Clone of https://github.com/NixOS/nixpkgs.git (to stress-test knotserver)

Rewrite ‘with pkgs.lib’ -> ‘with lib’

Using pkgs.lib on the spine of module evaluation is problematic
because the pkgs argument depends on the result of module
evaluation. To prevent an infinite recursion, pkgs and some of the
modules are evaluated twice, which is inefficient. Using ‘with lib’
prevents this problem.

+659 -656
+2 -2
nixos/doc/manual/development.xml
··· 188 189 <example xml:id='locate-example'><title>NixOS module for the “locate” service</title> 190 <programlisting> 191 - { config, pkgs, ... }: 192 193 - with pkgs.lib; 194 195 let locatedb = "/var/cache/locatedb"; in 196
··· 188 189 <example xml:id='locate-example'><title>NixOS module for the “locate” service</title> 190 <programlisting> 191 + { config, lib, pkgs, ... }: 192 193 + with lib; 194 195 let locatedb = "/var/cache/locatedb"; in 196
+2 -2
nixos/modules/config/fonts/corefonts.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/config/fonts/fontconfig.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/config/fonts/fontdir.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/config/fonts/fonts.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/config/fonts/ghostscript.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/config/gnu.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 options = {
+2 -2
nixos/modules/config/i18n.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/config/krb5.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/config/ldap.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 with pkgs; 5 6 let
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 with pkgs; 5 6 let
+2 -2
nixos/modules/config/networking.nix
··· 1 # /etc files related to networking, such as /etc/services. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # /etc files related to networking, such as /etc/services. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/config/no-x-libs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 options = {
+2 -2
nixos/modules/config/nsswitch.nix
··· 1 # Configuration for the Name Service Switch (/etc/nsswitch.conf). 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Configuration for the Name Service Switch (/etc/nsswitch.conf). 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/config/power-management.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/config/pulseaudio.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 with pkgs; 5 6 let
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 with pkgs; 5 6 let
+2 -2
nixos/modules/config/shells-environment.nix
··· 1 # This module defines a global environment configuration and 2 # a common configuration for all shells. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module defines a global environment configuration and 2 # a common configuration for all shells. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/config/swap.nix
··· 1 - { config, pkgs, utils, ... }: 2 3 - with pkgs.lib; 4 with utils; 5 6 {
··· 1 + { config, lib, pkgs, utils, ... }: 2 3 + with lib; 4 with utils; 5 6 {
+2 -2
nixos/modules/config/sysctl.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/config/system-path.nix
··· 1 # This module defines the packages that appear in 2 # /run/current-system/sw. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module defines the packages that appear in 2 # /run/current-system/sw. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/config/timezone.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 options = {
+2 -2
nixos/modules/config/unix-odbc-drivers.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 # unixODBC drivers (this solution is not perfect.. Because the user has to 6 # ask the admin to add a driver.. but it's simple and works
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 # unixODBC drivers (this solution is not perfect.. Because the user has to 6 # ask the admin to add a driver.. but it's simple and works
+2 -2
nixos/modules/config/users-groups.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/hardware/all-firmware.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/hardware/cpu/amd-microcode.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/hardware/cpu/intel-microcode.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/hardware/network/b43.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let kernelVersion = config.boot.kernelPackages.kernel.version; in 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let kernelVersion = config.boot.kernelPackages.kernel.version; in 6
+2 -2
nixos/modules/hardware/pcmcia.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/hardware/video/bumblebee.nix
··· 1 - { config, pkgs, ... }: 2 3 let kernel = config.boot.kernelPackages; in 4 - with pkgs.lib; 5 6 { 7
··· 1 + { config, lib, pkgs, ... }: 2 3 let kernel = config.boot.kernelPackages; in 4 + with lib; 5 6 { 7
+2 -2
nixos/modules/installer/cd-dvd/channel.nix
··· 1 # Provide an initial copy of the NixOS channel so that the user 2 # doesn't need to run "nix-channel --update" first. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # Provide an initial copy of the NixOS channel so that the user 2 # doesn't need to run "nix-channel --update" first. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-base.nix
··· 1 # This module contains the basic configuration for building a NixOS 2 # installation CD. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 { 9 imports =
··· 1 # This module contains the basic configuration for building a NixOS 2 # installation CD. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 { 9 imports =
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-graphical.nix
··· 1 # This module defines a NixOS installation CD that contains X11 and 2 # KDE 4. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 { 9 imports = [ ./installation-cd-base.nix ../../profiles/graphical.nix ];
··· 1 # This module defines a NixOS installation CD that contains X11 and 2 # KDE 4. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 { 9 imports = [ ./installation-cd-base.nix ../../profiles/graphical.nix ];
+2 -2
nixos/modules/installer/cd-dvd/iso-image.nix
··· 2 # configuration. The derivation for the ISO image will be placed in 3 # config.system.build.isoImage. 4 5 - { config, pkgs, ... }: 6 7 - with pkgs.lib; 8 9 let 10
··· 2 # configuration. The derivation for the ISO image will be placed in 3 # config.system.build.isoImage. 4 5 + { config, lib, pkgs, ... }: 6 7 + with lib; 8 9 let 10
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-fuloong2f.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-pc.nix
··· 1 # This module contains the basic configuration for building a NixOS 2 # tarball, that can directly boot, maybe using PXE or unpacking on a fs. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module contains the basic configuration for building a NixOS 2 # tarball, that can directly boot, maybe using PXE or unpacking on a fs. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
··· 1 # This module contains the basic configuration for building a NixOS 2 # tarball for the sheevaplug. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module contains the basic configuration for building a NixOS 2 # tarball for the sheevaplug. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/installer/cd-dvd/system-tarball.nix
··· 2 # configuration. The derivation for the ISO image will be placed in 3 # config.system.build.tarball. 4 5 - { config, pkgs, ... }: 6 7 - with pkgs.lib; 8 9 let 10
··· 2 # configuration. The derivation for the ISO image will be placed in 3 # config.system.build.tarball. 4 5 + { config, lib, pkgs, ... }: 6 7 + with lib; 8 9 let 10
+2 -2
nixos/modules/installer/scan/detected.nix
··· 1 # List all devices which are detected by nixos-hardware-scan. 2 # Common devices are enabled by default. 3 - {config, pkgs, ...}: 4 5 - with pkgs.lib; 6 7 { 8 config = mkDefault {
··· 1 # List all devices which are detected by nixos-hardware-scan. 2 # Common devices are enabled by default. 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8 config = mkDefault {
+2 -2
nixos/modules/installer/scan/not-detected.nix
··· 1 # List all devices which are _not_ detected by nixos-hardware-scan. 2 # Common devices are enabled by default. 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8 hardware.enableAllFirmware = true;
··· 1 # List all devices which are _not_ detected by nixos-hardware-scan. 2 # Common devices are enabled by default. 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8 hardware.enableAllFirmware = true;
+2 -2
nixos/modules/installer/tools/nixos-checkout.nix
··· 1 # This module generates the nixos-checkout script, which replaces the 2 # Nixpkgs source trees in /etc/nixos/nixpkgs with a Git checkout. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module generates the nixos-checkout script, which replaces the 2 # Nixpkgs source trees in /etc/nixos/nixpkgs with a Git checkout. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/installer/tools/tools.nix
··· 80 /* 81 options = { 82 83 - installer.enableGraphicalTools = pkgs.lib.mkOption { 84 default = false; 85 - type = with pkgs.lib.types; bool; 86 example = true; 87 description = '' 88 Enable the installation of graphical tools.
··· 80 /* 81 options = { 82 83 + installer.enableGraphicalTools = mkOption { 84 default = false; 85 + type = types.bool; 86 example = true; 87 description = '' 88 Enable the installation of graphical tools.
+2 -2
nixos/modules/installer/virtualbox-demo.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 imports =
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 imports =
+2 -2
nixos/modules/misc/assertions.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/misc/check-config.nix
··· 1 - { pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options = {
··· 1 + { lib, ... }: 2 3 + with lib; 4 5 { 6 options = {
+2 -2
nixos/modules/misc/crashdump.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6 crashdump = config.boot.crashDump;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 crashdump = config.boot.crashDump;
+2 -2
nixos/modules/misc/locate.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/misc/nixpkgs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 isConfig = x:
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 isConfig = x:
+2 -2
nixos/modules/misc/version.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/profiles/clone-config.nix
··· 1 - { config, pkgs, modules, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, modules, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/profiles/headless.nix
··· 1 # Common configuration for headless machines (e.g., Amazon EC2 2 # instances). 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 { 9 sound.enable = false;
··· 1 # Common configuration for headless machines (e.g., Amazon EC2 2 # instances). 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 { 9 sound.enable = false;
+3 -3
nixos/modules/profiles/installation-device.nix
··· 1 # Provide a basic configuration for installation devices like CDs. 2 - { config, pkgs, modules, ... }: 3 4 - with pkgs.lib; 5 6 { 7 imports = ··· 45 46 # Enable wpa_supplicant, but don't start it by default. 47 networking.wireless.enable = true; 48 - jobs.wpa_supplicant.startOn = pkgs.lib.mkOverride 50 ""; 49 50 # Tell the Nix evaluator to garbage collect more aggressively. 51 # This is desirable in memory-constrained environments that don't
··· 1 # Provide a basic configuration for installation devices like CDs. 2 + { config, lib, ... }: 3 4 + with lib; 5 6 { 7 imports = ··· 45 46 # Enable wpa_supplicant, but don't start it by default. 47 networking.wireless.enable = true; 48 + jobs.wpa_supplicant.startOn = mkOverride 50 ""; 49 50 # Tell the Nix evaluator to garbage collect more aggressively. 51 # This is desirable in memory-constrained environments that don't
+2 -2
nixos/modules/programs/atop.nix
··· 1 # Global configuration for atop. 2 3 - {config, pkgs, ...}: 4 5 - with pkgs.lib; 6 7 let cfg = config.programs.atop; 8
··· 1 # Global configuration for atop. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let cfg = config.programs.atop; 8
+2 -2
nixos/modules/programs/bash/bash.nix
··· 1 # This module defines global configuration for the Bash shell, in 2 # particular /etc/bashrc and /etc/profile. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module defines global configuration for the Bash shell, in 2 # particular /etc/bashrc and /etc/profile. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/programs/bash/command-not-found.nix
··· 3 # SQLite database that maps program names to Nix package names (e.g., 4 # "pdflatex" is mapped to "tetex"). 5 6 - { config, pkgs, ... }: 7 8 - with pkgs.lib; 9 10 let 11
··· 3 # SQLite database that maps program names to Nix package names (e.g., 4 # "pdflatex" is mapped to "tetex"). 5 6 + { config, lib, pkgs, ... }: 7 8 + with lib; 9 10 let 11
+2 -2
nixos/modules/programs/environment.nix
··· 2 3 # Most of the stuff here should probably be moved elsewhere sometime. 4 5 - { config, pkgs, ... }: 6 7 - with pkgs.lib; 8 9 let 10
··· 2 3 # Most of the stuff here should probably be moved elsewhere sometime. 4 5 + { config, lib, pkgs, ... }: 6 7 + with lib; 8 9 let 10
+2 -2
nixos/modules/programs/shadow.nix
··· 1 # Configuration for the pwdutils suite of tools: passwd, useradd, etc. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Configuration for the pwdutils suite of tools: passwd, useradd, etc. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/programs/shell.nix
··· 1 # This module defines a standard configuration for NixOS shells. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # This module defines a standard configuration for NixOS shells. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/programs/ssh.nix
··· 1 # Global configuration for the SSH client. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let cfg = config.programs.ssh; 8 cfgd = config.services.openssh;
··· 1 # Global configuration for the SSH client. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let cfg = config.programs.ssh; 8 cfgd = config.services.openssh;
+2 -2
nixos/modules/programs/ssmtp.nix
··· 3 # directly to an SMTP server defined in its configuration file, wihout 4 # queueing mail locally. 5 6 - { config, pkgs, ... }: 7 8 - with pkgs.lib; 9 10 let 11
··· 3 # directly to an SMTP server defined in its configuration file, wihout 4 # queueing mail locally. 5 6 + { config, lib, pkgs, ... }: 7 8 + with lib; 9 10 let 11
+2 -2
nixos/modules/programs/venus.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 let 5 cfg = config.services.venus; 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 let 5 cfg = config.services.venus; 6
+2 -2
nixos/modules/programs/virtualbox.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let virtualbox = config.boot.kernelPackages.virtualbox; in 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let virtualbox = config.boot.kernelPackages.virtualbox; in 6
+2 -2
nixos/modules/programs/wvdial.nix
··· 1 # Global configuration for wvdial. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Global configuration for wvdial. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/programs/zsh/zsh.nix
··· 1 # This module defines global configuration for the zshell. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # This module defines global configuration for the zshell. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/rename.nix
··· 1 - { config, pkgs, options, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, options, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/security/apparmor-suid.nix
··· 1 - {pkgs, config, ...}: 2 let 3 cfg = config.security.apparmor; 4 in 5 - with pkgs.lib; 6 { 7 8 options.security.apparmor.confineSUIDApplications = mkOption {
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.security.apparmor; 4 in 5 + with lib; 6 { 7 8 options.security.apparmor.confineSUIDApplications = mkOption {
+2 -2
nixos/modules/security/apparmor.nix
··· 1 - {pkgs, config, ...}: 2 3 let 4 cfg = config.security.apparmor; 5 in 6 7 - with pkgs.lib; 8 9 { 10
··· 1 + { config, lib, pkgs, ... }: 2 3 let 4 cfg = config.security.apparmor; 5 in 6 7 + with lib; 8 9 { 10
+2 -2
nixos/modules/security/ca.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/security/duosec.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.security.duosec;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.security.duosec;
+2 -2
nixos/modules/security/grsecurity.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.security.grsecurity;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.security.grsecurity;
+2 -2
nixos/modules/security/pam.nix
··· 1 # This module provides configuration for the PAM (Pluggable 2 # Authentication Modules) system. 3 4 - {config, pkgs, ...}: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # This module provides configuration for the PAM (Pluggable 2 # Authentication Modules) system. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/security/pam_usb.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/security/polkit.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/security/prey.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.prey;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.prey;
+2 -2
nixos/modules/security/rngd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 options = {
+2 -2
nixos/modules/security/rtkit.nix
··· 1 # A module for ‘rtkit’, a DBus system service that hands out realtime 2 # scheduling priority to processes that ask for it. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 { 9
··· 1 # A module for ‘rtkit’, a DBus system service that hands out realtime 2 # scheduling priority to processes that ask for it. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 { 9
+2 -2
nixos/modules/security/setuid-wrappers.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/security/sudo.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/amqp/activemq/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 with pkgs; 5 6 let
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 with pkgs; 5 6 let
+2 -2
nixos/modules/services/amqp/rabbitmq.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.rabbitmq;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.rabbitmq;
+2 -2
nixos/modules/services/audio/alsa.nix
··· 1 # ALSA sound support. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # ALSA sound support. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/audio/fuppes.nix
··· 1 - {config, pkgs, ...}: 2 3 let 4 cfg = config.services.fuppesd; 5 in 6 7 - with pkgs.lib; 8 9 { 10 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 let 4 cfg = config.services.fuppesd; 5 in 6 7 + with lib; 8 9 { 10 options = {
+2 -2
nixos/modules/services/audio/mpd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/backup/almir.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.almir;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.almir;
+2 -2
nixos/modules/services/backup/bacula.nix
··· 1 - { config, pkgs, ... }: 2 3 # TODO: test configuration when building nixexpr (use -t parameter) 4 # TODO: support sqlite3 (it's deprecate?) and mysql 5 6 - with pkgs.lib; 7 8 let 9 libDir = "/var/lib/bacula";
··· 1 + { config, lib, pkgs, ... }: 2 3 # TODO: test configuration when building nixexpr (use -t parameter) 4 # TODO: support sqlite3 (it's deprecate?) and mysql 5 6 + with lib; 7 8 let 9 libDir = "/var/lib/bacula";
+2 -2
nixos/modules/services/backup/mysql-backup.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/backup/postgresql-backup.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 inherit (pkgs) postgresql gzip;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 inherit (pkgs) postgresql gzip;
+2 -2
nixos/modules/services/backup/rsnapshot.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let cfg = config.services.rsnapshot; 6 in
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let cfg = config.services.rsnapshot; 6 in
+2 -2
nixos/modules/services/backup/sitecopy-backup.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 inherit (pkgs) sitecopy;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 inherit (pkgs) sitecopy;
+2 -2
nixos/modules/services/backup/tarsnap.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.tarsnap;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.tarsnap;
+2 -2
nixos/modules/services/continuous-integration/jenkins/default.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 cfg = config.services.jenkins; 5 in {
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 cfg = config.services.jenkins; 5 in {
+2 -2
nixos/modules/services/continuous-integration/jenkins/slave.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 cfg = config.services.jenkinsSlave; 5 masterCfg = config.services.jenkins;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 cfg = config.services.jenkinsSlave; 5 masterCfg = config.services.jenkins;
+2 -2
nixos/modules/services/databases/4store-endpoint.nix
··· 1 - { config, pkgs, ... }: 2 let 3 cfg = config.services.fourStoreEndpoint; 4 endpointUser = "fourstorehttp"; 5 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c"; 6 in 7 - with pkgs.lib; 8 { 9 10 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.services.fourStoreEndpoint; 4 endpointUser = "fourstorehttp"; 5 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c"; 6 in 7 + with lib; 8 { 9 10 ###### interface
+2 -2
nixos/modules/services/databases/4store.nix
··· 1 - { config, pkgs, ... }: 2 let 3 cfg = config.services.fourStore; 4 stateDir = "/var/lib/4store"; 5 fourStoreUser = "fourstore"; 6 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}"; 7 in 8 - with pkgs.lib; 9 { 10 11 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.services.fourStore; 4 stateDir = "/var/lib/4store"; 5 fourStoreUser = "fourstore"; 6 run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}"; 7 in 8 + with lib; 9 { 10 11 ###### interface
+3 -2
nixos/modules/services/databases/couchdb.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 4 let 5 cfg = config.services.couchdb;
··· 1 + { config, lib, pkgs, ... }: 2 + 3 + with lib; 4 5 let 6 cfg = config.services.couchdb;
+2 -2
nixos/modules/services/databases/firebird.nix
··· 1 - { config, pkgs, ... }: 2 3 # TODO: This may file may need additional review, eg which configuartions to 4 # expose to the user. ··· 19 # Eg superserver is said to be most efficiently using resources according to 20 # http://www.firebirdsql.org/manual/qsg25-classic-or-super.html 21 22 - with pkgs.lib; 23 24 let 25
··· 1 + { config, lib, pkgs, ... }: 2 3 # TODO: This may file may need additional review, eg which configuartions to 4 # expose to the user. ··· 19 # Eg superserver is said to be most efficiently using resources according to 20 # http://www.firebirdsql.org/manual/qsg25-classic-or-super.html 21 22 + with lib; 23 24 let 25
+2 -2
nixos/modules/services/databases/memcached.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/databases/monetdb.nix
··· 1 - { config, pkgs, ... }: 2 let 3 cfg = config.services.monetdb; 4 monetdbUser = "monetdb"; 5 in 6 - with pkgs.lib; 7 { 8 9 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.services.monetdb; 4 monetdbUser = "monetdb"; 5 in 6 + with lib; 7 { 8 9 ###### interface
+2 -2
nixos/modules/services/databases/mongodb.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/databases/mysql.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/databases/openldap.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/databases/postgresql.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/databases/redis.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.redis;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.redis;
+2 -2
nixos/modules/services/databases/virtuoso.nix
··· 1 - { config, pkgs, ... }: 2 let 3 cfg = config.services.virtuoso; 4 virtuosoUser = "virtuoso"; 5 stateDir = "/var/lib/virtuoso"; 6 in 7 - with pkgs.lib; 8 { 9 10 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.services.virtuoso; 4 virtuosoUser = "virtuoso"; 5 stateDir = "/var/lib/virtuoso"; 6 in 7 + with lib; 8 { 9 10 ###### interface
+2 -2
nixos/modules/services/desktops/accountservice.nix
··· 1 # AccountsService daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # AccountsService daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/desktops/gnome3/at-spi2-core.nix
··· 1 # at-spi2-core daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # at-spi2-core daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/desktops/gnome3/evolution-data-server.nix
··· 1 # Evolution Data Server daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # Evolution Data Server daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/desktops/gnome3/sushi.nix
··· 1 # GNOME Sushi daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # GNOME Sushi daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/desktops/telepathy.nix
··· 1 # Telepathy daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # Telepathy daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/games/ghost-one.nix
··· 1 - {pkgs, config, ...}: 2 - with pkgs.lib; 3 let 4 5 cfg = config.services.ghostOne;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 5 cfg = config.services.ghostOne;
+2 -2
nixos/modules/services/games/minecraft-server.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.minecraft-server;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.minecraft-server;
+2 -2
nixos/modules/services/hardware/acpid.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/hardware/bluetooth.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/hardware/pcscd.nix
··· 1 - { config, pkgs, ... }: 2 3 let 4 cfgFile = pkgs.writeText "reader.conf" ""; 5 in 6 7 - with pkgs.lib; 8 9 { 10
··· 1 + { config, lib, pkgs, ... }: 2 3 let 4 cfgFile = pkgs.writeText "reader.conf" ""; 5 in 6 7 + with lib; 8 9 { 10
+2 -2
nixos/modules/services/hardware/pommed.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/hardware/sane.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/hardware/thinkfan.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/hardware/udev.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/hardware/udisks.nix
··· 1 # Udisks daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # Udisks daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/hardware/udisks2.nix
··· 1 # Udisks daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # Udisks daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/hardware/upower.nix
··· 1 # Upower daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 { 8
··· 1 # Upower daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 { 8
+2 -2
nixos/modules/services/logging/klogd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 ###### interface
+2 -2
nixos/modules/services/logging/logcheck.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.logcheck;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.logcheck;
+2 -2
nixos/modules/services/logging/logrotate.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.logrotate;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.logrotate;
+2 -2
nixos/modules/services/logging/logstash.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.logstash;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.logstash;
+2 -2
nixos/modules/services/logging/rsyslogd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/logging/syslogd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/mail/dovecot.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/mail/freepops.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.mail.freepopsd;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.mail.freepopsd;
+2 -2
nixos/modules/services/mail/mail.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/mail/opensmtpd.nix
··· 1 - { pkgs, config, ... }: 2 3 with pkgs; 4 - with pkgs.lib; 5 6 let 7
··· 1 + { config, lib, pkgs, ... }: 2 3 with pkgs; 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/mail/postfix.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/mail/spamassassin.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/misc/autofs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/misc/cgminer.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.cgminer;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.cgminer;
+2 -2
nixos/modules/services/misc/dictd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/misc/disnix.nix
··· 1 # Disnix server 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Disnix server 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/misc/felix.nix
··· 1 # Felix server 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Felix server 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/misc/folding-at-home.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 stateDir = "/var/lib/foldingathome"; 5 cfg = config.services.foldingAtHome;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 stateDir = "/var/lib/foldingathome"; 5 cfg = config.services.foldingAtHome;
+2 -2
nixos/modules/services/misc/gpsd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/misc/nix-daemon.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/misc/nix-gc.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.nix.gc;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.nix.gc;
+2 -2
nixos/modules/services/misc/nixos-manual.nix
··· 3 # of the virtual consoles. The latter is useful for the installation 4 # CD. 5 6 - { config, pkgs, baseModules, ... } @ extraArgs: 7 8 - with pkgs.lib; 9 10 let 11
··· 3 # of the virtual consoles. The latter is useful for the installation 4 # CD. 5 6 + { config, lib, pkgs, baseModules, ... } @ extraArgs: 7 8 + with lib; 9 10 let 11
+2 -2
nixos/modules/services/misc/rippled.nix
··· 1 # configuration building is commented out until better tested. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8 cfg = config.services.rippled;
··· 1 # configuration building is commented out until better tested. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8 cfg = config.services.rippled;
+2 -2
nixos/modules/services/misc/rogue.nix
··· 1 # Execute the game `rogue' on tty 9. Mostly used by the NixOS 2 # installation CD. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let 9
··· 1 # Execute the game `rogue' on tty 9. Mostly used by the NixOS 2 # installation CD. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let 9
+2 -2
nixos/modules/services/misc/svnserve.nix
··· 1 # SVN server 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # SVN server 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/misc/synergy.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/monitoring/apcupsd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.apcupsd;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.apcupsd;
+2 -2
nixos/modules/services/monitoring/dd-agent.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.dd-agent;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.dd-agent;
+2 -2
nixos/modules/services/monitoring/graphite.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.graphite;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.graphite;
+2 -2
nixos/modules/services/monitoring/munin.nix
··· 1 - { config, pkgs, ... }: 2 3 # TODO: support munin-async 4 # TODO: LWP/Pg perl libs aren't recognized ··· 11 # nginx http://munin.readthedocs.org/en/latest/example/webserver/nginx.html 12 13 14 - with pkgs.lib; 15 16 let 17 nodeCfg = config.services.munin-node;
··· 1 + { config, lib, pkgs, ... }: 2 3 # TODO: support munin-async 4 # TODO: LWP/Pg perl libs aren't recognized ··· 11 # nginx http://munin.readthedocs.org/en/latest/example/webserver/nginx.html 12 13 14 + with lib; 15 16 let 17 nodeCfg = config.services.munin-node;
+2 -2
nixos/modules/services/monitoring/nagios/default.nix
··· 1 # Nagios system/network monitoring daemon. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Nagios system/network monitoring daemon. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/monitoring/smartd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/monitoring/statsd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/monitoring/systemhealth.nix
··· 1 - {config, pkgs, ...}: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.systemhealth;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.systemhealth;
+2 -2
nixos/modules/services/monitoring/ups.nix
··· 1 - {config, pkgs, ...}: 2 3 # TODO: This is not secure, have a look at the file docs/security.txt inside 4 # the project sources. 5 - with pkgs.lib; 6 7 let 8 cfg = config.power.ups;
··· 1 + { config, lib, pkgs, ... }: 2 3 # TODO: This is not secure, have a look at the file docs/security.txt inside 4 # the project sources. 5 + with lib; 6 7 let 8 cfg = config.power.ups;
+2 -2
nixos/modules/services/monitoring/zabbix-agent.nix
··· 1 # Zabbix agent daemon. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Zabbix agent daemon. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/monitoring/zabbix-server.nix
··· 1 # Zabbix server daemon. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Zabbix server daemon. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/network-filesystems/drbd.nix
··· 1 # Support for DRBD, the Distributed Replicated Block Device. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let cfg = config.services.drbd; in 8
··· 1 # Support for DRBD, the Distributed Replicated Block Device. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let cfg = config.services.drbd; in 8
+2 -2
nixos/modules/services/network-filesystems/nfsd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/network-filesystems/samba.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/amuled.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.amule;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.amule;
+2 -2
nixos/modules/services/networking/avahi-daemon.nix
··· 1 # Avahi daemon. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # Avahi daemon. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/services/networking/bind.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/bitlbee.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+3 -3
nixos/modules/services/networking/btsync.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.btsync; ··· 24 optionalString (e ? "knownHosts") 25 (concatStringsSep "," (map (v: "\"${v}\"") e."knownHosts")); 26 27 - sharedFoldersRecord = with pkgs.lib; 28 concatStringsSep "," (map (entry: 29 let helper = attr: v: 30 if (entry ? attr) then boolStr entry.attr else boolStr v;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.btsync; ··· 24 optionalString (e ? "knownHosts") 25 (concatStringsSep "," (map (v: "\"${v}\"") e."knownHosts")); 26 27 + sharedFoldersRecord = 28 concatStringsSep "," (map (entry: 29 let helper = attr: v: 30 if (entry ? attr) then boolStr entry.attr else boolStr v;
+2 -2
nixos/modules/services/networking/chrony.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/cjdns.nix
··· 8 # (without too much shell hackery), a skeleton of the 9 # configuration building lies commented out. 10 11 - { config, pkgs, ... }: 12 13 - with pkgs.lib; 14 15 let 16
··· 8 # (without too much shell hackery), a skeleton of the 9 # configuration building lies commented out. 10 11 + { config, lib, pkgs, ... }: 12 13 + with lib; 14 15 let 16
+3 -3
nixos/modules/services/networking/cntlm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 ··· 34 35 password = mkOption { 36 default = "/etc/cntlm.password"; 37 - type = with pkgs.lib.types; string; 38 description = ''Proxy account password. Note: use chmod 0600 on /etc/cntlm.password for security.''; 39 }; 40
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 ··· 34 35 password = mkOption { 36 default = "/etc/cntlm.password"; 37 + type = types.str; 38 description = ''Proxy account password. Note: use chmod 0600 on /etc/cntlm.password for security.''; 39 }; 40
+2 -2
nixos/modules/services/networking/connman.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 with pkgs; 5 6 let
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 with pkgs; 5 6 let
+2 -2
nixos/modules/services/networking/dhcpcd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/dhcpd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/dnsmasq.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.dnsmasq;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.dnsmasq;
+2 -2
nixos/modules/services/networking/ejabberd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/firewall.nix
··· 20 21 22 23 - { config, pkgs, ... }: 24 25 - with pkgs.lib; 26 27 let 28
··· 20 21 22 23 + { config, lib, pkgs, ... }: 24 25 + with lib; 26 27 let 28
+2 -2
nixos/modules/services/networking/flashpolicyd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/freenet.nix
··· 1 # NixOS module for Freenet daemon 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # NixOS module for Freenet daemon 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/networking/git-daemon.nix
··· 1 - {pkgs, config, ...}: 2 - with pkgs.lib; 3 let 4 5 cfg = config.services.gitDaemon;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 5 cfg = config.services.gitDaemon;
+2 -2
nixos/modules/services/networking/gnunet.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/gogoclient.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let cfg = config.services.gogoclient; 6 in
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let cfg = config.services.gogoclient; 6 in
+2 -2
nixos/modules/services/networking/haproxy.nix
··· 1 - { config, pkgs, ...}: 2 let 3 cfg = config.services.haproxy; 4 haproxyCfg = pkgs.writeText "haproxy.conf" cfg.config; 5 in 6 - with pkgs.lib; 7 { 8 options = { 9 services.haproxy = {
··· 1 + { config, lib, pkgs, ... }: 2 let 3 cfg = config.services.haproxy; 4 haproxyCfg = pkgs.writeText "haproxy.conf" cfg.config; 5 in 6 + with lib; 7 { 8 options = { 9 services.haproxy = {
+2 -2
nixos/modules/services/networking/hostapd.nix
··· 1 - { config, pkgs, ... }: 2 3 # TODO: 4 # ··· 9 # wpa_supplicant and hostapd on the same wireless interface doesn't make any sense 10 # perhaps an assertion that there is a dhcp server and a dns server on the IP address serviced by the hostapd? 11 12 - with pkgs.lib; 13 14 let 15
··· 1 + { config, lib, pkgs, ... }: 2 3 # TODO: 4 # ··· 9 # wpa_supplicant and hostapd on the same wireless interface doesn't make any sense 10 # perhaps an assertion that there is a dhcp server and a dns server on the IP address serviced by the hostapd? 11 12 + with lib; 13 14 let 15
+2 -2
nixos/modules/services/networking/ifplugd.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/iodined.nix
··· 1 # NixOS module for iodine, ip over dns daemon 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8 cfg = config.services.iodined;
··· 1 # NixOS module for iodine, ip over dns daemon 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8 cfg = config.services.iodined;
+2 -2
nixos/modules/services/networking/ircd-hybrid/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/kippo.nix
··· 6 # iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dport 22 -j REDIRECT --to-port 2222''; 7 # 8 # Lastly: use this service at your own risk. I am working on a way to run this inside a VM. 9 - { pkgs, config, ... }: 10 - with pkgs.lib; 11 let 12 cfg = config.services.kippo; 13 in
··· 6 # iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dport 22 -j REDIRECT --to-port 2222''; 7 # 8 # Lastly: use this service at your own risk. I am working on a way to run this inside a VM. 9 + { config, lib, pkgs, ... }: 10 + with lib; 11 let 12 cfg = config.services.kippo; 13 in
+2 -2
nixos/modules/services/networking/minidlna.nix
··· 1 # Module for MiniDLNA, a simple DLNA server. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Module for MiniDLNA, a simple DLNA server. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/networking/murmur.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.murmur;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.murmur;
+2 -2
nixos/modules/services/networking/nat.nix
··· 2 # XXX: todo: support multiple upstream links 3 # see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html 4 5 - { config, pkgs, ... }: 6 7 - with pkgs.lib; 8 9 let 10
··· 2 # XXX: todo: support multiple upstream links 3 # see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html 4 5 + { config, lib, pkgs, ... }: 6 7 + with lib; 8 9 let 10
+2 -2
nixos/modules/services/networking/networkmanager.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 with pkgs; 5 6 let
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 with pkgs; 5 6 let
+2 -2
nixos/modules/services/networking/notbit.nix
··· 1 - { config, pkgs, ... }: 2 3 let 4 cfg = config.services.notbit; ··· 16 }; 17 in 18 19 - with pkgs.lib; 20 { 21 22 ### configuration
··· 1 + { config, lib, pkgs, ... }: 2 3 let 4 cfg = config.services.notbit; ··· 16 }; 17 in 18 19 + with lib; 20 { 21 22 ### configuration
+2 -2
nixos/modules/services/networking/ntopng.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/ntpd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/oidentd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/networking/openfire.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/openvpn.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/prayer.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/privoxy.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/quassel.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 quassel = pkgs.kde4.quasselDaemon;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 quassel = pkgs.kde4.quasselDaemon;
+2 -2
nixos/modules/services/networking/radvd.nix
··· 1 # Module for the IPv6 Router Advertisement Daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Module for the IPv6 Router Advertisement Daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/networking/rdnssd.nix
··· 1 # Module for rdnssd, a daemon that configures DNS servers in 2 # /etc/resolv/conf from IPv6 RDNSS advertisements. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 { 9
··· 1 # Module for rdnssd, a daemon that configures DNS servers in 2 # /etc/resolv/conf from IPv6 RDNSS advertisements. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 { 9
+2 -2
nixos/modules/services/networking/rpcbind.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/sabnzbd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/searx.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/ssh/lshd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/supybot.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/syncthing.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/tcpcrypt.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/tftpd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/networking/unbound.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/vsftpd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/wakeonlan.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 interfaces = config.services.wakeonlan.interfaces;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 interfaces = config.services.wakeonlan.interfaces;
+2 -2
nixos/modules/services/networking/websockify.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let cfg = config.services.networking.websockify; in { 6 options = {
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let cfg = config.services.networking.websockify; in { 6 options = {
+2 -2
nixos/modules/services/networking/wicd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/networking/wpa_supplicant.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/networking/xinetd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/printing/cupsd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/scheduling/atd.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/scheduling/cron.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/scheduling/fcron.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/search/elasticsearch.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.elasticsearch;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.elasticsearch;
+2 -2
nixos/modules/services/search/solr.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/security/clamav.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 clamavUser = "clamav"; 5 stateDir = "/var/lib/clamav";
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 clamavUser = "clamav"; 5 stateDir = "/var/lib/clamav";
+2 -2
nixos/modules/services/security/fail2ban.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/security/fprot.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 fprotUser = "fprot"; 5 stateDir = "/var/lib/fprot";
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 fprotUser = "fprot"; 5 stateDir = "/var/lib/fprot";
+2 -2
nixos/modules/services/security/haveged.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/security/tor.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/security/torify.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 5 cfg = config.services.tor;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 5 cfg = config.services.tor;
+2 -2
nixos/modules/services/security/torsocks.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 5 cfg = config.services.tor;
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 5 cfg = config.services.tor;
+2 -2
nixos/modules/services/system/dbus.nix
··· 1 # D-Bus configuration and system bus daemon. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # D-Bus configuration and system bus daemon. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/system/nscd.nix
··· 1 - {pkgs, config, ...}: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/torrent/deluge.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.deluge;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.deluge;
+2 -2
nixos/modules/services/torrent/transmission.nix
··· 1 # NixOS module for Transmission BitTorrent daemon 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # NixOS module for Transmission BitTorrent daemon 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/ttys/agetty.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/services/ttys/gpm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+5 -5
nixos/modules/services/web-servers/apache-httpd/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 ··· 65 options = {}; 66 documentRoot = null; 67 }; 68 - res = defaults // svcFunction { inherit config pkgs serverInfo php; }; 69 in res; 70 in map f defs; 71 ··· 510 virtualHosts = mkOption { 511 type = types.listOf (types.submodule ( 512 { options = import ./per-server-options.nix { 513 - inherit pkgs; 514 forMainServer = false; 515 }; 516 })); ··· 577 578 # Include the options shared between the main server and virtual hosts. 579 // (import ./per-server-options.nix { 580 - inherit pkgs; 581 forMainServer = true; 582 }); 583
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 ··· 65 options = {}; 66 documentRoot = null; 67 }; 68 + res = defaults // svcFunction { inherit config lib pkgs serverInfo php; }; 69 in res; 70 in map f defs; 71 ··· 510 virtualHosts = mkOption { 511 type = types.listOf (types.submodule ( 512 { options = import ./per-server-options.nix { 513 + inherit lib; 514 forMainServer = false; 515 }; 516 })); ··· 577 578 # Include the options shared between the main server and virtual hosts. 579 // (import ./per-server-options.nix { 580 + inherit lib; 581 forMainServer = true; 582 }); 583
+2 -2
nixos/modules/services/web-servers/apache-httpd/mediawiki.nix
··· 1 - { config, pkgs, serverInfo, php, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, serverInfo, php, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/web-servers/apache-httpd/per-server-options.nix
··· 3 # has additional options that affect the web server as a whole, like 4 # the user/group to run under.) 5 6 - { forMainServer, pkgs }: 7 8 - with pkgs.lib; 9 10 { 11
··· 3 # has additional options that affect the web server as a whole, like 4 # the user/group to run under.) 5 6 + { forMainServer, lib }: 7 8 + with lib; 9 10 { 11
+2 -2
nixos/modules/services/web-servers/apache-httpd/trac.nix
··· 1 - { config, pkgs, serverInfo, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, serverInfo, ... }: 2 3 + with lib; 4 5 let 6
+7 -5
nixos/modules/services/web-servers/apache-httpd/zabbix.nix
··· 1 - { config, pkgs, serverInfo, ... }: 2 3 let 4 ··· 51 52 options = { 53 54 - urlPrefix = pkgs.lib.mkOption { 55 default = "/zabbix"; 56 description = " 57 The URL prefix under which the Zabbix service appears. ··· 59 "; 60 }; 61 62 - configFile = pkgs.lib.mkOption { 63 default = null; 64 - type = with pkgs.lib.types; nullOr path; 65 description = '' 66 The configuration file (zabbix.conf.php) which contains the database 67 connection settings. If not set, the configuration settings will created ··· 69 ''; 70 }; 71 72 - stateDir = pkgs.lib.mkOption { 73 default = "/var/lib/zabbix/frontend"; 74 description = " 75 Directory where the dynamically generated configuration data
··· 1 + { config, lib, pkgs, serverInfo, ... }: 2 + 3 + with lib; 4 5 let 6 ··· 53 54 options = { 55 56 + urlPrefix = mkOption { 57 default = "/zabbix"; 58 description = " 59 The URL prefix under which the Zabbix service appears. ··· 61 "; 62 }; 63 64 + configFile = mkOption { 65 default = null; 66 + type = types.nullOr types.path; 67 description = '' 68 The configuration file (zabbix.conf.php) which contains the database 69 connection settings. If not set, the configuration settings will created ··· 71 ''; 72 }; 73 74 + stateDir = mkOption { 75 default = "/var/lib/zabbix/frontend"; 76 description = " 77 Directory where the dynamically generated configuration data
+2 -2
nixos/modules/services/web-servers/jboss/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/web-servers/lighttpd/cgit.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.lighttpd.cgit;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.lighttpd.cgit;
+2 -2
nixos/modules/services/web-servers/lighttpd/default.nix
··· 1 # NixOS module for lighttpd web server 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # NixOS module for lighttpd web server 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/services/web-servers/lighttpd/gitweb.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.lighttpd.gitweb;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.lighttpd.gitweb;
+2 -2
nixos/modules/services/web-servers/nginx/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.nginx;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.nginx;
+2 -2
nixos/modules/services/web-servers/phpfpm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.phpfpm;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.phpfpm;
+2 -2
nixos/modules/services/web-servers/tomcat.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/web-servers/varnish/default.nix
··· 1 - { config, pkgs, ...}: 2 let 3 cfg = config.services.varnish; 4 5 in 6 - with pkgs.lib; 7 { 8 options = { 9 services.varnish = {
··· 1 + { config, lib, pkgs, ...}: 2 let 3 cfg = config.services.varnish; 4 5 in 6 + with lib; 7 { 8 options = { 9 services.varnish = {
+2 -2
nixos/modules/services/web-servers/winstone.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/web-servers/zope2.nix
··· 1 - { pkgs, config, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/desktop-managers/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/desktop-managers/e17.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/desktop-managers/gnome3.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.xserver.desktopManager.gnome3;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.xserver.desktopManager.gnome3;
+2 -2
nixos/modules/services/x11/desktop-managers/kde4.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/desktop-managers/xbmc.nix
··· 1 - { pkgs, config, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.xserver.desktopManager.xbmc;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.xserver.desktopManager.xbmc;
+2 -2
nixos/modules/services/x11/desktop-managers/xfce.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/desktop-managers/xterm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/display-managers/auto.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/display-managers/default.nix
··· 7 # (e.g., KDE, Gnome or a plain xterm), and optionally the *window 8 # manager* (e.g. kwin or twm). 9 10 - { config, pkgs, ... }: 11 12 - with pkgs.lib; 13 14 let 15
··· 7 # (e.g., KDE, Gnome or a plain xterm), and optionally the *window 8 # manager* (e.g. kwin or twm). 9 10 + { config, lib, pkgs, ... }: 11 12 + with lib; 13 14 let 15
+2 -2
nixos/modules/services/x11/display-managers/kdm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/display-managers/lightdm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/display-managers/slim.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/hardware/multitouch.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let cfg = config.services.xserver.multitouch; in 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let cfg = config.services.xserver.multitouch; in 6
+2 -2
nixos/modules/services/x11/hardware/synaptics.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let cfg = config.services.xserver.synaptics; 6 tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let cfg = config.services.xserver.synaptics; 6 tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;
+2 -2
nixos/modules/services/x11/hardware/wacom.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/redshift.nix
··· 1 - { config, pkgs, ... }: 2 - with pkgs.lib; 3 let 4 cfg = config.services.redshift; 5
··· 1 + { config, lib, pkgs, ... }: 2 + with lib; 3 let 4 cfg = config.services.redshift; 5
+2 -2
nixos/modules/services/x11/terminal-server.nix
··· 5 # not, a X server (Xvfb) is started for that user. The Xvfb instances 6 # persist across VNC sessions. 7 8 - { config, pkgs, ... }: 9 10 - with pkgs.lib; 11 12 let 13
··· 5 # not, a X server (Xvfb) is started for that user. The Xvfb instances 6 # persist across VNC sessions. 7 8 + { config, lib, pkgs, ... }: 9 10 + with lib; 11 12 let 13
+2 -2
nixos/modules/services/x11/window-managers/awesome.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/window-managers/compiz.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/window-managers/default.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.xserver.windowManager;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.xserver.windowManager;
+2 -2
nixos/modules/services/x11/window-managers/herbstluftwm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.xserver.windowManager.herbstluftwm;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.xserver.windowManager.herbstluftwm;
+2 -2
nixos/modules/services/x11/window-managers/i3.nix
··· 1 - { pkgs, config, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.services.xserver.windowManager.i3;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.services.xserver.windowManager.i3;
+2 -2
nixos/modules/services/x11/window-managers/icewm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/window-managers/metacity.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/window-managers/twm.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/window-managers/wmii.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/xfs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/services/x11/xserver.nix
··· 1 - { config, pkgs, pkgs_i686, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, pkgs_i686, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/activation/activation-script.nix
··· 1 # generate the script used to activate the configuration. 2 - { config, pkgs, ... }: 3 4 - with pkgs.lib; 5 6 let 7
··· 1 # generate the script used to activate the configuration. 2 + { config, lib, pkgs, ... }: 3 4 + with lib; 5 6 let 7
+2 -2
nixos/modules/system/activation/no-clone.nix
··· 1 - {pkgs, ...}: 2 3 - with pkgs.lib; 4 5 { 6 boot.loader.grub.device = mkOverride 0 "nodev";
··· 1 + { lib, ... }: 2 3 + with lib; 4 5 { 6 boot.loader.grub.device = mkOverride 0 "nodev";
+3 -3
nixos/modules/system/activation/top-level.nix
··· 1 - { config, pkgs, modules, baseModules, ... }: 2 3 - with pkgs.lib; 4 5 let 6 ··· 11 # you can provide an easy way to boot the same configuration 12 # as you use, but with another kernel 13 # !!! fix this 14 - cloner = inheritParent: list: with pkgs.lib; 15 map (childConfig: 16 (import ../../../lib/eval-config.nix { 17 inherit baseModules;
··· 1 + { config, lib, pkgs, modules, baseModules, ... }: 2 3 + with lib; 4 5 let 6 ··· 11 # you can provide an easy way to boot the same configuration 12 # as you use, but with another kernel 13 # !!! fix this 14 + cloner = inheritParent: list: 15 map (childConfig: 16 (import ../../../lib/eval-config.nix { 17 inherit baseModules;
+2 -2
nixos/modules/system/boot/kernel.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/loader/efi.nix
··· 1 - { pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 options.boot.loader.efi = {
··· 1 + { lib, ... }: 2 3 + with lib; 4 5 { 6 options.boot.loader.efi = {
+2 -2
nixos/modules/system/boot/loader/generations-dir/generations-dir.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/loader/grub/grub.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/loader/grub/memtest.nix
··· 1 # This module adds Memtest86+ to the GRUB boot menu. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8 memtest86 = pkgs.memtest86plus;
··· 1 # This module adds Memtest86+ to the GRUB boot menu. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8 memtest86 = pkgs.memtest86plus;
+2 -2
nixos/modules/system/boot/loader/gummiboot/gummiboot.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 cfg = config.boot.loader.gummiboot;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 cfg = config.boot.loader.gummiboot;
+2 -2
nixos/modules/system/boot/loader/init-script/init-script.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/luksroot.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6 luks = config.boot.initrd.luks;
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6 luks = config.boot.initrd.luks;
+2 -2
nixos/modules/system/boot/modprobe.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/system/boot/shutdown.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6
+2 -2
nixos/modules/system/boot/stage-1.nix
··· 3 # the modules necessary to mount the root file system, then calls the 4 # init in the root file system to start the second boot stage. 5 6 - { config, pkgs, ... }: 7 8 - with pkgs.lib; 9 10 let 11
··· 3 # the modules necessary to mount the root file system, then calls the 4 # init in the root file system to start the second boot stage. 5 6 + { config, lib, pkgs, ... }: 7 8 + with lib; 9 10 let 11
+2 -2
nixos/modules/system/boot/stage-2.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/system/boot/systemd-unit-options.nix
··· 1 - { config, pkgs }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib }: 2 3 + with lib; 4 5 let 6
+3 -3
nixos/modules/system/boot/systemd.nix
··· 1 - { config, pkgs, utils, ... }: 2 3 - with pkgs.lib; 4 with utils; 5 - with import ./systemd-unit-options.nix { inherit config pkgs; }; 6 7 let 8
··· 1 + { config, lib, pkgs, utils, ... }: 2 3 + with lib; 4 with utils; 5 + with import ./systemd-unit-options.nix { inherit config lib; }; 6 7 let 8
+2 -2
nixos/modules/system/etc/etc.nix
··· 1 # Management of static files in /etc. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Management of static files in /etc. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+3 -3
nixos/modules/system/upstart/upstart.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 - with import ../boot/systemd-unit-options.nix { inherit config pkgs; }; 5 6 let 7
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 + with import ../boot/systemd-unit-options.nix { inherit config lib; }; 5 6 let 7
+2 -2
nixos/modules/tasks/cpu-freq.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 ###### interface
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 ###### interface
+2 -2
nixos/modules/tasks/filesystems.nix
··· 1 - { config, pkgs, utils, ... }: 2 3 - with pkgs.lib; 4 with utils; 5 6 let
··· 1 + { config, lib, pkgs, utils, ... }: 2 3 + with lib; 4 with utils; 5 6 let
+2 -2
nixos/modules/tasks/filesystems/btrfs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/filesystems/nfs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/filesystems/reiserfs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/filesystems/vfat.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
··· 1 - { config, pkgs, ... }: 2 # 3 # todo: 4 # - crontab for scrubs, etc ··· 6 # - /etc/zfs/zpool.cache handling 7 8 9 - with pkgs.lib; 10 11 let 12
··· 1 + { config, lib, pkgs, ... }: 2 # 3 # todo: 4 # - crontab for scrubs, etc ··· 6 # - /etc/zfs/zpool.cache handling 7 8 9 + with lib; 10 11 let 12
+2 -2
nixos/modules/tasks/kbd.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/tasks/network-interfaces.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/testing/service-runner.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/testing/test-instrumentation.nix
··· 1 # This module allows the test driver to connect to the virtual machine 2 # via a root shell attached to port 514. 3 4 - { config, pkgs, ... }: 5 6 - with pkgs.lib; 7 8 let kernel = config.boot.kernelPackages.kernel; in 9
··· 1 # This module allows the test driver to connect to the virtual machine 2 # via a root shell attached to port 514. 3 4 + { config, lib, pkgs, ... }: 5 6 + with lib; 7 8 let kernel = config.boot.kernelPackages.kernel; in 9
+2 -2
nixos/modules/virtualisation/amazon-image.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 imports = [ ../profiles/headless.nix ./ec2-data.nix ];
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 imports = [ ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/containers.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 let 6
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 let 6
+2 -2
nixos/modules/virtualisation/ec2-data.nix
··· 2 # host name of virtual machines running on Amazon EC2, Eucalyptus and 3 # OpenStack Compute (Nova). 4 5 - { config, pkgs, ... }: 6 7 - with pkgs.lib; 8 9 { 10 options = {
··· 2 # host name of virtual machines running on Amazon EC2, Eucalyptus and 3 # OpenStack Compute (Nova). 4 5 + { config, lib, pkgs, ... }: 6 7 + with lib; 8 9 { 10 options = {
+2 -2
nixos/modules/virtualisation/google-compute-image.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 let 5 diskSize = "100G"; 6 in
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 let 5 diskSize = "100G"; 6 in
+2 -2
nixos/modules/virtualisation/libvirtd.nix
··· 1 # Systemd services for libvirtd. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Systemd services for libvirtd. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/virtualisation/nixos-container.pl
··· 59 my ($nixosConfigFile) = @_; 60 61 my $nixosConfig = <<EOF; 62 - { config, pkgs, ... }: 63 64 - with pkgs.lib; 65 66 { boot.isContainer = true; 67 security.initialRootPassword = mkDefault "!";
··· 59 my ($nixosConfigFile) = @_; 60 61 my $nixosConfig = <<EOF; 62 + { config, lib, pkgs, ... }: 63 64 + with lib; 65 66 { boot.isContainer = true; 67 security.initialRootPassword = mkDefault "!";
+2 -2
nixos/modules/virtualisation/nova-image.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 imports = [ ../profiles/qemu-guest.nix ../profiles/headless.nix ./ec2-data.nix ];
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 imports = [ ../profiles/qemu-guest.nix ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/nova.nix
··· 1 # Module for Nova, a.k.a. OpenStack Compute. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Module for Nova, a.k.a. OpenStack Compute. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/virtualisation/qemu-vm.nix
··· 7 # the VM in the host. On the other hand, the root filesystem is a 8 # read/writable disk image persistent across VM reboots. 9 10 - { config, pkgs, ... }: 11 12 - with pkgs.lib; 13 14 let 15
··· 7 # the VM in the host. On the other hand, the root filesystem is a 8 # read/writable disk image persistent across VM reboots. 9 10 + { config, lib, pkgs, ... }: 11 12 + with lib; 13 14 let 15
+2 -2
nixos/modules/virtualisation/virtualbox-guest.nix
··· 1 # Module for VirtualBox guests. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Module for VirtualBox guests. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8
+2 -2
nixos/modules/virtualisation/virtualbox-image.nix
··· 1 - { config, pkgs, ... }: 2 3 - with pkgs.lib; 4 5 { 6 system.build.virtualBoxImage =
··· 1 + { config, lib, pkgs, ... }: 2 3 + with lib; 4 5 { 6 system.build.virtualBoxImage =
+2 -2
nixos/modules/virtualisation/xen-dom0.nix
··· 1 # Xen hypervisor (Dom0) support. 2 3 - { config, pkgs, ... }: 4 5 - with pkgs.lib; 6 7 let 8
··· 1 # Xen hypervisor (Dom0) support. 2 3 + { config, lib, pkgs, ... }: 4 5 + with lib; 6 7 let 8