisil ]; 34 34
+1 -1
nixos/tests/riak.nix
··· 3 3 4 4 nodes = { 5 5 master = 6 - { pkgs, config, ... }: 6 + { pkgs, ... }: 7 7 8 8 { 9 9 services.riak.enable = true;
+1 -1
nixos/tests/run-in-machine.nix
··· 5 5 let 6 6 output = runInMachine { 7 7 drv = pkgs.hello; 8 - machine = { config, pkgs, ... }: { /* services.sshd.enable = true; */ }; 8 + machine = { ... }: { /* services.sshd.enable = true; */ }; 9 9 }; 10 10 in pkgs.runCommand "verify-output" { inherit output; } '' 11 11 if [ ! -e "$output/bin/hello" ]; then
+2 -2
nixos/tests/rxe.nix
··· 1 - import ./make-test.nix ({ pkgs, ... } : 1 + import ./make-test.nix ({ ... } : 2 2 3 3 let 4 - node = { config, pkgs, lib, ... } : { 4 + node = { pkgs, ... } : { 5 5 networking = { 6 6 firewall = { 7 7 allowedUDPPorts = [ 4791 ]; # open RoCE port
+2 -2
nixos/tests/samba.nix
··· 7 7 8 8 nodes = 9 9 { client = 10 - { config, pkgs, ... }: 10 + { pkgs, ... }: 11 11 { fileSystems = pkgs.lib.mkVMOverride 12 12 { "/public" = { 13 13 fsType = "cifs"; ··· 18 18 }; 19 19 20 20 server = 21 - { config, pkgs, ... }: 21 + { ... }: 22 22 { services.samba.enable = true; 23 23 services.samba.shares.public = 24 24 { path = "/public";
+3 -3
nixos/tests/sddm.nix
··· 9 9 default = { 10 10 name = "sddm"; 11 11 12 - machine = { lib, ... }: { 12 + machine = { ... }: { 13 13 imports = [ ./common/user-account.nix ]; 14 14 services.xserver.enable = true; 15 15 services.xserver.displayManager.sddm.enable = true; ··· 39 39 maintainers = [ ttuegel ]; 40 40 }; 41 41 42 - machine = { lib, ... }: { 42 + machine = { ... }: { 43 43 imports = [ ./common/user-account.nix ]; 44 44 services.xserver.enable = true; 45 45 services.xserver.displayManager.sddm = { ··· 54 54 services.xserver.desktopManager.default = "none"; 55 55 }; 56 56 57 - testScript = { nodes, ... }: '' 57 + testScript = { ... }: '' 58 58 startAll; 59 59 $machine->waitForFile("/home/alice/.Xauthority"); 60 60 $machine->succeed("xauth merge ~alice/.Xauthority");
+1 -1
nixos/tests/simple.nix
··· 4 4 maintainers = [ eelco ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + machine = { ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 }; 10 10
+1 -1
nixos/tests/slim.nix
··· 5 5 maintainers = [ aszlig ]; 6 6 }; 7 7 8 - machine = { pkgs, lib, ... }: { 8 + machine = { pkgs, ... }: { 9 9 imports = [ ./common/user-account.nix ]; 10 10 services.xserver.enable = true; 11 11 services.xserver.windowManager.default = "icewm";
+4 -4
nixos/tests/slurm.nix
··· 1 - import ./make-test.nix ({ pkgs, ... }: 1 + import ./make-test.nix ({ ... }: 2 2 let mungekey = "mungeverryweakkeybuteasytointegratoinatest"; 3 3 slurmconfig = { 4 4 controlMachine = "control"; ··· 14 14 nodes = 15 15 let 16 16 computeNode = 17 - { config, pkgs, ...}: 17 + { ...}: 18 18 { 19 19 # TODO slrumd port and slurmctld port should be configurations and 20 20 # automatically allowed by the firewall. ··· 26 26 in { 27 27 28 28 control = 29 - { config, pkgs, ...}: 29 + { ...}: 30 30 { 31 31 networking.firewall.enable = false; 32 32 services.slurm = { ··· 35 35 }; 36 36 37 37 submit = 38 - { config, pkgs, ...}: 38 + { ...}: 39 39 { 40 40 networking.firewall.enable = false; 41 41 services.slurm = {
+1 -1
nixos/tests/smokeping.nix
··· 6 6 7 7 nodes = { 8 8 sm = 9 - { pkgs, config, ... }: 9 + { ... }: 10 10 { 11 11 services.smokeping = { 12 12 enable = true;
+3 -3
nixos/tests/strongswan-swanctl.nix
··· 34 34 meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ]; 35 35 nodes = { 36 36 37 - alice = { nodes, ... } : { 37 + alice = { ... } : { 38 38 virtualisation.vlans = [ 0 ]; 39 39 networking = { 40 40 dhcpcd.enable = false; ··· 42 42 }; 43 43 }; 44 44 45 - moon = {pkgs, config, nodes, ...} : 45 + moon = { config, ...} : 46 46 let strongswan = config.services.strongswan-swanctl.package; 47 47 in { 48 48 virtualisation.vlans = [ 0 1 ]; ··· 94 94 }; 95 95 }; 96 96 97 - carol = {pkgs, config, nodes, ...} : 97 + carol = { config, ...} : 98 98 let strongswan = config.services.strongswan-swanctl.package; 99 99 in { 100 100 virtualisation.vlans = [ 1 ];
+2 -2
nixos/tests/subversion.nix
··· 39 39 40 40 nodes = 41 41 { webserver = 42 - { config, pkgs, ... }: 42 + { ... }: 43 43 44 44 { 45 45 services.httpd.enable = true; ··· 55 55 }; 56 56 57 57 client = 58 - { config, pkgs, ... }: 58 + { pkgs, ... }: 59 59 60 60 { 61 61 environment.systemPackages = [ pkgs.subversion ];
+1 -1
nixos/tests/sudo.nix
··· 11 11 }; 12 12 13 13 machine = 14 - { config, lib, pkgs, ... }: 14 + { lib, ... }: 15 15 with lib; 16 16 { 17 17 users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; };
+2 -2
nixos/tests/switch-test.nix
··· 7 7 }; 8 8 9 9 nodes = { 10 - machine = { config, lib, pkgs, ... }: { 10 + machine = { ... }: { 11 11 users.mutableUsers = false; 12 12 }; 13 - other = { config, lib, pkgs, ... }: { 13 + other = { ... }: { 14 14 users.mutableUsers = true; 15 15 }; 16 16 };
+1 -1
nixos/tests/tomcat.nix
··· 6 6 7 7 nodes = { 8 8 server = 9 - { pkgs, config, ... }: 9 + { ... }: 10 10 11 11 { services.tomcat.enable = true; 12 12 services.httpd.enable = true;
+2 -2
nixos/tests/tor.nix
··· 5 5 meta.maintainers = with maintainers; [ joachifm ]; 6 6 7 7 common = 8 - { config, ... }: 8 + { ... }: 9 9 { boot.kernelParams = [ "audit=0" "apparmor=0" "quiet" ]; 10 10 networking.firewall.enable = false; 11 11 networking.useDHCP = false; 12 12 }; 13 13 14 14 nodes.client = 15 - { config, pkgs, ... }: 15 + { pkgs, ... }: 16 16 { imports = [ common ]; 17 17 environment.systemPackages = with pkgs; [ netcat ]; 18 18 services.tor.enable = true;
+4 -4
nixos/tests/trac.nix
··· 6 6 7 7 nodes = { 8 8 storage = 9 - { config, pkgs, ... }: 9 + { ... }: 10 10 { services.nfs.server.enable = true; 11 11 services.nfs.server.exports = '' 12 12 /repos 192.168.1.0/255.255.255.0(rw,no_root_squash) ··· 15 15 }; 16 16 17 17 postgresql = 18 - { config, pkgs, ... }: 18 + { pkgs, ... }: 19 19 { services.postgresql.enable = true; 20 20 services.postgresql.package = pkgs.postgresql; 21 21 services.postgresql.enableTCPIP = true; ··· 29 29 }; 30 30 31 31 webserver = 32 - { config, pkgs, ... }: 32 + { pkgs, ... }: 33 33 { fileSystems = pkgs.lib.mkVMOverride 34 34 [ { mountPoint = "/repos"; 35 35 device = "storage:/repos"; ··· 43 43 }; 44 44 45 45 client = 46 - { config, pkgs, ... }: 46 + { ... }: 47 47 { imports = [ ./common/x11.nix ]; 48 48 services.xserver.desktopManager.plasma5.enable = true; 49 49 };
+1 -1
nixos/tests/transmission.nix
··· 4 4 maintainers = [ coconnor ]; 5 5 }; 6 6 7 - machine = { config, pkgs, ... }: { 7 + machine = { ... }: { 8 8 imports = [ ../modules/profiles/minimal.nix ]; 9 9 10 10 networking.firewall.allowedTCPPorts = [ 9091 ];
+1 -1
nixos/tests/udisks2.nix
··· 16 16 }; 17 17 18 18 machine = 19 - { config, pkgs, ... }: 19 + { ... }: 20 20 { services.udisks2.enable = true; 21 21 imports = [ ./common/user-account.nix ]; 22 22
+1 -1
nixos/tests/vault.nix
··· 4 4 meta = with pkgs.stdenv.lib.maintainers; { 5 5 maintainers = [ lnl7 ]; 6 6 }; 7 - machine = { config, pkgs, ... }: { 7 + machine = { pkgs, ... }: { 8 8 environment.systemPackages = [ pkgs.vault ]; 9 9 environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; 10 10 services.vault.enable = true;
+2 -2
nixos/tests/wordpress.nix
··· 8 8 9 9 nodes = 10 10 { web = 11 - { config, pkgs, ... }: 11 + { pkgs, ... }: 12 12 { 13 13 services.mysql = { 14 14 enable = true; ··· 41 41 }; 42 42 43 43 testScript = 44 - { nodes, ... }: 44 + { ... }: 45 45 '' 46 46 startAll; 47 47
+1 -1
nixos/tests/xdg-desktop-portal.nix
··· 7 7 maintainers = pkgs.xdg-desktop-portal.meta.maintainers; 8 8 }; 9 9 10 - machine = { config, pkgs, ... }: { 10 + machine = { pkgs, ... }: { 11 11 environment.systemPackages = with pkgs; [ gnome-desktop-testing ]; 12 12 }; 13 13
+1 -1
nixos/tests/xfce.nix
··· 5 5 }; 6 6 7 7 machine = 8 - { config, pkgs, ... }: 8 + { pkgs, ... }: 9 9 10 10 { imports = [ ./common/user-account.nix ]; 11 11
+1 -1
nixos/tests/xmonad.nix
··· 15 15 }; 16 16 }; 17 17 18 - testScript = { nodes, ... }: '' 18 + testScript = { ... }: '' 19 19 $machine->waitForX; 20 20 $machine->waitForFile("/home/alice/.Xauthority"); 21 21 $machine->succeed("xauth merge ~alice/.Xauthority");
+3 -3
nixos/tests/xrdp.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - server = { lib, pkgs, ... }: { 8 + server = { pkgs, ... }: { 9 9 imports = [ ./common/user-account.nix ]; 10 10 services.xrdp.enable = true; 11 11 services.xrdp.defaultWindowManager = "${pkgs.xterm}/bin/xterm"; 12 12 networking.firewall.allowedTCPPorts = [ 3389 ]; 13 13 }; 14 14 15 - client = { lib, pkgs, ... }: { 15 + client = { pkgs, ... }: { 16 16 imports = [ ./common/x11.nix ./common/user-account.nix ]; 17 17 services.xserver.displayManager.auto.user = "alice"; 18 18 environment.systemPackages = [ pkgs.freerdp ]; ··· 21 21 }; 22 22 }; 23 23 24 - testScript = { nodes, ... }: '' 24 + testScript = { ... }: '' 25 25 startAll; 26 26 27 27 $client->waitForX;
+1 -1
nixos/tests/zfs.nix
··· 17 17 maintainers = [ adisbladis ]; 18 18 }; 19 19 20 - machine = { config, lib, pkgs, ... }: 20 + machine = { pkgs, ... }: 21 21 { 22 22 virtualisation.emptyDiskImages = [ 4096 ]; 23 23 networking.hostId = "deadbeef";
+1 -1
nixos/tests/zookeeper.nix
··· 5 5 }; 6 6 7 7 nodes = { 8 - server = { pkgs, config, ... }: { 8 + server = { ... }: { 9 9 services.zookeeper = { 10 10 enable = true; 11 11 };