nixos/services.yubikey-agent: remove `with lib;`

Changed files
+6 -10
nixos
modules
services
+6 -10
nixos/modules/services/security/yubikey-agent.nix
···
# Global configuration for yubikey-agent.
-
{
config,
lib,
pkgs,
...
}:
-
-
with lib;
-
let
cfg = config.services.yubikey-agent;
in
{
###### interface
-
meta.maintainers = with maintainers; [
philandstuff
rawkode
];
···
options = {
services.yubikey-agent = {
-
enable = mkOption {
-
type = types.bool;
default = false;
description = ''
Whether to start yubikey-agent when you log in. Also sets
···
'';
};
-
package = mkPackageOption pkgs "yubikey-agent" { };
};
};
-
config = mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
systemd.packages = [ cfg.package ];
# This overrides the systemd user unit shipped with the
# yubikey-agent package
-
systemd.user.services.yubikey-agent = mkIf (config.programs.gnupg.agent.pinentryPackage != null) {
path = [ config.programs.gnupg.agent.pinentryPackage ];
wantedBy = [ "default.target" ];
};
···
# Global configuration for yubikey-agent.
{
config,
lib,
pkgs,
...
}:
let
cfg = config.services.yubikey-agent;
in
{
###### interface
+
meta.maintainers = with lib.maintainers; [
philandstuff
rawkode
];
···
options = {
services.yubikey-agent = {
+
enable = lib.mkOption {
+
type = lib.types.bool;
default = false;
description = ''
Whether to start yubikey-agent when you log in. Also sets
···
'';
};
+
package = lib.mkPackageOption pkgs "yubikey-agent" { };
};
};
+
config = lib.mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
systemd.packages = [ cfg.package ];
# This overrides the systemd user unit shipped with the
# yubikey-agent package
+
systemd.user.services.yubikey-agent = lib.mkIf (config.programs.gnupg.agent.pinentryPackage != null) {
path = [ config.programs.gnupg.agent.pinentryPackage ];
wantedBy = [ "default.target" ];
};