Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Rewrite ‘with pkgs.lib’ -> ‘with lib’

Using pkgs.lib on the spine of module evaluation is problematic
because the pkgs argument depends on the result of module
evaluation. To prevent an infinite recursion, pkgs and some of the
modules are evaluated twice, which is inefficient. Using ‘with lib’
prevents this problem.

+659 -656
+2 -2
nixos/doc/manual/development.xml
··· 188 188 189 189 <example xml:id='locate-example'><title>NixOS module for the “locate” service</title> 190 190 <programlisting> 191 - { config, pkgs, ... }: 191 + { config, lib, pkgs, ... }: 192 192 193 - with pkgs.lib; 193 + with lib; 194 194 195 195 let locatedb = "/var/cache/locatedb"; in 196 196
+2 -2
nixos/modules/config/fonts/corefonts.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/config/fonts/fontconfig.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/config/fonts/fontdir.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/config/fonts/fonts.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/config/fonts/ghostscript.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/config/gnu.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options = {
+2 -2
nixos/modules/config/i18n.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/config/krb5.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/config/ldap.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with pkgs; 5 5 6 6 let
+2 -2
nixos/modules/config/networking.nix
··· 1 1 # /etc files related to networking, such as /etc/services. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/config/no-x-libs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options = {
+2 -2
nixos/modules/config/nsswitch.nix
··· 1 1 # Configuration for the Name Service Switch (/etc/nsswitch.conf). 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/config/power-management.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/config/pulseaudio.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with pkgs; 5 5 6 6 let
+2 -2
nixos/modules/config/shells-environment.nix
··· 1 1 # This module defines a global environment configuration and 2 2 # a common configuration for all shells. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/config/swap.nix
··· 1 - { config, pkgs, utils, ... }: 1 + { config, lib, pkgs, utils, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with utils; 5 5 6 6 {
+2 -2
nixos/modules/config/sysctl.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/config/system-path.nix
··· 1 1 # This module defines the packages that appear in 2 2 # /run/current-system/sw. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/config/timezone.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options = {
+2 -2
nixos/modules/config/unix-odbc-drivers.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 # unixODBC drivers (this solution is not perfect.. Because the user has to 6 6 # ask the admin to add a driver.. but it's simple and works
+2 -2
nixos/modules/config/users-groups.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/hardware/all-firmware.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/hardware/cpu/amd-microcode.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/hardware/cpu/intel-microcode.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/hardware/network/b43.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let kernelVersion = config.boot.kernelPackages.kernel.version; in 6 6
+2 -2
nixos/modules/hardware/pcmcia.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/hardware/video/bumblebee.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 let kernel = config.boot.kernelPackages; in 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 { 7 7
+2 -2
nixos/modules/installer/cd-dvd/channel.nix
··· 1 1 # Provide an initial copy of the NixOS channel so that the user 2 2 # doesn't need to run "nix-channel --update" first. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-base.nix
··· 1 1 # This module contains the basic configuration for building a NixOS 2 2 # installation CD. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 { 9 9 imports =
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-graphical.nix
··· 1 1 # This module defines a NixOS installation CD that contains X11 and 2 2 # KDE 4. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 { 9 9 imports = [ ./installation-cd-base.nix ../../profiles/graphical.nix ];
+2 -2
nixos/modules/installer/cd-dvd/iso-image.nix
··· 2 2 # configuration. The derivation for the ISO image will be placed in 3 3 # config.system.build.isoImage. 4 4 5 - { config, pkgs, ... }: 5 + { config, lib, pkgs, ... }: 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 let 10 10
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-fuloong2f.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-pc.nix
··· 1 1 # This module contains the basic configuration for building a NixOS 2 2 # tarball, that can directly boot, maybe using PXE or unpacking on a fs. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
··· 1 1 # This module contains the basic configuration for building a NixOS 2 2 # tarball for the sheevaplug. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/installer/cd-dvd/system-tarball.nix
··· 2 2 # configuration. The derivation for the ISO image will be placed in 3 3 # config.system.build.tarball. 4 4 5 - { config, pkgs, ... }: 5 + { config, lib, pkgs, ... }: 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 let 10 10
+2 -2
nixos/modules/installer/scan/detected.nix
··· 1 1 # List all devices which are detected by nixos-hardware-scan. 2 2 # Common devices are enabled by default. 3 - {config, pkgs, ...}: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8 config = mkDefault {
+2 -2
nixos/modules/installer/scan/not-detected.nix
··· 1 1 # List all devices which are _not_ detected by nixos-hardware-scan. 2 2 # Common devices are enabled by default. 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8 hardware.enableAllFirmware = true;
+2 -2
nixos/modules/installer/tools/nixos-checkout.nix
··· 1 1 # This module generates the nixos-checkout script, which replaces the 2 2 # Nixpkgs source trees in /etc/nixos/nixpkgs with a Git checkout. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/installer/tools/tools.nix
··· 80 80 /* 81 81 options = { 82 82 83 - installer.enableGraphicalTools = pkgs.lib.mkOption { 83 + installer.enableGraphicalTools = mkOption { 84 84 default = false; 85 - type = with pkgs.lib.types; bool; 85 + type = types.bool; 86 86 example = true; 87 87 description = '' 88 88 Enable the installation of graphical tools.
+2 -2
nixos/modules/installer/virtualbox-demo.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 imports =
+2 -2
nixos/modules/misc/assertions.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/misc/check-config.nix
··· 1 - { pkgs, ... }: 1 + { lib, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options = {
+2 -2
nixos/modules/misc/crashdump.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 crashdump = config.boot.crashDump;
+2 -2
nixos/modules/misc/locate.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/misc/nixpkgs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 isConfig = x:
+2 -2
nixos/modules/misc/version.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/profiles/clone-config.nix
··· 1 - { config, pkgs, modules, ... }: 1 + { config, lib, pkgs, modules, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/profiles/headless.nix
··· 1 1 # Common configuration for headless machines (e.g., Amazon EC2 2 2 # instances). 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 { 9 9 sound.enable = false;
+3 -3
nixos/modules/profiles/installation-device.nix
··· 1 1 # Provide a basic configuration for installation devices like CDs. 2 - { config, pkgs, modules, ... }: 2 + { config, lib, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 { 7 7 imports = ··· 45 45 46 46 # Enable wpa_supplicant, but don't start it by default. 47 47 networking.wireless.enable = true; 48 - jobs.wpa_supplicant.startOn = pkgs.lib.mkOverride 50 ""; 48 + jobs.wpa_supplicant.startOn = mkOverride 50 ""; 49 49 50 50 # Tell the Nix evaluator to garbage collect more aggressively. 51 51 # This is desirable in memory-constrained environments that don't
+2 -2
nixos/modules/programs/atop.nix
··· 1 1 # Global configuration for atop. 2 2 3 - {config, pkgs, ...}: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let cfg = config.programs.atop; 8 8
+2 -2
nixos/modules/programs/bash/bash.nix
··· 1 1 # This module defines global configuration for the Bash shell, in 2 2 # particular /etc/bashrc and /etc/profile. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/programs/bash/command-not-found.nix
··· 3 3 # SQLite database that maps program names to Nix package names (e.g., 4 4 # "pdflatex" is mapped to "tetex"). 5 5 6 - { config, pkgs, ... }: 6 + { config, lib, pkgs, ... }: 7 7 8 - with pkgs.lib; 8 + with lib; 9 9 10 10 let 11 11
+2 -2
nixos/modules/programs/environment.nix
··· 2 2 3 3 # Most of the stuff here should probably be moved elsewhere sometime. 4 4 5 - { config, pkgs, ... }: 5 + { config, lib, pkgs, ... }: 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 let 10 10
+2 -2
nixos/modules/programs/shadow.nix
··· 1 1 # Configuration for the pwdutils suite of tools: passwd, useradd, etc. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/programs/shell.nix
··· 1 1 # This module defines a standard configuration for NixOS shells. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/programs/ssh.nix
··· 1 1 # Global configuration for the SSH client. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let cfg = config.programs.ssh; 8 8 cfgd = config.services.openssh;
+2 -2
nixos/modules/programs/ssmtp.nix
··· 3 3 # directly to an SMTP server defined in its configuration file, wihout 4 4 # queueing mail locally. 5 5 6 - { config, pkgs, ... }: 6 + { config, lib, pkgs, ... }: 7 7 8 - with pkgs.lib; 8 + with lib; 9 9 10 10 let 11 11
+2 -2
nixos/modules/programs/venus.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 let 5 5 cfg = config.services.venus; 6 6
+2 -2
nixos/modules/programs/virtualbox.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let virtualbox = config.boot.kernelPackages.virtualbox; in 6 6
+2 -2
nixos/modules/programs/wvdial.nix
··· 1 1 # Global configuration for wvdial. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/programs/zsh/zsh.nix
··· 1 1 # This module defines global configuration for the zshell. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/rename.nix
··· 1 - { config, pkgs, options, ... }: 1 + { config, lib, options, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/security/apparmor-suid.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.security.apparmor; 4 4 in 5 - with pkgs.lib; 5 + with lib; 6 6 { 7 7 8 8 options.security.apparmor.confineSUIDApplications = mkOption {
+2 -2
nixos/modules/security/apparmor.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 3 let 4 4 cfg = config.security.apparmor; 5 5 in 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 { 10 10
+2 -2
nixos/modules/security/ca.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/security/duosec.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.security.duosec;
+2 -2
nixos/modules/security/grsecurity.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.security.grsecurity;
+2 -2
nixos/modules/security/pam.nix
··· 1 1 # This module provides configuration for the PAM (Pluggable 2 2 # Authentication Modules) system. 3 3 4 - {config, pkgs, ...}: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/security/pam_usb.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/security/polkit.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/security/prey.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.prey;
+2 -2
nixos/modules/security/rngd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options = {
+2 -2
nixos/modules/security/rtkit.nix
··· 1 1 # A module for ‘rtkit’, a DBus system service that hands out realtime 2 2 # scheduling priority to processes that ask for it. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 { 9 9
+2 -2
nixos/modules/security/setuid-wrappers.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/security/sudo.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/amqp/activemq/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with pkgs; 5 5 6 6 let
+2 -2
nixos/modules/services/amqp/rabbitmq.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.rabbitmq;
+2 -2
nixos/modules/services/audio/alsa.nix
··· 1 1 # ALSA sound support. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/audio/fuppes.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 3 let 4 4 cfg = config.services.fuppesd; 5 5 in 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 { 10 10 options = {
+2 -2
nixos/modules/services/audio/mpd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/backup/almir.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.almir;
+2 -2
nixos/modules/services/backup/bacula.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 # TODO: test configuration when building nixexpr (use -t parameter) 4 4 # TODO: support sqlite3 (it's deprecate?) and mysql 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9 libDir = "/var/lib/bacula";
+2 -2
nixos/modules/services/backup/mysql-backup.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/backup/postgresql-backup.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 inherit (pkgs) postgresql gzip;
+2 -2
nixos/modules/services/backup/rsnapshot.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let cfg = config.services.rsnapshot; 6 6 in
+2 -2
nixos/modules/services/backup/sitecopy-backup.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 inherit (pkgs) sitecopy;
+2 -2
nixos/modules/services/backup/tarsnap.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.tarsnap;
+2 -2
nixos/modules/services/continuous-integration/jenkins/default.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 cfg = config.services.jenkins; 5 5 in {
+2 -2
nixos/modules/services/continuous-integration/jenkins/slave.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 cfg = config.services.jenkinsSlave; 5 5 masterCfg = config.services.jenkins;
+2 -2
nixos/modules/services/databases/4store-endpoint.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.services.fourStoreEndpoint; 4 4 endpointUser = "fourstorehttp"; 5 5 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c"; 6 6 in 7 - with pkgs.lib; 7 + with lib; 8 8 { 9 9 10 10 ###### interface
+2 -2
nixos/modules/services/databases/4store.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.services.fourStore; 4 4 stateDir = "/var/lib/4store"; 5 5 fourStoreUser = "fourstore"; 6 6 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}"; 7 7 in 8 - with pkgs.lib; 8 + with lib; 9 9 { 10 10 11 11 ###### interface
+3 -2
nixos/modules/services/databases/couchdb.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 3 4 4 5 let 5 6 cfg = config.services.couchdb;
+2 -2
nixos/modules/services/databases/firebird.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 # TODO: This may file may need additional review, eg which configuartions to 4 4 # expose to the user. ··· 19 19 # Eg superserver is said to be most efficiently using resources according to 20 20 # http://www.firebirdsql.org/manual/qsg25-classic-or-super.html 21 21 22 - with pkgs.lib; 22 + with lib; 23 23 24 24 let 25 25
+2 -2
nixos/modules/services/databases/memcached.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/databases/monetdb.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.services.monetdb; 4 4 monetdbUser = "monetdb"; 5 5 in 6 - with pkgs.lib; 6 + with lib; 7 7 { 8 8 9 9 ###### interface
+2 -2
nixos/modules/services/databases/mongodb.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/databases/mysql.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/databases/openldap.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/databases/postgresql.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/databases/redis.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.redis;
+2 -2
nixos/modules/services/databases/virtuoso.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.services.virtuoso; 4 4 virtuosoUser = "virtuoso"; 5 5 stateDir = "/var/lib/virtuoso"; 6 6 in 7 - with pkgs.lib; 7 + with lib; 8 8 { 9 9 10 10 ###### interface
+2 -2
nixos/modules/services/desktops/accountservice.nix
··· 1 1 # AccountsService daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/desktops/gnome3/at-spi2-core.nix
··· 1 1 # at-spi2-core daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/desktops/gnome3/evolution-data-server.nix
··· 1 1 # Evolution Data Server daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/desktops/gnome3/sushi.nix
··· 1 1 # GNOME Sushi daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/desktops/telepathy.nix
··· 1 1 # Telepathy daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/games/ghost-one.nix
··· 1 - {pkgs, config, ...}: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 5 5 cfg = config.services.ghostOne;
+2 -2
nixos/modules/services/games/minecraft-server.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.minecraft-server;
+2 -2
nixos/modules/services/hardware/acpid.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/hardware/bluetooth.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/hardware/pcscd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 let 4 4 cfgFile = pkgs.writeText "reader.conf" ""; 5 5 in 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 { 10 10
+2 -2
nixos/modules/services/hardware/pommed.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/hardware/sane.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/hardware/thinkfan.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/hardware/udev.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/hardware/udisks.nix
··· 1 1 # Udisks daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/hardware/udisks2.nix
··· 1 1 # Udisks daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/hardware/upower.nix
··· 1 1 # Upower daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 { 8 8
+2 -2
nixos/modules/services/logging/klogd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 ###### interface
+2 -2
nixos/modules/services/logging/logcheck.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.logcheck;
+2 -2
nixos/modules/services/logging/logrotate.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.logrotate;
+2 -2
nixos/modules/services/logging/logstash.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.logstash;
+2 -2
nixos/modules/services/logging/rsyslogd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/logging/syslogd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/mail/dovecot.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/mail/freepops.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.mail.freepopsd;
+2 -2
nixos/modules/services/mail/mail.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/mail/opensmtpd.nix
··· 1 - { pkgs, config, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 with pkgs; 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/mail/postfix.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/mail/spamassassin.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/misc/autofs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/misc/cgminer.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.cgminer;
+2 -2
nixos/modules/services/misc/dictd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/misc/disnix.nix
··· 1 1 # Disnix server 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/misc/felix.nix
··· 1 1 # Felix server 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/misc/folding-at-home.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 stateDir = "/var/lib/foldingathome"; 5 5 cfg = config.services.foldingAtHome;
+2 -2
nixos/modules/services/misc/gpsd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/misc/nix-daemon.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/misc/nix-gc.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.nix.gc;
+2 -2
nixos/modules/services/misc/nixos-manual.nix
··· 3 3 # of the virtual consoles. The latter is useful for the installation 4 4 # CD. 5 5 6 - { config, pkgs, baseModules, ... } @ extraArgs: 6 + { config, lib, pkgs, baseModules, ... } @ extraArgs: 7 7 8 - with pkgs.lib; 8 + with lib; 9 9 10 10 let 11 11
+2 -2
nixos/modules/services/misc/rippled.nix
··· 1 1 # configuration building is commented out until better tested. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8 cfg = config.services.rippled;
+2 -2
nixos/modules/services/misc/rogue.nix
··· 1 1 # Execute the game `rogue' on tty 9. Mostly used by the NixOS 2 2 # installation CD. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let 9 9
+2 -2
nixos/modules/services/misc/svnserve.nix
··· 1 1 # SVN server 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/misc/synergy.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/monitoring/apcupsd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.apcupsd;
+2 -2
nixos/modules/services/monitoring/dd-agent.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.dd-agent;
+2 -2
nixos/modules/services/monitoring/graphite.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.graphite;
+2 -2
nixos/modules/services/monitoring/munin.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 # TODO: support munin-async 4 4 # TODO: LWP/Pg perl libs aren't recognized ··· 11 11 # nginx http://munin.readthedocs.org/en/latest/example/webserver/nginx.html 12 12 13 13 14 - with pkgs.lib; 14 + with lib; 15 15 16 16 let 17 17 nodeCfg = config.services.munin-node;
+2 -2
nixos/modules/services/monitoring/nagios/default.nix
··· 1 1 # Nagios system/network monitoring daemon. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/monitoring/smartd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/monitoring/statsd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/monitoring/systemhealth.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.systemhealth;
+2 -2
nixos/modules/services/monitoring/ups.nix
··· 1 - {config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 3 # TODO: This is not secure, have a look at the file docs/security.txt inside 4 4 # the project sources. 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8 cfg = config.power.ups;
+2 -2
nixos/modules/services/monitoring/zabbix-agent.nix
··· 1 1 # Zabbix agent daemon. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/monitoring/zabbix-server.nix
··· 1 1 # Zabbix server daemon. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/network-filesystems/drbd.nix
··· 1 1 # Support for DRBD, the Distributed Replicated Block Device. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let cfg = config.services.drbd; in 8 8
+2 -2
nixos/modules/services/network-filesystems/nfsd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/network-filesystems/samba.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/amuled.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.amule;
+2 -2
nixos/modules/services/networking/avahi-daemon.nix
··· 1 1 # Avahi daemon. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/services/networking/bind.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/bitlbee.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+3 -3
nixos/modules/services/networking/btsync.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.btsync; ··· 24 24 optionalString (e ? "knownHosts") 25 25 (concatStringsSep "," (map (v: "\"${v}\"") e."knownHosts")); 26 26 27 - sharedFoldersRecord = with pkgs.lib; 27 + sharedFoldersRecord = 28 28 concatStringsSep "," (map (entry: 29 29 let helper = attr: v: 30 30 if (entry ? attr) then boolStr entry.attr else boolStr v;
+2 -2
nixos/modules/services/networking/chrony.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/cjdns.nix
··· 8 8 # (without too much shell hackery), a skeleton of the 9 9 # configuration building lies commented out. 10 10 11 - { config, pkgs, ... }: 11 + { config, lib, pkgs, ... }: 12 12 13 - with pkgs.lib; 13 + with lib; 14 14 15 15 let 16 16
+3 -3
nixos/modules/services/networking/cntlm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 ··· 34 34 35 35 password = mkOption { 36 36 default = "/etc/cntlm.password"; 37 - type = with pkgs.lib.types; string; 37 + type = types.str; 38 38 description = ''Proxy account password. Note: use chmod 0600 on /etc/cntlm.password for security.''; 39 39 }; 40 40
+2 -2
nixos/modules/services/networking/connman.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with pkgs; 5 5 6 6 let
+2 -2
nixos/modules/services/networking/dhcpcd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/dhcpd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/dnsmasq.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.dnsmasq;
+2 -2
nixos/modules/services/networking/ejabberd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/firewall.nix
··· 20 20 21 21 22 22 23 - { config, pkgs, ... }: 23 + { config, lib, pkgs, ... }: 24 24 25 - with pkgs.lib; 25 + with lib; 26 26 27 27 let 28 28
+2 -2
nixos/modules/services/networking/flashpolicyd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/freenet.nix
··· 1 1 # NixOS module for Freenet daemon 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/networking/git-daemon.nix
··· 1 - {pkgs, config, ...}: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 5 5 cfg = config.services.gitDaemon;
+2 -2
nixos/modules/services/networking/gnunet.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/gogoclient.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let cfg = config.services.gogoclient; 6 6 in
+2 -2
nixos/modules/services/networking/haproxy.nix
··· 1 - { config, pkgs, ...}: 1 + { config, lib, pkgs, ... }: 2 2 let 3 3 cfg = config.services.haproxy; 4 4 haproxyCfg = pkgs.writeText "haproxy.conf" cfg.config; 5 5 in 6 - with pkgs.lib; 6 + with lib; 7 7 { 8 8 options = { 9 9 services.haproxy = {
+2 -2
nixos/modules/services/networking/hostapd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 # TODO: 4 4 # ··· 9 9 # wpa_supplicant and hostapd on the same wireless interface doesn't make any sense 10 10 # perhaps an assertion that there is a dhcp server and a dns server on the IP address serviced by the hostapd? 11 11 12 - with pkgs.lib; 12 + with lib; 13 13 14 14 let 15 15
+2 -2
nixos/modules/services/networking/ifplugd.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/iodined.nix
··· 1 1 # NixOS module for iodine, ip over dns daemon 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8 cfg = config.services.iodined;
+2 -2
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/kippo.nix
··· 6 6 # iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dport 22 -j REDIRECT --to-port 2222''; 7 7 # 8 8 # Lastly: use this service at your own risk. I am working on a way to run this inside a VM. 9 - { pkgs, config, ... }: 10 - with pkgs.lib; 9 + { config, lib, pkgs, ... }: 10 + with lib; 11 11 let 12 12 cfg = config.services.kippo; 13 13 in
+2 -2
nixos/modules/services/networking/minidlna.nix
··· 1 1 # Module for MiniDLNA, a simple DLNA server. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/networking/murmur.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.murmur;
+2 -2
nixos/modules/services/networking/nat.nix
··· 2 2 # XXX: todo: support multiple upstream links 3 3 # see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html 4 4 5 - { config, pkgs, ... }: 5 + { config, lib, pkgs, ... }: 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 let 10 10
+2 -2
nixos/modules/services/networking/networkmanager.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with pkgs; 5 5 6 6 let
+2 -2
nixos/modules/services/networking/notbit.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 3 let 4 4 cfg = config.services.notbit; ··· 16 16 }; 17 17 in 18 18 19 - with pkgs.lib; 19 + with lib; 20 20 { 21 21 22 22 ### configuration
+2 -2
nixos/modules/services/networking/ntopng.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/ntpd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/oidentd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/networking/openfire.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/openvpn.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/prayer.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/privoxy.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/quassel.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 quassel = pkgs.kde4.quasselDaemon;
+2 -2
nixos/modules/services/networking/radvd.nix
··· 1 1 # Module for the IPv6 Router Advertisement Daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/networking/rdnssd.nix
··· 1 1 # Module for rdnssd, a daemon that configures DNS servers in 2 2 # /etc/resolv/conf from IPv6 RDNSS advertisements. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 { 9 9
+2 -2
nixos/modules/services/networking/rpcbind.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/sabnzbd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/searx.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/ssh/lshd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/supybot.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/syncthing.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/tcpcrypt.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/tftpd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/networking/unbound.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/vsftpd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/wakeonlan.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 interfaces = config.services.wakeonlan.interfaces;
+2 -2
nixos/modules/services/networking/websockify.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let cfg = config.services.networking.websockify; in { 6 6 options = {
+2 -2
nixos/modules/services/networking/wicd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/networking/wpa_supplicant.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/networking/xinetd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/printing/cupsd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/scheduling/atd.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/scheduling/cron.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/scheduling/fcron.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/search/elasticsearch.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.elasticsearch;
+2 -2
nixos/modules/services/search/solr.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/security/clamav.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 clamavUser = "clamav"; 5 5 stateDir = "/var/lib/clamav";
+2 -2
nixos/modules/services/security/fail2ban.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/security/fprot.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 fprotUser = "fprot"; 5 5 stateDir = "/var/lib/fprot";
+2 -2
nixos/modules/services/security/haveged.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/security/tor.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/security/torify.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 5 5 cfg = config.services.tor;
+2 -2
nixos/modules/services/security/torsocks.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 5 5 cfg = config.services.tor;
+2 -2
nixos/modules/services/system/dbus.nix
··· 1 1 # D-Bus configuration and system bus daemon. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/system/nscd.nix
··· 1 - {pkgs, config, ...}: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/torrent/deluge.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.deluge;
+2 -2
nixos/modules/services/torrent/transmission.nix
··· 1 1 # NixOS module for Transmission BitTorrent daemon 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/ttys/agetty.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/services/ttys/gpm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+5 -5
nixos/modules/services/web-servers/apache-httpd/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 ··· 65 65 options = {}; 66 66 documentRoot = null; 67 67 }; 68 - res = defaults // svcFunction { inherit config pkgs serverInfo php; }; 68 + res = defaults // svcFunction { inherit config lib pkgs serverInfo php; }; 69 69 in res; 70 70 in map f defs; 71 71 ··· 510 510 virtualHosts = mkOption { 511 511 type = types.listOf (types.submodule ( 512 512 { options = import ./per-server-options.nix { 513 - inherit pkgs; 513 + inherit lib; 514 514 forMainServer = false; 515 515 }; 516 516 })); ··· 577 577 578 578 # Include the options shared between the main server and virtual hosts. 579 579 // (import ./per-server-options.nix { 580 - inherit pkgs; 580 + inherit lib; 581 581 forMainServer = true; 582 582 }); 583 583
+2 -2
nixos/modules/services/web-servers/apache-httpd/mediawiki.nix
··· 1 - { config, pkgs, serverInfo, php, ... }: 1 + { config, lib, pkgs, serverInfo, php, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/web-servers/apache-httpd/per-server-options.nix
··· 3 3 # has additional options that affect the web server as a whole, like 4 4 # the user/group to run under.) 5 5 6 - { forMainServer, pkgs }: 6 + { forMainServer, lib }: 7 7 8 - with pkgs.lib; 8 + with lib; 9 9 10 10 { 11 11
+2 -2
nixos/modules/services/web-servers/apache-httpd/trac.nix
··· 1 - { config, pkgs, serverInfo, ... }: 1 + { config, lib, pkgs, serverInfo, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+7 -5
nixos/modules/services/web-servers/apache-httpd/zabbix.nix
··· 1 - { config, pkgs, serverInfo, ... }: 1 + { config, lib, pkgs, serverInfo, ... }: 2 + 3 + with lib; 2 4 3 5 let 4 6 ··· 51 53 52 54 options = { 53 55 54 - urlPrefix = pkgs.lib.mkOption { 56 + urlPrefix = mkOption { 55 57 default = "/zabbix"; 56 58 description = " 57 59 The URL prefix under which the Zabbix service appears. ··· 59 61 "; 60 62 }; 61 63 62 - configFile = pkgs.lib.mkOption { 64 + configFile = mkOption { 63 65 default = null; 64 - type = with pkgs.lib.types; nullOr path; 66 + type = types.nullOr types.path; 65 67 description = '' 66 68 The configuration file (zabbix.conf.php) which contains the database 67 69 connection settings. If not set, the configuration settings will created ··· 69 71 ''; 70 72 }; 71 73 72 - stateDir = pkgs.lib.mkOption { 74 + stateDir = mkOption { 73 75 default = "/var/lib/zabbix/frontend"; 74 76 description = " 75 77 Directory where the dynamically generated configuration data
+2 -2
nixos/modules/services/web-servers/jboss/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/web-servers/lighttpd/cgit.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.lighttpd.cgit;
+2 -2
nixos/modules/services/web-servers/lighttpd/default.nix
··· 1 1 # NixOS module for lighttpd web server 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/services/web-servers/lighttpd/gitweb.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.lighttpd.gitweb;
+2 -2
nixos/modules/services/web-servers/nginx/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.nginx;
+2 -2
nixos/modules/services/web-servers/phpfpm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.phpfpm;
+2 -2
nixos/modules/services/web-servers/tomcat.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/web-servers/varnish/default.nix
··· 1 - { config, pkgs, ...}: 1 + { config, lib, pkgs, ...}: 2 2 let 3 3 cfg = config.services.varnish; 4 4 5 5 in 6 - with pkgs.lib; 6 + with lib; 7 7 { 8 8 options = { 9 9 services.varnish = {
+2 -2
nixos/modules/services/web-servers/winstone.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/web-servers/zope2.nix
··· 1 - { pkgs, config, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/desktop-managers/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/desktop-managers/e17.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.xserver.desktopManager.gnome3;
+2 -2
nixos/modules/services/x11/desktop-managers/kde4.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/desktop-managers/xbmc.nix
··· 1 - { pkgs, config, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.xserver.desktopManager.xbmc;
+2 -2
nixos/modules/services/x11/desktop-managers/xfce.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/desktop-managers/xterm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/display-managers/auto.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/display-managers/default.nix
··· 7 7 # (e.g., KDE, Gnome or a plain xterm), and optionally the *window 8 8 # manager* (e.g. kwin or twm). 9 9 10 - { config, pkgs, ... }: 10 + { config, lib, pkgs, ... }: 11 11 12 - with pkgs.lib; 12 + with lib; 13 13 14 14 let 15 15
+2 -2
nixos/modules/services/x11/display-managers/kdm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/display-managers/lightdm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/display-managers/slim.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/hardware/multitouch.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let cfg = config.services.xserver.multitouch; in 6 6
+2 -2
nixos/modules/services/x11/hardware/synaptics.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let cfg = config.services.xserver.synaptics; 6 6 tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;
+2 -2
nixos/modules/services/x11/hardware/wacom.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/redshift.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 3 let 4 4 cfg = config.services.redshift; 5 5
+2 -2
nixos/modules/services/x11/terminal-server.nix
··· 5 5 # not, a X server (Xvfb) is started for that user. The Xvfb instances 6 6 # persist across VNC sessions. 7 7 8 - { config, pkgs, ... }: 8 + { config, lib, pkgs, ... }: 9 9 10 - with pkgs.lib; 10 + with lib; 11 11 12 12 let 13 13
+2 -2
nixos/modules/services/x11/window-managers/awesome.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/window-managers/compiz.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/window-managers/default.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.xserver.windowManager;
+2 -2
nixos/modules/services/x11/window-managers/herbstluftwm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.xserver.windowManager.herbstluftwm;
+2 -2
nixos/modules/services/x11/window-managers/i3.nix
··· 1 - { pkgs, config, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.services.xserver.windowManager.i3;
+2 -2
nixos/modules/services/x11/window-managers/icewm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/window-managers/metacity.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/window-managers/twm.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/window-managers/wmii.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/xfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/services/x11/xserver.nix
··· 1 - { config, pkgs, pkgs_i686, ... }: 1 + { config, lib, pkgs, pkgs_i686, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/activation/activation-script.nix
··· 1 1 # generate the script used to activate the configuration. 2 - { config, pkgs, ... }: 2 + { config, lib, pkgs, ... }: 3 3 4 - with pkgs.lib; 4 + with lib; 5 5 6 6 let 7 7
+2 -2
nixos/modules/system/activation/no-clone.nix
··· 1 - {pkgs, ...}: 1 + { lib, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 boot.loader.grub.device = mkOverride 0 "nodev";
+3 -3
nixos/modules/system/activation/top-level.nix
··· 1 - { config, pkgs, modules, baseModules, ... }: 1 + { config, lib, pkgs, modules, baseModules, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 ··· 11 11 # you can provide an easy way to boot the same configuration 12 12 # as you use, but with another kernel 13 13 # !!! fix this 14 - cloner = inheritParent: list: with pkgs.lib; 14 + cloner = inheritParent: list: 15 15 map (childConfig: 16 16 (import ../../../lib/eval-config.nix { 17 17 inherit baseModules;
+2 -2
nixos/modules/system/boot/kernel.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/loader/efi.nix
··· 1 - { pkgs, ... }: 1 + { lib, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 options.boot.loader.efi = {
+2 -2
nixos/modules/system/boot/loader/generations-dir/generations-dir.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/loader/grub/grub.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/loader/grub/memtest.nix
··· 1 1 # This module adds Memtest86+ to the GRUB boot menu. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8 memtest86 = pkgs.memtest86plus;
+2 -2
nixos/modules/system/boot/loader/gummiboot/gummiboot.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 cfg = config.boot.loader.gummiboot;
+2 -2
nixos/modules/system/boot/loader/init-script/init-script.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/luksroot.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6 luks = config.boot.initrd.luks;
+2 -2
nixos/modules/system/boot/modprobe.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/system/boot/shutdown.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6
+2 -2
nixos/modules/system/boot/stage-1.nix
··· 3 3 # the modules necessary to mount the root file system, then calls the 4 4 # init in the root file system to start the second boot stage. 5 5 6 - { config, pkgs, ... }: 6 + { config, lib, pkgs, ... }: 7 7 8 - with pkgs.lib; 8 + with lib; 9 9 10 10 let 11 11
+2 -2
nixos/modules/system/boot/stage-2.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/system/boot/systemd-unit-options.nix
··· 1 - { config, pkgs }: 1 + { config, lib }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+3 -3
nixos/modules/system/boot/systemd.nix
··· 1 - { config, pkgs, utils, ... }: 1 + { config, lib, pkgs, utils, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with utils; 5 - with import ./systemd-unit-options.nix { inherit config pkgs; }; 5 + with import ./systemd-unit-options.nix { inherit config lib; }; 6 6 7 7 let 8 8
+2 -2
nixos/modules/system/etc/etc.nix
··· 1 1 # Management of static files in /etc. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+3 -3
nixos/modules/system/upstart/upstart.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 4 - with import ../boot/systemd-unit-options.nix { inherit config pkgs; }; 3 + with lib; 4 + with import ../boot/systemd-unit-options.nix { inherit config lib; }; 5 5 6 6 let 7 7
+2 -2
nixos/modules/tasks/cpu-freq.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 ###### interface
+2 -2
nixos/modules/tasks/filesystems.nix
··· 1 - { config, pkgs, utils, ... }: 1 + { config, lib, pkgs, utils, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 with utils; 5 5 6 6 let
+2 -2
nixos/modules/tasks/filesystems/btrfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/filesystems/nfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/filesystems/reiserfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/filesystems/vfat.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 # 3 3 # todo: 4 4 # - crontab for scrubs, etc ··· 6 6 # - /etc/zfs/zpool.cache handling 7 7 8 8 9 - with pkgs.lib; 9 + with lib; 10 10 11 11 let 12 12
+2 -2
nixos/modules/tasks/kbd.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/tasks/network-interfaces.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/testing/service-runner.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/testing/test-instrumentation.nix
··· 1 1 # This module allows the test driver to connect to the virtual machine 2 2 # via a root shell attached to port 514. 3 3 4 - { config, pkgs, ... }: 4 + { config, lib, pkgs, ... }: 5 5 6 - with pkgs.lib; 6 + with lib; 7 7 8 8 let kernel = config.boot.kernelPackages.kernel; in 9 9
+2 -2
nixos/modules/virtualisation/amazon-image.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 imports = [ ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/containers.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 let 6 6
+2 -2
nixos/modules/virtualisation/ec2-data.nix
··· 2 2 # host name of virtual machines running on Amazon EC2, Eucalyptus and 3 3 # OpenStack Compute (Nova). 4 4 5 - { config, pkgs, ... }: 5 + { config, lib, pkgs, ... }: 6 6 7 - with pkgs.lib; 7 + with lib; 8 8 9 9 { 10 10 options = {
+2 -2
nixos/modules/virtualisation/google-compute-image.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 let 5 5 diskSize = "100G"; 6 6 in
+2 -2
nixos/modules/virtualisation/libvirtd.nix
··· 1 1 # Systemd services for libvirtd. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/virtualisation/nixos-container.pl
··· 59 59 my ($nixosConfigFile) = @_; 60 60 61 61 my $nixosConfig = <<EOF; 62 - { config, pkgs, ... }: 62 + { config, lib, pkgs, ... }: 63 63 64 - with pkgs.lib; 64 + with lib; 65 65 66 66 { boot.isContainer = true; 67 67 security.initialRootPassword = mkDefault "!";
+2 -2
nixos/modules/virtualisation/nova-image.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 imports = [ ../profiles/qemu-guest.nix ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/nova.nix
··· 1 1 # Module for Nova, a.k.a. OpenStack Compute. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/virtualisation/qemu-vm.nix
··· 7 7 # the VM in the host. On the other hand, the root filesystem is a 8 8 # read/writable disk image persistent across VM reboots. 9 9 10 - { config, pkgs, ... }: 10 + { config, lib, pkgs, ... }: 11 11 12 - with pkgs.lib; 12 + with lib; 13 13 14 14 let 15 15
+2 -2
nixos/modules/virtualisation/virtualbox-guest.nix
··· 1 1 # Module for VirtualBox guests. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8
+2 -2
nixos/modules/virtualisation/virtualbox-image.nix
··· 1 - { config, pkgs, ... }: 1 + { config, lib, pkgs, ... }: 2 2 3 - with pkgs.lib; 3 + with lib; 4 4 5 5 { 6 6 system.build.virtualBoxImage =
+2 -2
nixos/modules/virtualisation/xen-dom0.nix
··· 1 1 # Xen hypervisor (Dom0) support. 2 2 3 - { config, pkgs, ... }: 3 + { config, lib, pkgs, ... }: 4 4 5 - with pkgs.lib; 5 + with lib; 6 6 7 7 let 8 8