Rewrite ‘with pkgs.lib’ -> ‘with lib’

Using pkgs.lib on the spine of module evaluation is problematic
because the pkgs argument depends on the result of module
evaluation. To prevent an infinite recursion, pkgs and some of the
modules are evaluated twice, which is inefficient. Using ‘with lib’
prevents this problem.

Changed files
+659 -656
nixos
doc
modules
config
hardware
installer
misc
profiles
programs
security
services
amqp
audio
backup
continuous-integration
databases
desktops
games
hardware
logging
mail
misc
monitoring
network-filesystems
networking
printing
scheduling
search
security
system
torrent
ttys
web-servers
x11
system
tasks
testing
virtualisation
+2 -2
nixos/doc/manual/development.xml
···
<example xml:id='locate-example'><title>NixOS module for the “locate” service</title>
<programlisting>
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let locatedb = "/var/cache/locatedb"; in
+2 -2
nixos/modules/config/fonts/corefonts.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/config/fonts/fontconfig.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/config/fonts/fontdir.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/fonts/fonts.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/config/fonts/ghostscript.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/config/gnu.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/config/i18n.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/krb5.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/ldap.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
with pkgs;
let
+2 -2
nixos/modules/config/networking.nix
···
# /etc files related to networking, such as /etc/services.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/no-x-libs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/config/nsswitch.nix
···
# Configuration for the Name Service Switch (/etc/nsswitch.conf).
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/power-management.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/pulseaudio.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
with pkgs;
let
+2 -2
nixos/modules/config/shells-environment.nix
···
# This module defines a global environment configuration and
# a common configuration for all shells.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/swap.nix
···
-
{ config, pkgs, utils, ... }:
+
{ config, lib, pkgs, utils, ... }:
-
with pkgs.lib;
+
with lib;
with utils;
{
+2 -2
nixos/modules/config/sysctl.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/system-path.nix
···
# This module defines the packages that appear in
# /run/current-system/sw.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/config/timezone.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/config/unix-odbc-drivers.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
# unixODBC drivers (this solution is not perfect.. Because the user has to
# ask the admin to add a driver.. but it's simple and works
+2 -2
nixos/modules/config/users-groups.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/hardware/all-firmware.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/hardware/cpu/amd-microcode.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/hardware/cpu/intel-microcode.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/hardware/network/b43.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let kernelVersion = config.boot.kernelPackages.kernel.version; in
+2 -2
nixos/modules/hardware/pcmcia.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/hardware/video/bumblebee.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let kernel = config.boot.kernelPackages; in
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/installer/cd-dvd/channel.nix
···
# Provide an initial copy of the NixOS channel so that the user
# doesn't need to run "nix-channel --update" first.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-base.nix
···
# This module contains the basic configuration for building a NixOS
# installation CD.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
imports =
+2 -2
nixos/modules/installer/cd-dvd/installation-cd-graphical.nix
···
# This module defines a NixOS installation CD that contains X11 and
# KDE 4.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
imports = [ ./installation-cd-base.nix ../../profiles/graphical.nix ];
+2 -2
nixos/modules/installer/cd-dvd/iso-image.nix
···
# configuration. The derivation for the ISO image will be placed in
# config.system.build.isoImage.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-fuloong2f.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-pc.nix
···
# This module contains the basic configuration for building a NixOS
# tarball, that can directly boot, maybe using PXE or unpacking on a fs.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/cd-dvd/system-tarball-sheevaplug.nix
···
# This module contains the basic configuration for building a NixOS
# tarball for the sheevaplug.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/cd-dvd/system-tarball.nix
···
# configuration. The derivation for the ISO image will be placed in
# config.system.build.tarball.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/scan/detected.nix
···
# List all devices which are detected by nixos-hardware-scan.
# Common devices are enabled by default.
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
config = mkDefault {
+2 -2
nixos/modules/installer/scan/not-detected.nix
···
# List all devices which are _not_ detected by nixos-hardware-scan.
# Common devices are enabled by default.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
hardware.enableAllFirmware = true;
+2 -2
nixos/modules/installer/tools/nixos-checkout.nix
···
# This module generates the nixos-checkout script, which replaces the
# Nixpkgs source trees in /etc/nixos/nixpkgs with a Git checkout.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/installer/tools/tools.nix
···
/*
options = {
-
installer.enableGraphicalTools = pkgs.lib.mkOption {
+
installer.enableGraphicalTools = mkOption {
default = false;
-
type = with pkgs.lib.types; bool;
+
type = types.bool;
example = true;
description = ''
Enable the installation of graphical tools.
+2 -2
nixos/modules/installer/virtualbox-demo.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
imports =
+2 -2
nixos/modules/misc/assertions.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/misc/check-config.nix
···
-
{ pkgs, ... }:
+
{ lib, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/misc/crashdump.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
crashdump = config.boot.crashDump;
+2 -2
nixos/modules/misc/locate.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/misc/nixpkgs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
isConfig = x:
+2 -2
nixos/modules/misc/version.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/profiles/clone-config.nix
···
-
{ config, pkgs, modules, ... }:
+
{ config, lib, pkgs, modules, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/profiles/headless.nix
···
# Common configuration for headless machines (e.g., Amazon EC2
# instances).
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
sound.enable = false;
+3 -3
nixos/modules/profiles/installation-device.nix
···
# Provide a basic configuration for installation devices like CDs.
-
{ config, pkgs, modules, ... }:
+
{ config, lib, ... }:
-
with pkgs.lib;
+
with lib;
{
imports =
···
# Enable wpa_supplicant, but don't start it by default.
networking.wireless.enable = true;
-
jobs.wpa_supplicant.startOn = pkgs.lib.mkOverride 50 "";
+
jobs.wpa_supplicant.startOn = mkOverride 50 "";
# Tell the Nix evaluator to garbage collect more aggressively.
# This is desirable in memory-constrained environments that don't
+2 -2
nixos/modules/programs/atop.nix
···
# Global configuration for atop.
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.programs.atop;
+2 -2
nixos/modules/programs/bash/bash.nix
···
# This module defines global configuration for the Bash shell, in
# particular /etc/bashrc and /etc/profile.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/bash/command-not-found.nix
···
# SQLite database that maps program names to Nix package names (e.g.,
# "pdflatex" is mapped to "tetex").
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/environment.nix
···
# Most of the stuff here should probably be moved elsewhere sometime.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/shadow.nix
···
# Configuration for the pwdutils suite of tools: passwd, useradd, etc.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/shell.nix
···
# This module defines a standard configuration for NixOS shells.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/ssh.nix
···
# Global configuration for the SSH client.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.programs.ssh;
cfgd = config.services.openssh;
+2 -2
nixos/modules/programs/ssmtp.nix
···
# directly to an SMTP server defined in its configuration file, wihout
# queueing mail locally.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/venus.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.venus;
+2 -2
nixos/modules/programs/virtualbox.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let virtualbox = config.boot.kernelPackages.virtualbox; in
+2 -2
nixos/modules/programs/wvdial.nix
···
# Global configuration for wvdial.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/programs/zsh/zsh.nix
···
# This module defines global configuration for the zshell.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/rename.nix
···
-
{ config, pkgs, options, ... }:
+
{ config, lib, options, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/security/apparmor-suid.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
let
cfg = config.security.apparmor;
in
-
with pkgs.lib;
+
with lib;
{
options.security.apparmor.confineSUIDApplications = mkOption {
+2 -2
nixos/modules/security/apparmor.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
let
cfg = config.security.apparmor;
in
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/security/ca.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/security/duosec.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.security.duosec;
+2 -2
nixos/modules/security/grsecurity.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.security.grsecurity;
+2 -2
nixos/modules/security/pam.nix
···
# This module provides configuration for the PAM (Pluggable
# Authentication Modules) system.
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/security/pam_usb.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/security/polkit.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/security/prey.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.prey;
+2 -2
nixos/modules/security/rngd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/security/rtkit.nix
···
# A module for ‘rtkit’, a DBus system service that hands out realtime
# scheduling priority to processes that ask for it.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/security/setuid-wrappers.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/security/sudo.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/amqp/activemq/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
with pkgs;
let
+2 -2
nixos/modules/services/amqp/rabbitmq.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.rabbitmq;
+2 -2
nixos/modules/services/audio/alsa.nix
···
# ALSA sound support.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/audio/fuppes.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.fuppesd;
in
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/services/audio/mpd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/backup/almir.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.almir;
+2 -2
nixos/modules/services/backup/bacula.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
# TODO: test configuration when building nixexpr (use -t parameter)
# TODO: support sqlite3 (it's deprecate?) and mysql
-
with pkgs.lib;
+
with lib;
let
libDir = "/var/lib/bacula";
+2 -2
nixos/modules/services/backup/mysql-backup.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/backup/postgresql-backup.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
inherit (pkgs) postgresql gzip;
+2 -2
nixos/modules/services/backup/rsnapshot.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.rsnapshot;
in
+2 -2
nixos/modules/services/backup/sitecopy-backup.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
inherit (pkgs) sitecopy;
+2 -2
nixos/modules/services/backup/tarsnap.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.tarsnap;
+2 -2
nixos/modules/services/continuous-integration/jenkins/default.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.jenkins;
in {
+2 -2
nixos/modules/services/continuous-integration/jenkins/slave.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.jenkinsSlave;
masterCfg = config.services.jenkins;
+2 -2
nixos/modules/services/databases/4store-endpoint.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.fourStoreEndpoint;
endpointUser = "fourstorehttp";
run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${endpointUser} -c";
in
-
with pkgs.lib;
+
with lib;
{
###### interface
+2 -2
nixos/modules/services/databases/4store.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.fourStore;
stateDir = "/var/lib/4store";
fourStoreUser = "fourstore";
run = "${pkgs.su}/bin/su -s ${pkgs.stdenv.shell} ${fourStoreUser}";
in
-
with pkgs.lib;
+
with lib;
{
###### interface
+3 -2
nixos/modules/services/databases/couchdb.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
+
with lib;
let
cfg = config.services.couchdb;
+2 -2
nixos/modules/services/databases/firebird.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
# TODO: This may file may need additional review, eg which configuartions to
# expose to the user.
···
# Eg superserver is said to be most efficiently using resources according to
# http://www.firebirdsql.org/manual/qsg25-classic-or-super.html
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/memcached.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/monetdb.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.monetdb;
monetdbUser = "monetdb";
in
-
with pkgs.lib;
+
with lib;
{
###### interface
+2 -2
nixos/modules/services/databases/mongodb.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/mysql.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/openldap.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/postgresql.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/databases/redis.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.redis;
+2 -2
nixos/modules/services/databases/virtuoso.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.virtuoso;
virtuosoUser = "virtuoso";
stateDir = "/var/lib/virtuoso";
in
-
with pkgs.lib;
+
with lib;
{
###### interface
+2 -2
nixos/modules/services/desktops/accountservice.nix
···
# AccountsService daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/desktops/gnome3/at-spi2-core.nix
···
# at-spi2-core daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/desktops/gnome3/evolution-data-server.nix
···
# Evolution Data Server daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/desktops/gnome3/sushi.nix
···
# GNOME Sushi daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/desktops/telepathy.nix
···
# Telepathy daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/games/ghost-one.nix
···
-
{pkgs, config, ...}:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.ghostOne;
+2 -2
nixos/modules/services/games/minecraft-server.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.minecraft-server;
+2 -2
nixos/modules/services/hardware/acpid.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/hardware/bluetooth.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/hardware/pcscd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfgFile = pkgs.writeText "reader.conf" "";
in
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/hardware/pommed.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/hardware/sane.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/hardware/thinkfan.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/hardware/udev.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/hardware/udisks.nix
···
# Udisks daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/hardware/udisks2.nix
···
# Udisks daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/hardware/upower.nix
···
# Upower daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/logging/klogd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
###### interface
+2 -2
nixos/modules/services/logging/logcheck.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.logcheck;
+2 -2
nixos/modules/services/logging/logrotate.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.logrotate;
+2 -2
nixos/modules/services/logging/logstash.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.logstash;
+2 -2
nixos/modules/services/logging/rsyslogd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/logging/syslogd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/mail/dovecot.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/mail/freepops.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.mail.freepopsd;
+2 -2
nixos/modules/services/mail/mail.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/mail/opensmtpd.nix
···
-
{ pkgs, config, ... }:
+
{ config, lib, pkgs, ... }:
with pkgs;
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/mail/postfix.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/mail/spamassassin.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/autofs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/cgminer.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.cgminer;
+2 -2
nixos/modules/services/misc/dictd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/misc/disnix.nix
···
# Disnix server
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/felix.nix
···
# Felix server
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/folding-at-home.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
stateDir = "/var/lib/foldingathome";
cfg = config.services.foldingAtHome;
+2 -2
nixos/modules/services/misc/gpsd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/nix-daemon.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/nix-gc.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.nix.gc;
+2 -2
nixos/modules/services/misc/nixos-manual.nix
···
# of the virtual consoles. The latter is useful for the installation
# CD.
-
{ config, pkgs, baseModules, ... } @ extraArgs:
+
{ config, lib, pkgs, baseModules, ... } @ extraArgs:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/rippled.nix
···
# configuration building is commented out until better tested.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.rippled;
+2 -2
nixos/modules/services/misc/rogue.nix
···
# Execute the game `rogue' on tty 9. Mostly used by the NixOS
# installation CD.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/svnserve.nix
···
# SVN server
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/misc/synergy.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/monitoring/apcupsd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.apcupsd;
+2 -2
nixos/modules/services/monitoring/dd-agent.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.dd-agent;
+2 -2
nixos/modules/services/monitoring/graphite.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.graphite;
+2 -2
nixos/modules/services/monitoring/munin.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
# TODO: support munin-async
# TODO: LWP/Pg perl libs aren't recognized
···
# nginx http://munin.readthedocs.org/en/latest/example/webserver/nginx.html
-
with pkgs.lib;
+
with lib;
let
nodeCfg = config.services.munin-node;
+2 -2
nixos/modules/services/monitoring/nagios/default.nix
···
# Nagios system/network monitoring daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/monitoring/smartd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/monitoring/statsd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/monitoring/systemhealth.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.systemhealth;
+2 -2
nixos/modules/services/monitoring/ups.nix
···
-
{config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
# TODO: This is not secure, have a look at the file docs/security.txt inside
# the project sources.
-
with pkgs.lib;
+
with lib;
let
cfg = config.power.ups;
+2 -2
nixos/modules/services/monitoring/zabbix-agent.nix
···
# Zabbix agent daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/monitoring/zabbix-server.nix
···
# Zabbix server daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/network-filesystems/drbd.nix
···
# Support for DRBD, the Distributed Replicated Block Device.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.drbd; in
+2 -2
nixos/modules/services/network-filesystems/nfsd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/network-filesystems/samba.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/amuled.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.amule;
+2 -2
nixos/modules/services/networking/avahi-daemon.nix
···
# Avahi daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/bind.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/bitlbee.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+3 -3
nixos/modules/services/networking/btsync.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.btsync;
···
optionalString (e ? "knownHosts")
(concatStringsSep "," (map (v: "\"${v}\"") e."knownHosts"));
-
sharedFoldersRecord = with pkgs.lib;
+
sharedFoldersRecord =
concatStringsSep "," (map (entry:
let helper = attr: v:
if (entry ? attr) then boolStr entry.attr else boolStr v;
+2 -2
nixos/modules/services/networking/chrony.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/cjdns.nix
···
# (without too much shell hackery), a skeleton of the
# configuration building lies commented out.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+3 -3
nixos/modules/services/networking/cntlm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
···
password = mkOption {
default = "/etc/cntlm.password";
-
type = with pkgs.lib.types; string;
+
type = types.str;
description = ''Proxy account password. Note: use chmod 0600 on /etc/cntlm.password for security.'';
};
+2 -2
nixos/modules/services/networking/connman.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
with pkgs;
let
+2 -2
nixos/modules/services/networking/dhcpcd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/dhcpd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/dnsmasq.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.dnsmasq;
+2 -2
nixos/modules/services/networking/ejabberd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/firewall.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/flashpolicyd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/freenet.nix
···
# NixOS module for Freenet daemon
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/git-daemon.nix
···
-
{pkgs, config, ...}:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.gitDaemon;
+2 -2
nixos/modules/services/networking/gnunet.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/gogoclient.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.gogoclient;
in
+2 -2
nixos/modules/services/networking/haproxy.nix
···
-
{ config, pkgs, ...}:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.haproxy;
haproxyCfg = pkgs.writeText "haproxy.conf" cfg.config;
in
-
with pkgs.lib;
+
with lib;
{
options = {
services.haproxy = {
+2 -2
nixos/modules/services/networking/hostapd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
# TODO:
#
···
# wpa_supplicant and hostapd on the same wireless interface doesn't make any sense
# perhaps an assertion that there is a dhcp server and a dns server on the IP address serviced by the hostapd?
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/ifplugd.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/iodined.nix
···
# NixOS module for iodine, ip over dns daemon
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.iodined;
+2 -2
nixos/modules/services/networking/ircd-hybrid/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/kippo.nix
···
# iptables -t nat -A PREROUTING -i IN_IFACE -p tcp --dport 22 -j REDIRECT --to-port 2222'';
#
# Lastly: use this service at your own risk. I am working on a way to run this inside a VM.
-
{ pkgs, config, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.kippo;
in
+2 -2
nixos/modules/services/networking/minidlna.nix
···
# Module for MiniDLNA, a simple DLNA server.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/murmur.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.murmur;
+2 -2
nixos/modules/services/networking/nat.nix
···
# XXX: todo: support multiple upstream links
# see http://yesican.chsoft.biz/lartc/MultihomedLinuxNetworking.html
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/networkmanager.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
with pkgs;
let
+2 -2
nixos/modules/services/networking/notbit.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
let
cfg = config.services.notbit;
···
};
in
-
with pkgs.lib;
+
with lib;
{
### configuration
+2 -2
nixos/modules/services/networking/ntopng.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/ntpd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/oidentd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/networking/openfire.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/openvpn.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/prayer.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/privoxy.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/quassel.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
quassel = pkgs.kde4.quasselDaemon;
+2 -2
nixos/modules/services/networking/radvd.nix
···
# Module for the IPv6 Router Advertisement Daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/rdnssd.nix
···
# Module for rdnssd, a daemon that configures DNS servers in
# /etc/resolv/conf from IPv6 RDNSS advertisements.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/networking/rpcbind.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/sabnzbd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/searx.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/ssh/lshd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/ssh/sshd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/supybot.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/syncthing.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/tcpcrypt.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/tftpd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/networking/unbound.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/vsftpd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/wakeonlan.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
interfaces = config.services.wakeonlan.interfaces;
+2 -2
nixos/modules/services/networking/websockify.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.networking.websockify; in {
options = {
+2 -2
nixos/modules/services/networking/wicd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/networking/wpa_supplicant.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/networking/xinetd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/printing/cupsd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/scheduling/atd.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/scheduling/cron.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/scheduling/fcron.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/search/elasticsearch.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.elasticsearch;
+2 -2
nixos/modules/services/search/solr.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/security/clamav.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
clamavUser = "clamav";
stateDir = "/var/lib/clamav";
+2 -2
nixos/modules/services/security/fail2ban.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/security/fprot.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
fprotUser = "fprot";
stateDir = "/var/lib/fprot";
+2 -2
nixos/modules/services/security/haveged.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/security/tor.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/security/torify.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.tor;
+2 -2
nixos/modules/services/security/torsocks.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.tor;
+2 -2
nixos/modules/services/system/dbus.nix
···
# D-Bus configuration and system bus daemon.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/system/nscd.nix
···
-
{pkgs, config, ...}:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/torrent/deluge.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.deluge;
+2 -2
nixos/modules/services/torrent/transmission.nix
···
# NixOS module for Transmission BitTorrent daemon
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/ttys/agetty.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/ttys/gpm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+5 -5
nixos/modules/services/web-servers/apache-httpd/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
···
options = {};
documentRoot = null;
};
-
res = defaults // svcFunction { inherit config pkgs serverInfo php; };
+
res = defaults // svcFunction { inherit config lib pkgs serverInfo php; };
in res;
in map f defs;
···
virtualHosts = mkOption {
type = types.listOf (types.submodule (
{ options = import ./per-server-options.nix {
-
inherit pkgs;
+
inherit lib;
forMainServer = false;
};
}));
···
# Include the options shared between the main server and virtual hosts.
// (import ./per-server-options.nix {
-
inherit pkgs;
+
inherit lib;
forMainServer = true;
});
+2 -2
nixos/modules/services/web-servers/apache-httpd/mediawiki.nix
···
-
{ config, pkgs, serverInfo, php, ... }:
+
{ config, lib, pkgs, serverInfo, php, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/web-servers/apache-httpd/per-server-options.nix
···
# has additional options that affect the web server as a whole, like
# the user/group to run under.)
-
{ forMainServer, pkgs }:
+
{ forMainServer, lib }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/services/web-servers/apache-httpd/trac.nix
···
-
{ config, pkgs, serverInfo, ... }:
+
{ config, lib, pkgs, serverInfo, ... }:
-
with pkgs.lib;
+
with lib;
let
+7 -5
nixos/modules/services/web-servers/apache-httpd/zabbix.nix
···
-
{ config, pkgs, serverInfo, ... }:
+
{ config, lib, pkgs, serverInfo, ... }:
+
+
with lib;
let
···
options = {
-
urlPrefix = pkgs.lib.mkOption {
+
urlPrefix = mkOption {
default = "/zabbix";
description = "
The URL prefix under which the Zabbix service appears.
···
";
};
-
configFile = pkgs.lib.mkOption {
+
configFile = mkOption {
default = null;
-
type = with pkgs.lib.types; nullOr path;
+
type = types.nullOr types.path;
description = ''
The configuration file (zabbix.conf.php) which contains the database
connection settings. If not set, the configuration settings will created
···
'';
};
-
stateDir = pkgs.lib.mkOption {
+
stateDir = mkOption {
default = "/var/lib/zabbix/frontend";
description = "
Directory where the dynamically generated configuration data
+2 -2
nixos/modules/services/web-servers/jboss/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/web-servers/lighttpd/cgit.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.lighttpd.cgit;
+2 -2
nixos/modules/services/web-servers/lighttpd/default.nix
···
# NixOS module for lighttpd web server
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/web-servers/lighttpd/gitweb.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.lighttpd.gitweb;
+2 -2
nixos/modules/services/web-servers/nginx/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.nginx;
+2 -2
nixos/modules/services/web-servers/phpfpm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.phpfpm;
+2 -2
nixos/modules/services/web-servers/tomcat.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/web-servers/varnish/default.nix
···
-
{ config, pkgs, ...}:
+
{ config, lib, pkgs, ...}:
let
cfg = config.services.varnish;
in
-
with pkgs.lib;
+
with lib;
{
options = {
services.varnish = {
+2 -2
nixos/modules/services/web-servers/winstone.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/web-servers/zope2.nix
···
-
{ pkgs, config, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/desktop-managers/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/desktop-managers/e17.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/desktop-managers/gnome3.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.xserver.desktopManager.gnome3;
+2 -2
nixos/modules/services/x11/desktop-managers/kde4.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/desktop-managers/xbmc.nix
···
-
{ pkgs, config, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.xserver.desktopManager.xbmc;
+2 -2
nixos/modules/services/x11/desktop-managers/xfce.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/desktop-managers/xterm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/display-managers/auto.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/display-managers/default.nix
···
# (e.g., KDE, Gnome or a plain xterm), and optionally the *window
# manager* (e.g. kwin or twm).
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/display-managers/kdm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/display-managers/lightdm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/display-managers/slim.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/hardware/multitouch.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.xserver.multitouch; in
+2 -2
nixos/modules/services/x11/hardware/synaptics.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let cfg = config.services.xserver.synaptics;
tapConfig = if cfg.tapButtons then enabledTapConfig else disabledTapConfig;
+2 -2
nixos/modules/services/x11/hardware/wacom.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/redshift.nix
···
-
{ config, pkgs, ... }:
-
with pkgs.lib;
+
{ config, lib, pkgs, ... }:
+
with lib;
let
cfg = config.services.redshift;
+2 -2
nixos/modules/services/x11/terminal-server.nix
···
# not, a X server (Xvfb) is started for that user. The Xvfb instances
# persist across VNC sessions.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/awesome.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/compiz.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/default.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.xserver.windowManager;
+2 -2
nixos/modules/services/x11/window-managers/herbstluftwm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.xserver.windowManager.herbstluftwm;
+2 -2
nixos/modules/services/x11/window-managers/i3.nix
···
-
{ pkgs, config, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.services.xserver.windowManager.i3;
+2 -2
nixos/modules/services/x11/window-managers/icewm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/metacity.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/twm.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/window-managers/wmii.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/xfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/services/x11/xserver.nix
···
-
{ config, pkgs, pkgs_i686, ... }:
+
{ config, lib, pkgs, pkgs_i686, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/activation/activation-script.nix
···
# generate the script used to activate the configuration.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/activation/no-clone.nix
···
-
{pkgs, ...}:
+
{ lib, ... }:
-
with pkgs.lib;
+
with lib;
{
boot.loader.grub.device = mkOverride 0 "nodev";
+3 -3
nixos/modules/system/activation/top-level.nix
···
-
{ config, pkgs, modules, baseModules, ... }:
+
{ config, lib, pkgs, modules, baseModules, ... }:
-
with pkgs.lib;
+
with lib;
let
···
# you can provide an easy way to boot the same configuration
# as you use, but with another kernel
# !!! fix this
-
cloner = inheritParent: list: with pkgs.lib;
+
cloner = inheritParent: list:
map (childConfig:
(import ../../../lib/eval-config.nix {
inherit baseModules;
+2 -2
nixos/modules/system/boot/kernel.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/loader/efi.nix
···
-
{ pkgs, ... }:
+
{ lib, ... }:
-
with pkgs.lib;
+
with lib;
{
options.boot.loader.efi = {
+2 -2
nixos/modules/system/boot/loader/generations-dir/generations-dir.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/loader/grub/grub.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/loader/grub/memtest.nix
···
# This module adds Memtest86+ to the GRUB boot menu.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
memtest86 = pkgs.memtest86plus;
+2 -2
nixos/modules/system/boot/loader/gummiboot/gummiboot.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
cfg = config.boot.loader.gummiboot;
+2 -2
nixos/modules/system/boot/loader/init-script/init-script.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/luksroot.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
luks = config.boot.initrd.luks;
+2 -2
nixos/modules/system/boot/modprobe.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/system/boot/shutdown.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
+2 -2
nixos/modules/system/boot/stage-1.nix
···
# the modules necessary to mount the root file system, then calls the
# init in the root file system to start the second boot stage.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/stage-2.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/system/boot/systemd-unit-options.nix
···
-
{ config, pkgs }:
+
{ config, lib }:
-
with pkgs.lib;
+
with lib;
let
+3 -3
nixos/modules/system/boot/systemd.nix
···
-
{ config, pkgs, utils, ... }:
+
{ config, lib, pkgs, utils, ... }:
-
with pkgs.lib;
+
with lib;
with utils;
-
with import ./systemd-unit-options.nix { inherit config pkgs; };
+
with import ./systemd-unit-options.nix { inherit config lib; };
let
+2 -2
nixos/modules/system/etc/etc.nix
···
# Management of static files in /etc.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+3 -3
nixos/modules/system/upstart/upstart.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
-
with import ../boot/systemd-unit-options.nix { inherit config pkgs; };
+
with lib;
+
with import ../boot/systemd-unit-options.nix { inherit config lib; };
let
+2 -2
nixos/modules/tasks/cpu-freq.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
###### interface
+2 -2
nixos/modules/tasks/filesystems.nix
···
-
{ config, pkgs, utils, ... }:
+
{ config, lib, pkgs, utils, ... }:
-
with pkgs.lib;
+
with lib;
with utils;
let
+2 -2
nixos/modules/tasks/filesystems/btrfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/filesystems/nfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/filesystems/reiserfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/filesystems/vfat.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/filesystems/xfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
#
# todo:
# - crontab for scrubs, etc
···
# - /etc/zfs/zpool.cache handling
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/kbd.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/tasks/network-interfaces.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/testing/service-runner.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/testing/test-instrumentation.nix
···
# This module allows the test driver to connect to the virtual machine
# via a root shell attached to port 514.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let kernel = config.boot.kernelPackages.kernel; in
+2 -2
nixos/modules/virtualisation/amazon-image.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
imports = [ ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/containers.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/virtualisation/ec2-data.nix
···
# host name of virtual machines running on Amazon EC2, Eucalyptus and
# OpenStack Compute (Nova).
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
options = {
+2 -2
nixos/modules/virtualisation/google-compute-image.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
diskSize = "100G";
in
+2 -2
nixos/modules/virtualisation/libvirtd.nix
···
# Systemd services for libvirtd.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/virtualisation/nixos-container.pl
···
my ($nixosConfigFile) = @_;
my $nixosConfig = <<EOF;
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{ boot.isContainer = true;
security.initialRootPassword = mkDefault "!";
+2 -2
nixos/modules/virtualisation/nova-image.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
imports = [ ../profiles/qemu-guest.nix ../profiles/headless.nix ./ec2-data.nix ];
+2 -2
nixos/modules/virtualisation/nova.nix
···
# Module for Nova, a.k.a. OpenStack Compute.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/virtualisation/qemu-vm.nix
···
# the VM in the host. On the other hand, the root filesystem is a
# read/writable disk image persistent across VM reboots.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/virtualisation/virtualbox-guest.nix
···
# Module for VirtualBox guests.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let
+2 -2
nixos/modules/virtualisation/virtualbox-image.nix
···
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
{
system.build.virtualBoxImage =
+2 -2
nixos/modules/virtualisation/xen-dom0.nix
···
# Xen hypervisor (Dom0) support.
-
{ config, pkgs, ... }:
+
{ config, lib, pkgs, ... }:
-
with pkgs.lib;
+
with lib;
let