treewide: remove redundant quotes

volth 35d68ef1 fe9c9f71

Changed files
+860 -860
doc
lib
nixos
lib
modules
config
hardware
misc
programs
security
services
system
tasks
virtualisation
tests
pkgs
applications
editors
kde
misc
taskjuggler
networking
browsers
firefox-bin
tor-browser-bundle-bin
dropbox
instant-messengers
wire-desktop
p2p
soulseekqt
remote
anydesk
resilio-sync
radio
gnuradio
science
logic
math
nauty
video
virtualization
window-managers
stumpwm
way-cooler
build-support
bintools-wrapper
fetchdocker
rust
build-rust-crate
data
fonts
desktops
pantheon
plasma-5
development
androidndk-pkgs
compilers
coq-modules
QuickChick
Velisarios
bignums
category-theory
contribs
coq-elpi
coq-ext-lib
coq-haskell
coqhammer
coqprime
dpdgraph
equations
ltac2
mathcomp
paramcoq
interpreters
libraries
fflas-ffpack
g2o
givaro
java
kde-frameworks
linbox
openssl
oracle-instantclient
qt-5
science
math
tensorflow
v8
mobile
node-packages
ocaml-modules
labltk
lwt
ppx_tools
python-modules
numpy
spacy
ruby-modules
bundled-common
bundler-env
tools
build-managers
bazel
meson
misc
ocaml
camlp4
js_of_ocaml
selenium
chromedriver
web
remarkjs
games
dwarf-fortress
misc
base16-builder
drivers
vim-plugins
vscode-extensions
python
os-specific
bsd
netbsd
darwin
xcode
linux
kernel
servers
nosql
arangodb
search
elasticsearch
web-apps
stdenv
tools
admin
pulumi
backup
lvmsync
bootloaders
refind
misc
grub
networking
airfield
envoy
s6-networking
package-management
nixui
security
bitwarden
bitwarden-cli
vault
typesetting
kindlegen
tex
texlive
top-level
+2 -2
doc/doc-support/lib-function-locations.nix
···
builtins.map
(subsetname: {
subsetname = subsetname;
-
functions = libDefPos toplib."${subsetname}";
})
(builtins.filter
-
(name: builtins.isAttrs toplib."${name}")
(builtins.attrNames toplib));
nixpkgsLib = pkgs.lib;
···
builtins.map
(subsetname: {
subsetname = subsetname;
+
functions = libDefPos toplib.${subsetname};
})
(builtins.filter
+
(name: builtins.isAttrs toplib.${name})
(builtins.attrNames toplib));
nixpkgsLib = pkgs.lib;
+2 -2
lib/lists.nix
···
if length list < 2
then # finish
{ result = list; }
-
else if dfsthis ? "cycle"
then # there's a cycle, starting from the current vertex, return it
{ cycle = reverseList ([ dfsthis.cycle ] ++ dfsthis.visited);
inherit (dfsthis) loops; }
-
else if toporest ? "cycle"
then # there's a cycle somewhere else in the graph, return it
toporest
# Slow, but short. Can be made a bit faster with an explicit stack.
···
if length list < 2
then # finish
{ result = list; }
+
else if dfsthis ? cycle
then # there's a cycle, starting from the current vertex, return it
{ cycle = reverseList ([ dfsthis.cycle ] ++ dfsthis.visited);
inherit (dfsthis) loops; }
+
else if toporest ? cycle
then # there's a cycle somewhere else in the graph, return it
toporest
# Slow, but short. Can be made a bit faster with an explicit stack.
+11 -11
lib/systems/default.nix
···
uname = {
# uname -s
system = {
-
"linux" = "Linux";
-
"windows" = "Windows";
-
"darwin" = "Darwin";
-
"netbsd" = "NetBSD";
-
"freebsd" = "FreeBSD";
-
"openbsd" = "OpenBSD";
-
"wasi" = "Wasi";
}.${final.parsed.kernel.name} or null;
# uname -p
···
else if final.isx86_64 then "x86_64"
else if final.isx86 then "i386"
else {
-
"powerpc" = "ppc";
-
"powerpcle" = "ppc";
-
"powerpc64" = "ppc64";
-
"powerpc64le" = "ppc64le";
}.${final.parsed.cpu.name} or final.parsed.cpu.name;
emulator = pkgs: let
···
uname = {
# uname -s
system = {
+
linux = "Linux";
+
windows = "Windows";
+
darwin = "Darwin";
+
netbsd = "NetBSD";
+
freebsd = "FreeBSD";
+
openbsd = "OpenBSD";
+
wasi = "Wasi";
}.${final.parsed.kernel.name} or null;
# uname -p
···
else if final.isx86_64 then "x86_64"
else if final.isx86 then "i386"
else {
+
powerpc = "ppc";
+
powerpcle = "ppc";
+
powerpc64 = "ppc64";
+
powerpc64le = "ppc64le";
}.${final.parsed.cpu.name} or final.parsed.cpu.name;
emulator = pkgs: let
+11 -11
lib/systems/platforms.nix
···
};
selectBySystem = system: {
-
"i486-linux" = pc32;
-
"i586-linux" = pc32;
-
"i686-linux" = pc32;
-
"x86_64-linux" = pc64;
-
"armv5tel-linux" = sheevaplug;
-
"armv6l-linux" = raspberrypi;
-
"armv7a-linux" = armv7l-hf-multiplatform;
-
"armv7l-linux" = armv7l-hf-multiplatform;
-
"aarch64-linux" = aarch64-multiplatform;
-
"mipsel-linux" = fuloong2f_n32;
-
"powerpc64le-linux" = powernv;
}.${system} or pcBase;
}
···
};
selectBySystem = system: {
+
i486-linux = pc32;
+
i586-linux = pc32;
+
i686-linux = pc32;
+
x86_64-linux = pc64;
+
armv5tel-linux = sheevaplug;
+
armv6l-linux = raspberrypi;
+
armv7a-linux = armv7l-hf-multiplatform;
+
armv7l-linux = armv7l-hf-multiplatform;
+
aarch64-linux = aarch64-multiplatform;
+
mipsel-linux = fuloong2f_n32;
+
powerpc64le-linux = powernv;
}.${system} or pcBase;
}
+1 -1
lib/types.nix
···
# Default type functor
defaultFunctor = name: {
inherit name;
-
type = types."${name}" or null;
wrapped = null;
payload = null;
binOp = a: b: null;
···
# Default type functor
defaultFunctor = name: {
inherit name;
+
type = types.${name} or null;
wrapped = null;
payload = null;
binOp = a: b: null;
+4 -4
nixos/lib/qemu-flags.nix
···
else throw "Unknown QEMU serial device for system '${pkgs.stdenv.hostPlatform.system}'";
qemuBinary = qemuPkg: {
-
"x86_64-linux" = "${qemuPkg}/bin/qemu-kvm -cpu kvm64";
-
"armv7l-linux" = "${qemuPkg}/bin/qemu-system-arm -enable-kvm -machine virt -cpu host";
-
"aarch64-linux" = "${qemuPkg}/bin/qemu-system-aarch64 -enable-kvm -machine virt,gic-version=host -cpu host";
-
"x86_64-darwin" = "${qemuPkg}/bin/qemu-kvm -cpu kvm64";
}.${pkgs.stdenv.hostPlatform.system} or "${qemuPkg}/bin/qemu-kvm";
}
···
else throw "Unknown QEMU serial device for system '${pkgs.stdenv.hostPlatform.system}'";
qemuBinary = qemuPkg: {
+
x86_64-linux = "${qemuPkg}/bin/qemu-kvm -cpu kvm64";
+
armv7l-linux = "${qemuPkg}/bin/qemu-system-arm -enable-kvm -machine virt -cpu host";
+
aarch64-linux = "${qemuPkg}/bin/qemu-system-aarch64 -enable-kvm -machine virt,gic-version=host -cpu host";
+
x86_64-darwin = "${qemuPkg}/bin/qemu-kvm -cpu kvm64";
}.${pkgs.stdenv.hostPlatform.system} or "${qemuPkg}/bin/qemu-kvm";
}
+2 -2
nixos/modules/config/fonts/fontconfig-penultimate.nix
···
then "fontconfig"
else "fontconfig_${version}";
makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; };
-
cache = makeCache pkgs."${fcPackage}";
-
cache32 = makeCache pkgs.pkgsi686Linux."${fcPackage}";
in
pkgs.writeText "fc-00-nixos-cache.conf" ''
<?xml version='1.0'?>
···
then "fontconfig"
else "fontconfig_${version}";
makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; };
+
cache = makeCache pkgs.${fcPackage};
+
cache32 = makeCache pkgs.pkgsi686Linux.${fcPackage};
in
pkgs.writeText "fc-00-nixos-cache.conf" ''
<?xml version='1.0'?>
+1 -1
nixos/modules/config/fonts/fontconfig-ultimate.nix
···
config = mkIf (config.fonts.fontconfig.enable && cfg.enable) {
fonts.fontconfig.confPackages = [ confPkg ];
-
environment.variables."INFINALITY_FT" = cfg.preset;
};
···
config = mkIf (config.fonts.fontconfig.enable && cfg.enable) {
fonts.fontconfig.confPackages = [ confPkg ];
+
environment.variables.INFINALITY_FT = cfg.preset;
};
+2 -2
nixos/modules/config/fonts/fontconfig.nix
···
then "fontconfig"
else "fontconfig_${version}";
makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; };
-
cache = makeCache pkgs."${fcPackage}";
-
cache32 = makeCache pkgs.pkgsi686Linux."${fcPackage}";
in
pkgs.writeText "fc-00-nixos-cache.conf" ''
<?xml version='1.0'?>
···
then "fontconfig"
else "fontconfig_${version}";
makeCache = fontconfig: pkgs.makeFontsCache { inherit fontconfig; fontDirectories = config.fonts.fonts; };
+
cache = makeCache pkgs.${fcPackage};
+
cache32 = makeCache pkgs.pkgsi686Linux.${fcPackage};
in
pkgs.writeText "fc-00-nixos-cache.conf" ''
<?xml version='1.0'?>
+2 -2
nixos/modules/config/krb5/default.nix
···
realms = optionalAttrs (lib.all (value: value != null) [
cfg.defaultRealm cfg.kdc cfg.kerberosAdminServer
]) {
-
"${cfg.defaultRealm}" = {
kdc = cfg.kdc;
admin_server = cfg.kerberosAdminServer;
};
···
cfg.domainRealm cfg.defaultRealm
]) {
".${cfg.domainRealm}" = cfg.defaultRealm;
-
"${cfg.domainRealm}" = cfg.defaultRealm;
};
};
···
realms = optionalAttrs (lib.all (value: value != null) [
cfg.defaultRealm cfg.kdc cfg.kerberosAdminServer
]) {
+
${cfg.defaultRealm} = {
kdc = cfg.kdc;
admin_server = cfg.kerberosAdminServer;
};
···
cfg.domainRealm cfg.defaultRealm
]) {
".${cfg.domainRealm}" = cfg.defaultRealm;
+
${cfg.domainRealm} = cfg.defaultRealm;
};
};
+4 -4
nixos/modules/config/malloc.nix
···
# The set of alternative malloc(3) providers.
providers = {
-
"graphene-hardened" = rec {
libPath = "${pkgs.graphene-hardened-malloc}/lib/libhardened_malloc.so";
description = ''
An allocator designed to mitigate memory corruption attacks, such as
···
'';
};
-
"jemalloc" = {
libPath = "${pkgs.jemalloc}/lib/libjemalloc.so";
description = ''
A general purpose allocator that emphasizes fragmentation avoidance
···
'';
};
-
"scudo" = {
libPath = "${pkgs.llvmPackages.compiler-rt}/lib/linux/libclang_rt.scudo-x86_64.so";
description = ''
A user-mode allocator based on LLVM Sanitizer’s CombinedAllocator,
···
};
};
-
providerConf = providers."${cfg.provider}";
# An output that contains only the shared library, to avoid
# needlessly bloating the system closure
···
# The set of alternative malloc(3) providers.
providers = {
+
graphene-hardened = rec {
libPath = "${pkgs.graphene-hardened-malloc}/lib/libhardened_malloc.so";
description = ''
An allocator designed to mitigate memory corruption attacks, such as
···
'';
};
+
jemalloc = {
libPath = "${pkgs.jemalloc}/lib/libjemalloc.so";
description = ''
A general purpose allocator that emphasizes fragmentation avoidance
···
'';
};
+
scudo = {
libPath = "${pkgs.llvmPackages.compiler-rt}/lib/linux/libclang_rt.scudo-x86_64.so";
description = ''
A user-mode allocator based on LLVM Sanitizer’s CombinedAllocator,
···
};
};
+
providerConf = providers.${cfg.provider};
# An output that contains only the shared library, to avoid
# needlessly bloating the system closure
+4 -4
nixos/modules/config/networking.nix
···
environment.etc =
{ # /etc/services: TCP/UDP port assignments.
-
"services".source = pkgs.iana-etc + "/etc/services";
# /etc/protocols: IP protocol numbers.
-
"protocols".source = pkgs.iana-etc + "/etc/protocols";
# /etc/hosts: Hostname-to-IP mappings.
-
"hosts".text = let
oneToString = set: ip: ip + " " + concatStringsSep " " set.${ip};
allToString = set: concatMapStringsSep "\n" (oneToString set) (attrNames set);
in ''
···
} // optionalAttrs (pkgs.stdenv.hostPlatform.libc == "glibc") {
# /etc/rpc: RPC program numbers.
-
"rpc".source = pkgs.glibc.out + "/etc/rpc";
};
networking.proxy.envVars =
···
environment.etc =
{ # /etc/services: TCP/UDP port assignments.
+
services.source = pkgs.iana-etc + "/etc/services";
# /etc/protocols: IP protocol numbers.
+
protocols.source = pkgs.iana-etc + "/etc/protocols";
# /etc/hosts: Hostname-to-IP mappings.
+
hosts.text = let
oneToString = set: ip: ip + " " + concatStringsSep " " set.${ip};
allToString = set: concatMapStringsSep "\n" (oneToString set) (attrNames set);
in ''
···
} // optionalAttrs (pkgs.stdenv.hostPlatform.libc == "glibc") {
# /etc/rpc: RPC program numbers.
+
rpc.source = pkgs.glibc.out + "/etc/rpc";
};
networking.proxy.envVars =
+2 -2
nixos/modules/config/power-management.nix
···
};
# Service executed before suspending/hibernating.
-
systemd.services."pre-sleep" =
{ description = "Pre-Sleep Actions";
wantedBy = [ "sleep.target" ];
before = [ "sleep.target" ];
···
serviceConfig.Type = "oneshot";
};
-
systemd.services."post-resume" =
{ description = "Post-Resume Actions";
after = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" ];
script =
···
};
# Service executed before suspending/hibernating.
+
systemd.services.pre-sleep =
{ description = "Pre-Sleep Actions";
wantedBy = [ "sleep.target" ];
before = [ "sleep.target" ];
···
serviceConfig.Type = "oneshot";
};
+
systemd.services.post-resume =
{ description = "Post-Resume Actions";
after = [ "suspend.target" "hibernate.target" "hybrid-sleep.target" ];
script =
+2 -2
nixos/modules/config/shells-environment.nix
···
l = "ls -alh";
};
-
environment.etc."shells".text =
''
${concatStringsSep "\n" (map utils.toShellPath cfg.shells)}
/bin/sh
···
# For resetting environment with `. /etc/set-environment` when needed
# and discoverability (see motivation of #30418).
-
environment.etc."set-environment".source = config.system.build.setEnvironment;
system.build.setEnvironment = pkgs.writeText "set-environment"
''
···
l = "ls -alh";
};
+
environment.etc.shells.text =
''
${concatStringsSep "\n" (map utils.toShellPath cfg.shells)}
/bin/sh
···
# For resetting environment with `. /etc/set-environment` when needed
# and discoverability (see motivation of #30418).
+
environment.etc.set-environment.source = config.system.build.setEnvironment;
system.build.setEnvironment = pkgs.writeText "set-environment"
''
+1 -1
nixos/modules/config/terminfo.nix
···
"/share/terminfo"
];
-
environment.etc."terminfo" = {
source = "${config.system.path}/share/terminfo";
};
···
"/share/terminfo"
];
+
environment.etc.terminfo = {
source = "${config.system.path}/share/terminfo";
};
+2 -2
nixos/modules/config/users-groups.nix
···
environment.systemPackages = systemShells;
environment.etc = {
-
"subuid" = {
text = subuidFile;
mode = "0644";
};
-
"subgid" = {
text = subgidFile;
mode = "0644";
};
···
environment.systemPackages = systemShells;
environment.etc = {
+
subuid = {
text = subuidFile;
mode = "0644";
};
+
subgid = {
text = subgidFile;
mode = "0644";
};
+1 -1
nixos/modules/hardware/nitrokey.nix
···
{ inherit (cfg) group; }
))
];
-
users.groups."${cfg.group}" = {};
};
}
···
{ inherit (cfg) group; }
))
];
+
users.groups.${cfg.group} = {};
};
}
+1 -1
nixos/modules/hardware/video/ati.nix
···
boot.blacklistedKernelModules = [ "radeon" ];
-
environment.etc."ati".source = "${ati_x11}/etc/ati";
};
···
boot.blacklistedKernelModules = [ "radeon" ];
+
environment.etc.ati.source = "${ati_x11}/etc/ati";
};
+1 -1
nixos/modules/misc/version.nix
···
# Generate /etc/os-release. See
# https://www.freedesktop.org/software/systemd/man/os-release.html for the
# format.
-
environment.etc."os-release".text =
''
NAME=NixOS
ID=nixos
···
# Generate /etc/os-release. See
# https://www.freedesktop.org/software/systemd/man/os-release.html for the
# format.
+
environment.etc.os-release.text =
''
NAME=NixOS
ID=nixos
+1 -1
nixos/modules/programs/atop.nix
···
};
config = mkIf (cfg.settings != {}) {
-
environment.etc."atoprc".text =
concatStrings (mapAttrsToList (n: v: "${n} ${toString v}\n") cfg.settings);
};
}
···
};
config = mkIf (cfg.settings != {}) {
+
environment.etc.atoprc.text =
concatStrings (mapAttrsToList (n: v: "${n} ${toString v}\n") cfg.settings);
};
}
+3 -3
nixos/modules/programs/bash/bash.nix
···
};
-
environment.etc."profile".text =
''
# /etc/profile: DO NOT EDIT -- this file has been generated automatically.
# This file is read for login shells.
···
fi
'';
-
environment.etc."bashrc".text =
''
# /etc/bashrc: DO NOT EDIT -- this file has been generated automatically.
···
# Configuration for readline in bash. We use "option default"
# priority to allow user override using both .text and .source.
-
environment.etc."inputrc".source = mkOptionDefault ./inputrc;
users.defaultUserShell = mkDefault pkgs.bashInteractive;
···
};
+
environment.etc.profile.text =
''
# /etc/profile: DO NOT EDIT -- this file has been generated automatically.
# This file is read for login shells.
···
fi
'';
+
environment.etc.bashrc.text =
''
# /etc/bashrc: DO NOT EDIT -- this file has been generated automatically.
···
# Configuration for readline in bash. We use "option default"
# priority to allow user override using both .text and .source.
+
environment.etc.inputrc.source = mkOptionDefault ./inputrc;
users.defaultUserShell = mkDefault pkgs.bashInteractive;
+6 -6
nixos/modules/programs/less.nix
···
type = types.attrsOf types.str;
default = {};
example = {
-
"h" = "noaction 5\e(";
-
"l" = "noaction 5\e)";
};
description = "Defines new command keys.";
};
···
type = types.attrsOf types.str;
default = {};
example = {
-
"\e" = "abort";
};
description = "Defines new line-editing keys.";
};
···
environment.systemPackages = [ pkgs.less ];
environment.variables = {
-
"LESSKEY_SYSTEM" = toString lessKey;
} // optionalAttrs (cfg.lessopen != null) {
-
"LESSOPEN" = cfg.lessopen;
} // optionalAttrs (cfg.lessclose != null) {
-
"LESSCLOSE" = cfg.lessclose;
};
warnings = optional (
···
type = types.attrsOf types.str;
default = {};
example = {
+
h = "noaction 5\e(";
+
l = "noaction 5\e)";
};
description = "Defines new command keys.";
};
···
type = types.attrsOf types.str;
default = {};
example = {
+
e = "abort";
};
description = "Defines new line-editing keys.";
};
···
environment.systemPackages = [ pkgs.less ];
environment.variables = {
+
LESSKEY_SYSTEM = toString lessKey;
} // optionalAttrs (cfg.lessopen != null) {
+
LESSOPEN = cfg.lessopen;
} // optionalAttrs (cfg.lessclose != null) {
+
LESSCLOSE = cfg.lessclose;
};
warnings = optional (
+1 -1
nixos/modules/programs/nano.nix
···
###### implementation
config = lib.mkIf (cfg.nanorc != "" || cfg.syntaxHighlight) {
-
environment.etc."nanorc".text = lib.concatStrings [ cfg.nanorc
(lib.optionalString cfg.syntaxHighlight ''${LF}include "${pkgs.nano}/share/nano/*.nanorc"'') ];
};
···
###### implementation
config = lib.mkIf (cfg.nanorc != "" || cfg.syntaxHighlight) {
+
environment.etc.nanorc.text = lib.concatStrings [ cfg.nanorc
(lib.optionalString cfg.syntaxHighlight ''${LF}include "${pkgs.nano}/share/nano/*.nanorc"'') ];
};
+1 -1
nixos/modules/programs/npm.nix
···
###### implementation
config = lib.mkIf cfg.enable {
-
environment.etc."npmrc".text = cfg.npmrc;
environment.variables.NPM_CONFIG_GLOBALCONFIG = "/etc/npmrc";
···
###### implementation
config = lib.mkIf cfg.enable {
+
environment.etc.npmrc.text = cfg.npmrc;
environment.variables.NPM_CONFIG_GLOBALCONFIG = "/etc/npmrc";
+1 -1
nixos/modules/programs/screen.nix
···
###### implementation
config = mkIf (cfg.screenrc != "") {
-
environment.etc."screenrc".text = cfg.screenrc;
environment.systemPackages = [ pkgs.screen ];
};
···
###### implementation
config = mkIf (cfg.screenrc != "") {
+
environment.etc.screenrc.text = cfg.screenrc;
environment.systemPackages = [ pkgs.screen ];
};
+1 -1
nixos/modules/programs/xfs_quota.nix
···
description = "Setup of xfs_quota projects. Make sure the filesystem is mounted with the pquota option.";
example = {
-
"projname" = {
id = 50;
path = "/xfsprojects/projname";
sizeHardLimit = "50g";
···
description = "Setup of xfs_quota projects. Make sure the filesystem is mounted with the pquota option.";
example = {
+
projname = {
id = 50;
path = "/xfsprojects/projname";
sizeHardLimit = "50g";
+1 -1
nixos/modules/programs/xonsh.nix
···
config = mkIf cfg.enable {
-
environment.etc."xonshrc".text = cfg.config;
environment.systemPackages = [ cfg.package ];
···
config = mkIf cfg.enable {
+
environment.etc.xonshrc.text = cfg.config;
environment.systemPackages = [ cfg.package ];
+4 -4
nixos/modules/programs/zsh/zsh.nix
···
programs.zsh.shellAliases = mapAttrs (name: mkDefault) cfge.shellAliases;
-
environment.etc."zshenv".text =
''
# /etc/zshenv: DO NOT EDIT -- this file has been generated automatically.
# This file is read for all shells.
···
fi
'';
-
environment.etc."zprofile".text =
''
# /etc/zprofile: DO NOT EDIT -- this file has been generated automatically.
# This file is read for login shells.
···
fi
'';
-
environment.etc."zshrc".text =
''
# /etc/zshrc: DO NOT EDIT -- this file has been generated automatically.
# This file is read for interactive shells.
···
fi
'';
-
environment.etc."zinputrc".source = ./zinputrc;
environment.systemPackages = [ pkgs.zsh ]
++ optional cfg.enableCompletion pkgs.nix-zsh-completions;
···
programs.zsh.shellAliases = mapAttrs (name: mkDefault) cfge.shellAliases;
+
environment.etc.zshenv.text =
''
# /etc/zshenv: DO NOT EDIT -- this file has been generated automatically.
# This file is read for all shells.
···
fi
'';
+
environment.etc.zprofile.text =
''
# /etc/zprofile: DO NOT EDIT -- this file has been generated automatically.
# This file is read for login shells.
···
fi
'';
+
environment.etc.zshrc.text =
''
# /etc/zshrc: DO NOT EDIT -- this file has been generated automatically.
# This file is read for interactive shells.
···
fi
'';
+
environment.etc.zinputrc.source = ./zinputrc;
environment.systemPackages = [ pkgs.zsh ]
++ optional cfg.enableCompletion pkgs.nix-zsh-completions;
+2 -2
nixos/modules/security/acme.nix
···
})
);
-
systemd.targets."acme-selfsigned-certificates" = mkIf cfg.preliminarySelfsigned {};
-
systemd.targets."acme-certificates" = {};
})
];
···
})
);
+
systemd.targets.acme-selfsigned-certificates = mkIf cfg.preliminarySelfsigned {};
+
systemd.targets.acme-certificates = {};
})
];
+1 -1
nixos/modules/security/chromium-suid-sandbox.nix
···
config = mkIf cfg.enable {
environment.systemPackages = [ sandbox ];
-
security.wrappers."${sandbox.passthru.sandboxExecutableName}".source = "${sandbox}/bin/${sandbox.passthru.sandboxExecutableName}";
};
}
···
config = mkIf cfg.enable {
environment.systemPackages = [ sandbox ];
+
security.wrappers.${sandbox.passthru.sandboxExecutableName}.source = "${sandbox}/bin/${sandbox.passthru.sandboxExecutableName}";
};
}
+1 -1
nixos/modules/security/polkit.nix
···
security.wrappers = {
pkexec.source = "${pkgs.polkit.bin}/bin/pkexec";
-
"polkit-agent-helper-1".source = "${pkgs.polkit.out}/lib/polkit-1/polkit-agent-helper-1";
};
systemd.tmpfiles.rules = [
···
security.wrappers = {
pkexec.source = "${pkgs.polkit.bin}/bin/pkexec";
+
polkit-agent-helper-1.source = "${pkgs.polkit.out}/lib/polkit-1/polkit-agent-helper-1";
};
systemd.tmpfiles.rules = [
+1 -1
nixos/modules/security/prey.nix
···
let
cfg = config.services.prey;
-
myPrey = pkgs."prey-bash-client".override {
apiKey = cfg.apiKey;
deviceKey = cfg.deviceKey;
};
···
let
cfg = config.services.prey;
+
myPrey = pkgs.prey-bash-client.override {
apiKey = cfg.apiKey;
deviceKey = cfg.deviceKey;
};
+5 -5
nixos/modules/security/wrappers/default.nix
···
programs =
(lib.mapAttrsToList
-
(n: v: (if v ? "program" then v else v // {program=n;}))
wrappers);
securityWrapper = pkgs.stdenv.mkDerivation {
···
mkWrappedPrograms =
builtins.map
-
(s: if (s ? "capabilities")
then mkSetcapProgram
({ owner = "root";
group = "root";
} // s)
else if
-
(s ? "setuid" && s.setuid) ||
-
(s ? "setgid" && s.setgid) ||
-
(s ? "permissions")
then mkSetuidProgram s
else mkSetuidProgram
({ owner = "root";
···
programs =
(lib.mapAttrsToList
+
(n: v: (if v ? program then v else v // {program=n;}))
wrappers);
securityWrapper = pkgs.stdenv.mkDerivation {
···
mkWrappedPrograms =
builtins.map
+
(s: if (s ? capabilities)
then mkSetcapProgram
({ owner = "root";
group = "root";
} // s)
else if
+
(s ? setuid && s.setuid) ||
+
(s ? setgid && s.setgid) ||
+
(s ? permissions)
then mkSetuidProgram s
else mkSetuidProgram
({ owner = "root";
+1 -1
nixos/modules/services/audio/alsa.nix
···
boot.kernelModules = optional config.sound.enableOSSEmulation "snd_pcm_oss";
-
systemd.services."alsa-store" =
{ description = "Store Sound Card State";
wantedBy = [ "multi-user.target" ];
unitConfig.RequiresMountsFor = "/var/lib/alsa";
···
boot.kernelModules = optional config.sound.enableOSSEmulation "snd_pcm_oss";
+
systemd.services.alsa-store =
{ description = "Store Sound Card State";
wantedBy = [ "multi-user.target" ];
unitConfig.RequiresMountsFor = "/var/lib/alsa";
+2 -2
nixos/modules/services/backup/mysql-backup.nix
···
}];
systemd = {
-
timers."mysql-backup" = {
description = "Mysql backup timer";
wantedBy = [ "timers.target" ];
timerConfig = {
···
Unit = "mysql-backup.service";
};
};
-
services."mysql-backup" = {
description = "Mysql backup service";
enable = true;
serviceConfig = {
···
}];
systemd = {
+
timers.mysql-backup = {
description = "Mysql backup timer";
wantedBy = [ "timers.target" ];
timerConfig = {
···
Unit = "mysql-backup.service";
};
};
+
services.mysql-backup = {
description = "Mysql backup service";
enable = true;
serviceConfig = {
+1 -1
nixos/modules/services/backup/tsm.nix
···
config = mkIf cfg.enable {
inherit assertions;
programs.tsmClient.enable = true;
-
programs.tsmClient.servers."${cfg.servername}".passwdDir =
mkDefault "/var/lib/tsm-backup/password";
systemd.services.tsm-backup = {
description = "IBM Spectrum Protect (Tivoli Storage Manager) Backup";
···
config = mkIf cfg.enable {
inherit assertions;
programs.tsmClient.enable = true;
+
programs.tsmClient.servers.${cfg.servername}.passwdDir =
mkDefault "/var/lib/tsm-backup/password";
systemd.services.tsm-backup = {
description = "IBM Spectrum Protect (Tivoli Storage Manager) Backup";
+1 -1
nixos/modules/services/backup/zfs-replication.nix
···
pkgs.lz4
];
-
systemd.services."zfs-replication" = {
after = [
"zfs-snapshot-daily.service"
"zfs-snapshot-frequent.service"
···
pkgs.lz4
];
+
systemd.services.zfs-replication = {
after = [
"zfs-snapshot-daily.service"
"zfs-snapshot-frequent.service"
+1 -1
nixos/modules/services/backup/znapzend.nix
···
environment.systemPackages = [ pkgs.znapzend ];
systemd.services = {
-
"znapzend" = {
description = "ZnapZend - ZFS Backup System";
wantedBy = [ "zfs.target" ];
after = [ "zfs.target" ];
···
environment.systemPackages = [ pkgs.znapzend ];
systemd.services = {
+
znapzend = {
description = "ZnapZend - ZFS Backup System";
wantedBy = [ "zfs.target" ];
after = [ "zfs.target" ];
+2 -2
nixos/modules/services/cluster/hadoop/hdfs.nix
···
config = mkMerge [
(mkIf cfg.hdfs.namenode.enabled {
-
systemd.services."hdfs-namenode" = {
description = "Hadoop HDFS NameNode";
wantedBy = [ "multi-user.target" ];
···
};
})
(mkIf cfg.hdfs.datanode.enabled {
-
systemd.services."hdfs-datanode" = {
description = "Hadoop HDFS DataNode";
wantedBy = [ "multi-user.target" ];
···
config = mkMerge [
(mkIf cfg.hdfs.namenode.enabled {
+
systemd.services.hdfs-namenode = {
description = "Hadoop HDFS NameNode";
wantedBy = [ "multi-user.target" ];
···
};
})
(mkIf cfg.hdfs.datanode.enabled {
+
systemd.services.hdfs-datanode = {
description = "Hadoop HDFS DataNode";
wantedBy = [ "multi-user.target" ];
+2 -2
nixos/modules/services/cluster/hadoop/yarn.nix
···
})
(mkIf cfg.yarn.resourcemanager.enabled {
-
systemd.services."yarn-resourcemanager" = {
description = "Hadoop YARN ResourceManager";
wantedBy = [ "multi-user.target" ];
···
})
(mkIf cfg.yarn.nodemanager.enabled {
-
systemd.services."yarn-nodemanager" = {
description = "Hadoop YARN NodeManager";
wantedBy = [ "multi-user.target" ];
···
})
(mkIf cfg.yarn.resourcemanager.enabled {
+
systemd.services.yarn-resourcemanager = {
description = "Hadoop YARN ResourceManager";
wantedBy = [ "multi-user.target" ];
···
})
(mkIf cfg.yarn.nodemanager.enabled {
+
systemd.services.yarn-nodemanager = {
description = "Hadoop YARN NodeManager";
wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/cluster/kubernetes/addons/dashboard.nix
···
spec = {
replicas = 1;
revisionHistoryLimit = 10;
-
selector.matchLabels."k8s-app" = "kubernetes-dashboard";
template = {
metadata = {
labels = {
···
spec = {
replicas = 1;
revisionHistoryLimit = 10;
+
selector.matchLabels.k8s-app = "kubernetes-dashboard";
template = {
metadata = {
labels = {
+6 -6
nixos/modules/services/cluster/kubernetes/addons/dns.nix
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/bootstrapping" = "rbac-defaults";
};
···
};
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/bootstrapping" = "rbac-defaults";
};
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
};
name = "coredns";
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = cfg.reconcileMode;
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
};
name = "coredns";
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = cfg.reconcileMode;
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/name" = "CoreDNS";
};
···
};
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
-
"k8s-app" = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/name" = "CoreDNS";
};
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/bootstrapping" = "rbac-defaults";
};
···
};
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/bootstrapping" = "rbac-defaults";
};
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
};
name = "coredns";
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = cfg.reconcileMode;
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
};
name = "coredns";
···
metadata = {
labels = {
"addonmanager.kubernetes.io/mode" = cfg.reconcileMode;
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/name" = "CoreDNS";
};
···
};
labels = {
"addonmanager.kubernetes.io/mode" = "Reconcile";
+
k8s-app = "kube-dns";
"kubernetes.io/cluster-service" = "true";
"kubernetes.io/name" = "CoreDNS";
};
+2 -2
nixos/modules/services/databases/cassandra.nix
···
}
];
users = mkIf (cfg.user == defaultUser) {
-
extraUsers."${defaultUser}" =
{ group = cfg.group;
home = cfg.homeDir;
createHome = true;
uid = config.ids.uids.cassandra;
description = "Cassandra service user";
};
-
extraGroups."${defaultUser}".gid = config.ids.gids.cassandra;
};
systemd.services.cassandra =
···
}
];
users = mkIf (cfg.user == defaultUser) {
+
extraUsers.${defaultUser} =
{ group = cfg.group;
home = cfg.homeDir;
createHome = true;
uid = config.ids.uids.cassandra;
description = "Cassandra service user";
};
+
extraGroups.${defaultUser}.gid = config.ids.gids.cassandra;
};
systemd.services.cassandra =
+4 -4
nixos/modules/services/databases/pgmanage.nix
···
type = types.attrsOf types.str;
default = {};
example = {
-
"nuc-server" = "hostaddr=192.168.0.100 port=5432 dbname=postgres";
-
"mini-server" = "hostaddr=127.0.0.1 port=5432 dbname=postgres sslmode=require";
};
description = ''
pgmanage requires at least one PostgreSQL server be defined.
···
};
};
users = {
-
users."${pgmanage}" = {
name = pgmanage;
group = pgmanage;
home = cfg.sqlRoot;
createHome = true;
};
-
groups."${pgmanage}" = {
name = pgmanage;
};
};
···
type = types.attrsOf types.str;
default = {};
example = {
+
nuc-server = "hostaddr=192.168.0.100 port=5432 dbname=postgres";
+
mini-server = "hostaddr=127.0.0.1 port=5432 dbname=postgres sslmode=require";
};
description = ''
pgmanage requires at least one PostgreSQL server be defined.
···
};
};
users = {
+
users.${pgmanage} = {
name = pgmanage;
group = pgmanage;
home = cfg.sqlRoot;
createHome = true;
};
+
groups.${pgmanage} = {
name = pgmanage;
};
};
+4 -4
nixos/modules/services/desktops/geoclue2.nix
···
];
# restart geoclue service when the configuration changes
-
systemd.services."geoclue".restartTriggers = [
config.environment.etc."geoclue/geoclue.conf".source
];
# this needs to run as a user service, since it's associated with the
# user who is making the requests
systemd.user.services = mkIf cfg.enableDemoAgent {
-
"geoclue-agent" = {
description = "Geoclue agent";
script = "${package}/libexec/geoclue-2.0/demos/agent";
# this should really be `partOf = [ "geoclue.service" ]`, but
···
};
};
-
services.geoclue2.appConfig."epiphany" = {
isAllowed = true;
isSystem = false;
};
-
services.geoclue2.appConfig."firefox" = {
isAllowed = true;
isSystem = false;
};
···
];
# restart geoclue service when the configuration changes
+
systemd.services.geoclue.restartTriggers = [
config.environment.etc."geoclue/geoclue.conf".source
];
# this needs to run as a user service, since it's associated with the
# user who is making the requests
systemd.user.services = mkIf cfg.enableDemoAgent {
+
geoclue-agent = {
description = "Geoclue agent";
script = "${package}/libexec/geoclue-2.0/demos/agent";
# this should really be `partOf = [ "geoclue.service" ]`, but
···
};
};
+
services.geoclue2.appConfig.epiphany = {
isAllowed = true;
isSystem = false;
};
+
services.geoclue2.appConfig.firefox = {
isAllowed = true;
isSystem = false;
};
+1 -1
nixos/modules/services/games/terraria.nix
···
let
cfg = config.services.terraria;
-
worldSizeMap = { "small" = 1; "medium" = 2; "large" = 3; };
valFlag = name: val: optionalString (val != null) "-${name} \"${escape ["\\" "\""] (toString val)}\"";
boolFlag = name: val: optionalString val "-${name}";
flags = [
···
let
cfg = config.services.terraria;
+
worldSizeMap = { small = 1; medium = 2; large = 3; };
valFlag = name: val: optionalString (val != null) "-${name} \"${escape ["\\" "\""] (toString val)}\"";
boolFlag = name: val: optionalString val "-${name}";
flags = [
+2 -2
nixos/modules/services/hardware/sane.nix
···
environment.sessionVariables = env;
services.udev.packages = backends;
-
users.groups."scanner".gid = config.ids.gids.scanner;
})
(mkIf config.services.saned.enable {
···
};
};
-
users.users."scanner" = {
uid = config.ids.uids.scanner;
group = "scanner";
};
···
environment.sessionVariables = env;
services.udev.packages = backends;
+
users.groups.scanner.gid = config.ids.gids.scanner;
})
(mkIf config.services.saned.enable {
···
};
};
+
users.users.scanner = {
uid = config.ids.uids.scanner;
group = "scanner";
};
+1 -1
nixos/modules/services/hardware/throttled.nix
···
config = mkIf cfg.enable {
systemd.packages = [ pkgs.throttled ];
# The upstream package has this in Install, but that's not enough, see the NixOS manual
-
systemd.services."lenovo_fix".wantedBy = [ "multi-user.target" ];
environment.etc."lenovo_fix.conf".source =
if cfg.extraConfig != ""
···
config = mkIf cfg.enable {
systemd.packages = [ pkgs.throttled ];
# The upstream package has this in Install, but that's not enough, see the NixOS manual
+
systemd.services.lenovo_fix.wantedBy = [ "multi-user.target" ];
environment.etc."lenovo_fix.conf".source =
if cfg.extraConfig != ""
+2 -2
nixos/modules/services/hardware/tlp.nix
···
powerManagement.cpufreq.max = null;
powerManagement.cpufreq.min = null;
-
systemd.sockets."systemd-rfkill".enable = false;
systemd.services = {
"systemd-rfkill@".enable = false;
-
"systemd-rfkill".enable = false;
tlp = {
description = "TLP system startup/shutdown";
···
powerManagement.cpufreq.max = null;
powerManagement.cpufreq.min = null;
+
systemd.sockets.systemd-rfkill.enable = false;
systemd.services = {
"systemd-rfkill@".enable = false;
+
systemd-rfkill.enable = false;
tlp = {
description = "TLP system startup/shutdown";
+3 -3
nixos/modules/services/logging/logcheck.nix
···
flags = "-r ${rulesDir} -c ${configFile} -L ${logFiles} -${levelFlag} -m ${cfg.mailTo}";
levelFlag = getAttrFromPath [cfg.level]
-
{ "paranoid" = "p";
-
"server" = "s";
-
"workstation" = "w";
};
cronJob = ''
···
flags = "-r ${rulesDir} -c ${configFile} -L ${logFiles} -${levelFlag} -m ${cfg.mailTo}";
levelFlag = getAttrFromPath [cfg.level]
+
{ paranoid = "p";
+
server = "s";
+
workstation = "w";
};
cronJob = ''
+2 -2
nixos/modules/services/mail/mlmmj.nix
···
${pkgs.postfix}/bin/postmap ${stateDir}/transports
'';
-
systemd.services."mlmmj-maintd" = {
description = "mlmmj maintenance daemon";
serviceConfig = {
User = cfg.user;
···
};
};
-
systemd.timers."mlmmj-maintd" = {
description = "mlmmj maintenance timer";
timerConfig.OnUnitActiveSec = cfg.maintInterval;
wantedBy = [ "timers.target" ];
···
${pkgs.postfix}/bin/postmap ${stateDir}/transports
'';
+
systemd.services.mlmmj-maintd = {
description = "mlmmj maintenance daemon";
serviceConfig = {
User = cfg.user;
···
};
};
+
systemd.timers.mlmmj-maintd = {
description = "mlmmj maintenance timer";
timerConfig.OnUnitActiveSec = cfg.maintInterval;
wantedBy = [ "timers.target" ];
+1 -1
nixos/modules/services/mail/pfix-srsd.nix
···
systemPackages = [ pkgs.pfixtools ];
};
-
systemd.services."pfix-srsd" = {
description = "Postfix sender rewriting scheme daemon";
before = [ "postfix.service" ];
#note that we use requires rather than wants because postfix
···
systemPackages = [ pkgs.pfixtools ];
};
+
systemd.services.pfix-srsd = {
description = "Postfix sender rewriting scheme daemon";
before = [ "postfix.service" ];
#note that we use requires rather than wants because postfix
+6 -6
nixos/modules/services/mail/postfix.nix
···
}
(mkIf haveAliases {
-
services.postfix.aliasFiles."aliases" = aliasesFile;
})
(mkIf haveTransport {
-
services.postfix.mapFiles."transport" = transportFile;
})
(mkIf haveVirtual {
-
services.postfix.mapFiles."virtual" = virtualFile;
})
(mkIf haveLocalRecipients {
-
services.postfix.mapFiles."local_recipients" = localRecipientMapFile;
})
(mkIf cfg.enableHeaderChecks {
-
services.postfix.mapFiles."header_checks" = headerChecksFile;
})
(mkIf (cfg.dnsBlacklists != []) {
-
services.postfix.mapFiles."client_access" = checkClientAccessFile;
})
]);
}
···
}
(mkIf haveAliases {
+
services.postfix.aliasFiles.aliases = aliasesFile;
})
(mkIf haveTransport {
+
services.postfix.mapFiles.transport = transportFile;
})
(mkIf haveVirtual {
+
services.postfix.mapFiles.virtual = virtualFile;
})
(mkIf haveLocalRecipients {
+
services.postfix.mapFiles.local_recipients = localRecipientMapFile;
})
(mkIf cfg.enableHeaderChecks {
+
services.postfix.mapFiles.header_checks = headerChecksFile;
})
(mkIf (cfg.dnsBlacklists != []) {
+
services.postfix.mapFiles.client_access = checkClientAccessFile;
})
]);
}
+2 -2
nixos/modules/services/mail/postgrey.nix
···
natural = with types; addCheck int (x: x >= 0);
natural' = with types; addCheck int (x: x > 0);
-
socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? "path" || x ? "port");
inetSocket = with types; {
options = {
···
};
systemd.services.postgrey = let
-
bind-flag = if cfg.socket ? "path" then
''--unix=${cfg.socket.path} --socketmode=${cfg.socket.mode}''
else
''--inet=${optionalString (cfg.socket.addr != null) (cfg.socket.addr + ":")}${toString cfg.socket.port}'';
···
natural = with types; addCheck int (x: x >= 0);
natural' = with types; addCheck int (x: x > 0);
+
socket = with types; addCheck (either (submodule unixSocket) (submodule inetSocket)) (x: x ? path || x ? port);
inetSocket = with types; {
options = {
···
};
systemd.services.postgrey = let
+
bind-flag = if cfg.socket ? path then
''--unix=${cfg.socket.path} --socketmode=${cfg.socket.mode}''
else
''--inet=${optionalString (cfg.socket.addr != null) (cfg.socket.addr + ":")}${toString cfg.socket.port}'';
+1 -1
nixos/modules/services/mail/rspamd.nix
···
gid = config.ids.gids.rspamd;
};
-
environment.etc."rspamd".source = rspamdDir;
systemd.services.rspamd = {
description = "Rspamd Service";
···
gid = config.ids.gids.rspamd;
};
+
environment.etc.rspamd.source = rspamdDir;
systemd.services.rspamd = {
description = "Rspamd Service";
+2 -2
nixos/modules/services/misc/airsonic.nix
···
services.nginx = mkIf (cfg.virtualHost != null) {
enable = true;
-
virtualHosts."${cfg.virtualHost}" = {
-
locations."${cfg.contextPath}".proxyPass = "http://${cfg.listenAddress}:${toString cfg.port}";
};
};
···
services.nginx = mkIf (cfg.virtualHost != null) {
enable = true;
+
virtualHosts.${cfg.virtualHost} = {
+
locations.${cfg.contextPath}.proxyPass = "http://${cfg.listenAddress}:${toString cfg.port}";
};
};
+5 -5
nixos/modules/services/misc/dysnomia.nix
···
printProperties = properties:
concatMapStrings (propertyName:
let
-
property = properties."${propertyName}";
in
-
if isList property then "${propertyName}=(${lib.concatMapStrings (elem: "\"${toString elem}\" ") (properties."${propertyName}")})\n"
else "${propertyName}=\"${toString property}\"\n"
) (builtins.attrNames properties);
···
${concatMapStrings (containerName:
let
-
containerProperties = cfg.containers."${containerName}";
in
''
cat > ${containerName} <<EOF
···
${concatMapStrings (componentName:
let
-
component = cfg.components."${containerName}"."${componentName}";
in
"ln -s ${component} ${containerName}/${componentName}\n"
-
) (builtins.attrNames (cfg.components."${containerName}" or {}))}
'';
componentsDir = pkgs.stdenv.mkDerivation {
···
printProperties = properties:
concatMapStrings (propertyName:
let
+
property = properties.${propertyName};
in
+
if isList property then "${propertyName}=(${lib.concatMapStrings (elem: "\"${toString elem}\" ") (properties.${propertyName})})\n"
else "${propertyName}=\"${toString property}\"\n"
) (builtins.attrNames properties);
···
${concatMapStrings (containerName:
let
+
containerProperties = cfg.containers.${containerName};
in
''
cat > ${containerName} <<EOF
···
${concatMapStrings (componentName:
let
+
component = cfg.components.${containerName}.${componentName};
in
"ln -s ${component} ${containerName}/${componentName}\n"
+
) (builtins.attrNames (cfg.components.${containerName} or {}))}
'';
componentsDir = pkgs.stdenv.mkDerivation {
+1 -1
nixos/modules/services/misc/exhibitor.nix
···
};
};
cliOptions = concatStringsSep " " (mapAttrsToList (k: v: "--${k} ${v}") (filterAttrs (k: v: v != null && v != "") (cliOptionsCommon //
-
cliOptionsPerConfig."${cfg.configType}" //
s3CommonOptions //
optionalAttrs cfg.s3Backup { s3backup = "true"; } //
optionalAttrs cfg.fileSystemBackup { filesystembackup = "true"; }
···
};
};
cliOptions = concatStringsSep " " (mapAttrsToList (k: v: "--${k} ${v}") (filterAttrs (k: v: v != null && v != "") (cliOptionsCommon //
+
cliOptionsPerConfig.${cfg.configType} //
s3CommonOptions //
optionalAttrs cfg.s3Backup { s3backup = "true"; } //
optionalAttrs cfg.fileSystemBackup { filesystembackup = "true"; }
+2 -2
nixos/modules/services/misc/gitolite.nix
···
group = cfg.group;
useDefaultShell = true;
};
-
users.groups."${cfg.group}".gid = config.ids.gids.gitolite;
systemd.tmpfiles.rules = [
"d '${cfg.dataDir}' 0750 ${cfg.user} ${cfg.group} - -"
···
"Z ${cfg.dataDir} 0750 ${cfg.user} ${cfg.group} - -"
];
-
systemd.services."gitolite-init" = {
description = "Gitolite initialization";
wantedBy = [ "multi-user.target" ];
unitConfig.RequiresMountsFor = cfg.dataDir;
···
group = cfg.group;
useDefaultShell = true;
};
+
users.groups.${cfg.group}.gid = config.ids.gids.gitolite;
systemd.tmpfiles.rules = [
"d '${cfg.dataDir}' 0750 ${cfg.user} ${cfg.group} - -"
···
"Z ${cfg.dataDir} 0750 ${cfg.user} ${cfg.group} - -"
];
+
systemd.services.gitolite-init = {
description = "Gitolite initialization";
wantedBy = [ "multi-user.target" ];
unitConfig.RequiresMountsFor = cfg.dataDir;
+1 -1
nixos/modules/services/misc/matrix-synapse.nix
···
user = cfg.database_user;
database = cfg.database_name;
};
-
}."${cfg.database_type}";
description = ''
Arguments to pass to the engine.
'';
···
user = cfg.database_user;
database = cfg.database_name;
};
+
}.${cfg.database_type};
description = ''
Arguments to pass to the engine.
'';
+6 -6
nixos/modules/services/misc/nix-daemon.nix
···
optionals (pkgs.stdenv.isx86_64 && pkgs.hostPlatform.platform ? gcc.arch) (
# a x86_64 builder can run code for `platform.gcc.arch` and minor architectures:
[ "gccarch-${pkgs.hostPlatform.platform.gcc.arch}" ] ++ {
-
"sandybridge" = [ "gccarch-westmere" ];
-
"ivybridge" = [ "gccarch-westmere" "gccarch-sandybridge" ];
-
"haswell" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" ];
-
"broadwell" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" ];
-
"skylake" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" ];
-
"skylake-avx512" = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" "gccarch-skylake" ];
}.${pkgs.hostPlatform.platform.gcc.arch} or []
)
);
···
optionals (pkgs.stdenv.isx86_64 && pkgs.hostPlatform.platform ? gcc.arch) (
# a x86_64 builder can run code for `platform.gcc.arch` and minor architectures:
[ "gccarch-${pkgs.hostPlatform.platform.gcc.arch}" ] ++ {
+
sandybridge = [ "gccarch-westmere" ];
+
ivybridge = [ "gccarch-westmere" "gccarch-sandybridge" ];
+
haswell = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" ];
+
broadwell = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" ];
+
skylake = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" ];
+
skylake-avx512 = [ "gccarch-westmere" "gccarch-sandybridge" "gccarch-ivybridge" "gccarch-haswell" "gccarch-broadwell" "gccarch-skylake" ];
}.${pkgs.hostPlatform.platform.gcc.arch} or []
)
);
+1 -1
nixos/modules/services/misc/nixos-manual.nix
···
(mkIf (cfg.showManual && cfgd.enable && cfgd.nixos.enable) {
boot.extraTTYs = [ "tty${toString cfg.ttyNumber}" ];
-
systemd.services."nixos-manual" = {
description = "NixOS Manual";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
···
(mkIf (cfg.showManual && cfgd.enable && cfgd.nixos.enable) {
boot.extraTTYs = [ "tty${toString cfg.ttyNumber}" ];
+
systemd.services.nixos-manual = {
description = "NixOS Manual";
wantedBy = [ "multi-user.target" ];
serviceConfig = {
+1 -1
nixos/modules/services/misc/snapper.nix
···
configs = mkOption {
default = { };
example = literalExample {
-
"home" = {
subvolume = "/home";
extraConfig = ''
ALLOW_USERS="alice"
···
configs = mkOption {
default = { };
example = literalExample {
+
home = {
subvolume = "/home";
extraConfig = ''
ALLOW_USERS="alice"
+2 -2
nixos/modules/services/misc/synergy.nix
···
config = mkMerge [
(mkIf cfgC.enable {
-
systemd.user.services."synergy-client" = {
after = [ "network.target" "graphical-session.target" ];
description = "Synergy client";
wantedBy = optional cfgC.autoStart "graphical-session.target";
···
};
})
(mkIf cfgS.enable {
-
systemd.user.services."synergy-server" = {
after = [ "network.target" "graphical-session.target" ];
description = "Synergy server";
wantedBy = optional cfgS.autoStart "graphical-session.target";
···
config = mkMerge [
(mkIf cfgC.enable {
+
systemd.user.services.synergy-client = {
after = [ "network.target" "graphical-session.target" ];
description = "Synergy client";
wantedBy = optional cfgC.autoStart "graphical-session.target";
···
};
})
(mkIf cfgS.enable {
+
systemd.user.services.synergy-server = {
after = [ "network.target" "graphical-session.target" ];
description = "Synergy server";
wantedBy = optional cfgS.autoStart "graphical-session.target";
+4 -4
nixos/modules/services/misc/zoneminder.nix
···
group = {
nginx = config.services.nginx.group;
none = user;
-
}."${cfg.webserver}";
useNginx = cfg.webserver == "nginx";
···
nginx = lib.mkIf useNginx {
enable = true;
virtualHosts = {
-
"${cfg.hostname}" = {
default = true;
root = "${pkg}/share/zoneminder/www";
listen = [ { addr = "0.0.0.0"; inherit (cfg) port; } ];
···
};
};
-
users.groups."${user}" = {
gid = config.ids.gids.zoneminder;
};
-
users.users."${user}" = {
uid = config.ids.uids.zoneminder;
group = user;
inherit home;
···
group = {
nginx = config.services.nginx.group;
none = user;
+
}.${cfg.webserver};
useNginx = cfg.webserver == "nginx";
···
nginx = lib.mkIf useNginx {
enable = true;
virtualHosts = {
+
${cfg.hostname} = {
default = true;
root = "${pkg}/share/zoneminder/www";
listen = [ { addr = "0.0.0.0"; inherit (cfg) port; } ];
···
};
};
+
users.groups.${user} = {
gid = config.ids.gids.zoneminder;
};
+
users.users.${user} = {
uid = config.ids.uids.zoneminder;
group = user;
inherit home;
+1 -1
nixos/modules/services/monitoring/dd-agent/dd-agent.nix
···
};
config = mkIf cfg.enable {
-
environment.systemPackages = [ pkgs."dd-agent" pkgs.sysstat pkgs.procps ];
users.users.datadog = {
description = "Datadog Agent User";
···
};
config = mkIf cfg.enable {
+
environment.systemPackages = [ pkgs.dd-agent pkgs.sysstat pkgs.procps ];
users.users.datadog = {
description = "Datadog Agent User";
+1 -1
nixos/modules/services/monitoring/fusion-inventory.nix
···
description = "FusionInventory user";
};
-
systemd.services."fusion-inventory" = {
description = "Fusion Inventory Agent";
wantedBy = [ "multi-user.target" ];
···
description = "FusionInventory user";
};
+
systemd.services.fusion-inventory = {
description = "Fusion Inventory Agent";
wantedBy = [ "multi-user.target" ];
+2 -2
nixos/modules/services/monitoring/monit.nix
···
environment.systemPackages = [ pkgs.monit ];
-
environment.etc."monitrc" = {
text = cfg.config;
mode = "0400";
};
···
KillMode = "process";
Restart = "always";
};
-
restartTriggers = [ config.environment.etc."monitrc".source ];
};
};
···
environment.systemPackages = [ pkgs.monit ];
+
environment.etc.monitrc = {
text = cfg.config;
mode = "0400";
};
···
KillMode = "process";
Restart = "always";
};
+
restartTriggers = [ config.environment.etc.monitrc.source ];
};
};
+5 -5
nixos/modules/services/monitoring/thanos.nix
···
} ''json2yaml -i $json -o $out'';
thanos = cmd: "${cfg.package}/bin/thanos ${cmd}" +
-
(let args = cfg."${cmd}".arguments;
in optionalString (length args != 0) (" \\\n " +
concatStringsSep " \\\n " args));
argumentsOf = cmd: concatLists (collect isList
-
(flip mapParamsRecursive params."${cmd}" (path: param:
let opt = concatStringsSep "." path;
-
v = getAttrFromPath path cfg."${cmd}";
in param.toArgs opt v)));
mkArgumentsOption = cmd: mkOption {
···
};
mapParamsRecursive =
-
let noParam = attr: !(attr ? "toArgs" && attr ? "option");
in mapAttrsRecursiveCond noParam;
paramsToOptions = mapParamsRecursive (_path: param: param.option);
···
assertRelativeStateDir = cmd: {
assertions = [
{
-
assertion = !hasPrefix "/" cfg."${cmd}".stateDir;
message =
"The option services.thanos.${cmd}.stateDir should not be an absolute directory." +
" It should be a directory relative to /var/lib.";
···
} ''json2yaml -i $json -o $out'';
thanos = cmd: "${cfg.package}/bin/thanos ${cmd}" +
+
(let args = cfg.${cmd}.arguments;
in optionalString (length args != 0) (" \\\n " +
concatStringsSep " \\\n " args));
argumentsOf = cmd: concatLists (collect isList
+
(flip mapParamsRecursive params.${cmd} (path: param:
let opt = concatStringsSep "." path;
+
v = getAttrFromPath path cfg.${cmd};
in param.toArgs opt v)));
mkArgumentsOption = cmd: mkOption {
···
};
mapParamsRecursive =
+
let noParam = attr: !(attr ? toArgs && attr ? option);
in mapAttrsRecursiveCond noParam;
paramsToOptions = mapParamsRecursive (_path: param: param.option);
···
assertRelativeStateDir = cmd: {
assertions = [
{
+
assertion = !hasPrefix "/" cfg.${cmd}.stateDir;
message =
"The option services.thanos.${cmd}.stateDir should not be an absolute directory." +
" It should be a directory relative to /var/lib.";
+1 -1
nixos/modules/services/monitoring/zabbix-agent.nix
···
users.groups.${group} = { };
-
systemd.services."zabbix-agent" = {
description = "Zabbix Agent";
wantedBy = [ "multi-user.target" ];
···
users.groups.${group} = { };
+
systemd.services.zabbix-agent = {
description = "Zabbix Agent";
wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/monitoring/zabbix-proxy.nix
···
fping.source = "${pkgs.fping}/bin/fping";
};
-
systemd.services."zabbix-proxy" = {
description = "Zabbix Proxy";
wantedBy = [ "multi-user.target" ];
···
fping.source = "${pkgs.fping}/bin/fping";
};
+
systemd.services.zabbix-proxy = {
description = "Zabbix Proxy";
wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/monitoring/zabbix-server.nix
···
fping.source = "${pkgs.fping}/bin/fping";
};
-
systemd.services."zabbix-server" = {
description = "Zabbix Server";
wantedBy = [ "multi-user.target" ];
···
fping.source = "${pkgs.fping}/bin/fping";
};
+
systemd.services.zabbix-server = {
description = "Zabbix Server";
wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/network-filesystems/beegfs.nix
···
# functions to generate systemd.service entries
systemdEntry = service: cfgFile: (mapAttrs' ( name: cfg:
-
(nameValuePair "beegfs-${service}-${name}" (mkIf cfg."${service}".enable {
wantedBy = [ "multi-user.target" ];
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
···
# functions to generate systemd.service entries
systemdEntry = service: cfgFile: (mapAttrs' ( name: cfg:
+
(nameValuePair "beegfs-${service}-${name}" (mkIf cfg.${service}.enable {
wantedBy = [ "multi-user.target" ];
requires = [ "network-online.target" ];
after = [ "network-online.target" ];
+5 -5
nixos/modules/services/network-filesystems/ceph.nix
···
# Remove all name-value pairs with null values from the attribute set to avoid making empty sections in the ceph.conf
globalConfig = mapAttrs' (name: value: nameValuePair (translateOption name) value) (filterAttrs (name: value: value != null) globalAndMgrConfig);
totalConfig = {
-
"global" = globalConfig;
-
} // optionalAttrs (cfg.mon.enable && cfg.mon.extraConfig != {}) { "mon" = cfg.mon.extraConfig; }
-
// optionalAttrs (cfg.mds.enable && cfg.mds.extraConfig != {}) { "mds" = cfg.mds.extraConfig; }
-
// optionalAttrs (cfg.osd.enable && cfg.osd.extraConfig != {}) { "osd" = cfg.osd.extraConfig; }
// optionalAttrs (cfg.client.enable && cfg.client.extraConfig != {}) cfg.client.extraConfig;
in
generators.toINI {} totalConfig;
···
systemd.targets = let
targets = [
-
{ "ceph" = { description = "Ceph target allowing to start/stop all ceph service instances at once"; }; }
] ++ optional cfg.mon.enable (generateTargetFile "mon")
++ optional cfg.mds.enable (generateTargetFile "mds")
++ optional cfg.osd.enable (generateTargetFile "osd")
···
# Remove all name-value pairs with null values from the attribute set to avoid making empty sections in the ceph.conf
globalConfig = mapAttrs' (name: value: nameValuePair (translateOption name) value) (filterAttrs (name: value: value != null) globalAndMgrConfig);
totalConfig = {
+
global = globalConfig;
+
} // optionalAttrs (cfg.mon.enable && cfg.mon.extraConfig != {}) { mon = cfg.mon.extraConfig; }
+
// optionalAttrs (cfg.mds.enable && cfg.mds.extraConfig != {}) { mds = cfg.mds.extraConfig; }
+
// optionalAttrs (cfg.osd.enable && cfg.osd.extraConfig != {}) { osd = cfg.osd.extraConfig; }
// optionalAttrs (cfg.client.enable && cfg.client.extraConfig != {}) cfg.client.extraConfig;
in
generators.toINI {} totalConfig;
···
systemd.targets = let
targets = [
+
{ ceph = { description = "Ceph target allowing to start/stop all ceph service instances at once"; }; }
] ++ optional cfg.mon.enable (generateTargetFile "mon")
++ optional cfg.mds.enable (generateTargetFile "mds")
++ optional cfg.osd.enable (generateTargetFile "osd")
+4 -4
nixos/modules/services/network-filesystems/samba.nix
···
# Refer to https://github.com/samba-team/samba/tree/master/packaging/systemd
# for correct use with systemd
services = {
-
"samba-smbd" = daemonService "smbd" "";
-
"samba-nmbd" = mkIf cfg.enableNmbd (daemonService "nmbd" "");
-
"samba-winbindd" = mkIf cfg.enableWinbindd (daemonService "winbindd" "");
-
"samba-setup" = {
description = "Samba Setup Task";
script = setupScript;
unitConfig.RequiresMountsFor = "/var/lib/samba";
···
# Refer to https://github.com/samba-team/samba/tree/master/packaging/systemd
# for correct use with systemd
services = {
+
samba-smbd = daemonService "smbd" "";
+
samba-nmbd = mkIf cfg.enableNmbd (daemonService "nmbd" "");
+
samba-winbindd = mkIf cfg.enableWinbindd (daemonService "winbindd" "");
+
samba-setup = {
description = "Samba Setup Task";
script = setupScript;
unitConfig.RequiresMountsFor = "/var/lib/samba";
+3 -3
nixos/modules/services/networking/babeld.nix
···
example =
{
type = "tunnel";
-
"split-horizon" = true;
};
};
···
example =
{ enp0s2 =
{ type = "wired";
-
"hello-interval" = 5;
-
"split-horizon" = "auto";
};
};
};
···
example =
{
type = "tunnel";
+
split-horizon = true;
};
};
···
example =
{ enp0s2 =
{ type = "wired";
+
hello-interval = 5;
+
split-horizon = "auto";
};
};
};
+3 -3
nixos/modules/services/networking/connman.nix
···
environment.systemPackages = [ connman ];
-
systemd.services."connman" = {
description = "Connection service";
wantedBy = [ "multi-user.target" ];
after = [ "syslog.target" ];
···
};
};
-
systemd.services."connman-vpn" = mkIf cfg.enableVPN {
description = "ConnMan VPN service";
wantedBy = [ "multi-user.target" ];
after = [ "syslog.target" ];
···
};
};
-
systemd.services."net-connman-vpn" = mkIf cfg.enableVPN {
description = "D-BUS Service";
serviceConfig = {
Name = "net.connman.vpn";
···
environment.systemPackages = [ connman ];
+
systemd.services.connman = {
description = "Connection service";
wantedBy = [ "multi-user.target" ];
after = [ "syslog.target" ];
···
};
};
+
systemd.services.connman-vpn = mkIf cfg.enableVPN {
description = "ConnMan VPN service";
wantedBy = [ "multi-user.target" ];
after = [ "syslog.target" ];
···
};
};
+
systemd.services.net-connman-vpn = mkIf cfg.enableVPN {
description = "D-BUS Service";
serviceConfig = {
Name = "net.connman.vpn";
+1 -1
nixos/modules/services/networking/consul.nix
···
config = mkIf cfg.enable (
mkMerge [{
-
users.users."consul" = {
description = "Consul agent daemon user";
uid = config.ids.uids.consul;
# The shell is needed for health checks
···
config = mkIf cfg.enable (
mkMerge [{
+
users.users.consul = {
description = "Consul agent daemon user";
uid = config.ids.uids.consul;
# The shell is needed for health checks
+1 -1
nixos/modules/services/networking/firewall.nix
···
${text}
''; in "${dir}/bin/${name}";
-
defaultInterface = { default = mapAttrs (name: value: cfg."${name}") commonOptions; };
allInterfaces = defaultInterface // cfg.interfaces;
startScript = writeShScript "firewall-start" ''
···
${text}
''; in "${dir}/bin/${name}";
+
defaultInterface = { default = mapAttrs (name: value: cfg.${name}) commonOptions; };
allInterfaces = defaultInterface // cfg.interfaces;
startScript = writeShScript "firewall-start" ''
+1 -1
nixos/modules/services/networking/git-daemon.nix
···
gid = config.ids.gids.git;
};
-
systemd.services."git-daemon" = {
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
script = "${pkgs.git}/bin/git daemon --reuseaddr "
···
gid = config.ids.gids.git;
};
+
systemd.services.git-daemon = {
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
script = "${pkgs.git}/bin/git daemon --reuseaddr "
+8 -8
nixos/modules/services/networking/hylafax/systemd.nix
···
inherit (cfg) spoolAreaPath;
};
-
sockets."hylafax-hfaxd" = {
description = "HylaFAX server socket";
documentation = [ "man:hfaxd(8)" ];
wantedBy = [ "multi-user.target" ];
···
socketConfig.Accept = true;
};
-
paths."hylafax-faxq" = {
description = "HylaFAX queue manager sendq watch";
documentation = [ "man:faxq(8)" "man:sendq(5)" ];
wantedBy = [ "multi-user.target" ];
···
timers = mkMerge [
(
mkIf (cfg.faxcron.enable.frequency!=null)
-
{ "hylafax-faxcron".timerConfig.Persistent = true; }
)
(
mkIf (cfg.faxqclean.enable.frequency!=null)
-
{ "hylafax-faxqclean".timerConfig.Persistent = true; }
)
];
···
in
service: service // { serviceConfig = apply service; };
-
services."hylafax-spool" = {
description = "HylaFAX spool area preparation";
documentation = [ "man:hylafax-server(4)" ];
script = ''
···
unitConfig.RequiresMountsFor = [ cfg.spoolAreaPath ];
};
-
services."hylafax-faxq" = {
description = "HylaFAX queue manager";
documentation = [ "man:faxq(8)" ];
requires = [ "hylafax-spool.service" ];
···
serviceConfig.PrivateNetwork = null;
};
-
services."hylafax-faxcron" = rec {
description = "HylaFAX spool area maintenance";
documentation = [ "man:faxcron(8)" ];
after = [ "hylafax-spool.service" ];
···
];
};
-
services."hylafax-faxqclean" = rec {
description = "HylaFAX spool area queue cleaner";
documentation = [ "man:faxqclean(8)" ];
after = [ "hylafax-spool.service" ];
···
inherit (cfg) spoolAreaPath;
};
+
sockets.hylafax-hfaxd = {
description = "HylaFAX server socket";
documentation = [ "man:hfaxd(8)" ];
wantedBy = [ "multi-user.target" ];
···
socketConfig.Accept = true;
};
+
paths.hylafax-faxq = {
description = "HylaFAX queue manager sendq watch";
documentation = [ "man:faxq(8)" "man:sendq(5)" ];
wantedBy = [ "multi-user.target" ];
···
timers = mkMerge [
(
mkIf (cfg.faxcron.enable.frequency!=null)
+
{ hylafax-faxcron.timerConfig.Persistent = true; }
)
(
mkIf (cfg.faxqclean.enable.frequency!=null)
+
{ hylafax-faxqclean.timerConfig.Persistent = true; }
)
];
···
in
service: service // { serviceConfig = apply service; };
+
services.hylafax-spool = {
description = "HylaFAX spool area preparation";
documentation = [ "man:hylafax-server(4)" ];
script = ''
···
unitConfig.RequiresMountsFor = [ cfg.spoolAreaPath ];
};
+
services.hylafax-faxq = {
description = "HylaFAX queue manager";
documentation = [ "man:faxq(8)" ];
requires = [ "hylafax-spool.service" ];
···
serviceConfig.PrivateNetwork = null;
};
+
services.hylafax-faxcron = rec {
description = "HylaFAX spool area maintenance";
documentation = [ "man:faxcron(8)" ];
after = [ "hylafax-spool.service" ];
···
];
};
+
services.hylafax-faxqclean = rec {
description = "HylaFAX spool area queue cleaner";
documentation = [ "man:faxqclean(8)" ];
after = [ "hylafax-spool.service" ];
+1 -1
nixos/modules/services/networking/ircd-hybrid/default.nix
···
users.groups.ircd.gid = config.ids.gids.ircd;
-
systemd.services."ircd-hybrid" = {
description = "IRCD Hybrid server";
after = [ "started networking" ];
wantedBy = [ "multi-user.target" ];
···
users.groups.ircd.gid = config.ids.gids.ircd;
+
systemd.services.ircd-hybrid = {
description = "IRCD Hybrid server";
after = [ "started networking" ];
wantedBy = [ "multi-user.target" ];
+3 -3
nixos/modules/services/networking/mtprotoproxy.nix
···
users = mkOption {
type = types.attrsOf types.str;
example = {
-
"tg" = "00000000000000000000000000000000";
-
"tg2" = "0123456789abcdef0123456789abcdef";
};
description = ''
Allowed users and their secrets. A secret is a 32 characters long hex string.
···
type = types.attrs;
default = {};
example = {
-
"STATS_PRINT_PERIOD" = 600;
};
description = ''
Extra configuration options for mtprotoproxy.
···
users = mkOption {
type = types.attrsOf types.str;
example = {
+
tg = "00000000000000000000000000000000";
+
tg2 = "0123456789abcdef0123456789abcdef";
};
description = ''
Allowed users and their secrets. A secret is a 32 characters long hex string.
···
type = types.attrs;
default = {};
example = {
+
STATS_PRINT_PERIOD = 600;
};
description = ''
Extra configuration options for mtprotoproxy.
+2 -2
nixos/modules/services/networking/ndppd.nix
···
messages, and respond to them according to a set of rules.
'';
default = {};
-
example = { "eth0".rules."1111::/64" = {}; };
};
};
···
'' ];
services.ndppd.proxies = mkIf (cfg.interface != null && cfg.network != null) {
-
"${cfg.interface}".rules."${cfg.network}" = {};
};
systemd.services.ndppd = {
···
messages, and respond to them according to a set of rules.
'';
default = {};
+
example = { eth0.rules."1111::/64" = {}; };
};
};
···
'' ];
services.ndppd.proxies = mkIf (cfg.interface != null && cfg.network != null) {
+
${cfg.interface}.rules.${cfg.network} = {};
};
systemd.services.ndppd = {
+5 -5
nixos/modules/services/networking/networkmanager.nix
···
'';
dispatcherTypesSubdirMap = {
-
"basic" = "";
-
"pre-up" = "pre-up.d/";
-
"pre-down" = "pre-down.d/";
};
macAddressOpt = mkOption {
···
systemd.packages = cfg.packages;
-
systemd.services."NetworkManager" = {
wantedBy = [ "network.target" ];
restartTriggers = [ configFile ];
···
};
};
-
systemd.services."NetworkManager-dispatcher" = {
wantedBy = [ "network.target" ];
restartTriggers = [ configFile ];
···
'';
dispatcherTypesSubdirMap = {
+
basic = "";
+
pre-up = "pre-up.d/";
+
pre-down = "pre-down.d/";
};
macAddressOpt = mkOption {
···
systemd.packages = cfg.packages;
+
systemd.services.NetworkManager = {
wantedBy = [ "network.target" ];
restartTriggers = [ configFile ];
···
};
};
+
systemd.services.NetworkManager-dispatcher = {
wantedBy = [ "network.target" ];
restartTriggers = [ configFile ];
+2 -2
nixos/modules/services/networking/nsd.nix
···
'';
};
-
systemd.timers."nsd-dnssec" = mkIf dnssec {
description = "Automatic DNSSEC key rollover";
wantedBy = [ "nsd.service" ];
···
};
};
-
systemd.services."nsd-dnssec" = mkIf dnssec {
description = "DNSSEC key rollover";
wantedBy = [ "nsd.service" ];
···
'';
};
+
systemd.timers.nsd-dnssec = mkIf dnssec {
description = "Automatic DNSSEC key rollover";
wantedBy = [ "nsd.service" ];
···
};
};
+
systemd.services.nsd-dnssec = mkIf dnssec {
description = "DNSSEC key rollover";
wantedBy = [ "nsd.service" ];
+1 -1
nixos/modules/services/networking/pdns-recursor.nix
···
config = mkIf cfg.enable {
-
users.users."${username}" = {
home = dataDir;
createHome = true;
uid = config.ids.uids.pdns-recursor;
···
config = mkIf cfg.enable {
+
users.users.${username} = {
home = dataDir;
createHome = true;
uid = config.ids.uids.pdns-recursor;
+12 -12
nixos/modules/services/networking/quicktun.nix
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
environment = {
-
"INTERFACE" = name;
-
"TUN_MODE" = toString qtcfg.tunMode;
-
"REMOTE_ADDRESS" = qtcfg.remoteAddress;
-
"LOCAL_ADDRESS" = qtcfg.localAddress;
-
"LOCAL_PORT" = toString qtcfg.localPort;
-
"REMOTE_PORT" = toString qtcfg.remotePort;
-
"REMOTE_FLOAT" = toString qtcfg.remoteFloat;
-
"PRIVATE_KEY" = qtcfg.privateKey;
-
"PUBLIC_KEY" = qtcfg.publicKey;
-
"TIME_WINDOW" = toString qtcfg.timeWindow;
-
"TUN_UP_SCRIPT" = pkgs.writeScript "quicktun-${name}-up.sh" qtcfg.upScript;
-
"SUID" = "nobody";
};
serviceConfig = {
Type = "simple";
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
environment = {
+
INTERFACE = name;
+
TUN_MODE = toString qtcfg.tunMode;
+
REMOTE_ADDRESS = qtcfg.remoteAddress;
+
LOCAL_ADDRESS = qtcfg.localAddress;
+
LOCAL_PORT = toString qtcfg.localPort;
+
REMOTE_PORT = toString qtcfg.remotePort;
+
REMOTE_FLOAT = toString qtcfg.remoteFloat;
+
PRIVATE_KEY = qtcfg.privateKey;
+
PUBLIC_KEY = qtcfg.publicKey;
+
TIME_WINDOW = toString qtcfg.timeWindow;
+
TUN_UP_SCRIPT = pkgs.writeScript "quicktun-${name}-up.sh" qtcfg.upScript;
+
SUID = "nobody";
};
serviceConfig = {
Type = "simple";
+1 -1
nixos/modules/services/networking/smokeping.nix
···
];
security.wrappers = {
fping.source = "${pkgs.fping}/bin/fping";
-
"fping6".source = "${pkgs.fping}/bin/fping6";
};
environment.systemPackages = [ pkgs.fping ];
users.users = singleton {
···
];
security.wrappers = {
fping.source = "${pkgs.fping}/bin/fping";
+
fping6.source = "${pkgs.fping}/bin/fping6";
};
environment.systemPackages = [ pkgs.fping ];
users.users = singleton {
+1 -1
nixos/modules/services/networking/softether.nix
···
mkMerge [{
environment.systemPackages = [ package ];
-
systemd.services."softether-init" = {
description = "SoftEther VPN services initial task";
after = [ "keys.target" ];
wants = [ "keys.target" ];
···
mkMerge [{
environment.systemPackages = [ package ];
+
systemd.services.softether-init = {
description = "SoftEther VPN services initial task";
after = [ "keys.target" ];
wants = [ "keys.target" ];
+1 -1
nixos/modules/services/networking/strongswan-swanctl/param-constructors.nix
···
StrongSwan default: <literal><![CDATA[${builtins.toJSON strongswanDefault}]]></literal>
'';
-
single = f: name: value: { "${name}" = f value; };
mkStrParam = mkParamOfType types.str;
mkOptionalStrParam = mkStrParam null;
···
StrongSwan default: <literal><![CDATA[${builtins.toJSON strongswanDefault}]]></literal>
'';
+
single = f: name: value: { ${name} = f value; };
mkStrParam = mkParamOfType types.str;
mkOptionalStrParam = mkStrParam null;
+4 -4
nixos/modules/services/networking/strongswan-swanctl/param-lib.nix
···
mkConf = indent : ps :
concatMapStringsSep "\n"
(name:
-
let value = ps."${name}";
indentation = replicate indent " ";
in
indentation + (
···
) set);
# Recursively map over every parameter in the given attribute set.
-
mapParamsRecursive = mapAttrsRecursiveCond' (as: (!(as ? "_type" && as._type == "param")));
mapAttrsRecursiveCond' = cond: f: set:
let
···
g =
name: value:
if isAttrs value && cond value
-
then { "${name}" = recurse (path ++ [name]) value; }
else f (path ++ [name]) name value;
in mapAttrs'' g set;
in recurse [] set;
···
# Extract the options from the given set of parameters.
paramsToOptions = ps :
-
mapParamsRecursive (_path: name: param: { "${name}" = param.option; }) ps;
}
···
mkConf = indent : ps :
concatMapStringsSep "\n"
(name:
+
let value = ps.${name};
indentation = replicate indent " ";
in
indentation + (
···
) set);
# Recursively map over every parameter in the given attribute set.
+
mapParamsRecursive = mapAttrsRecursiveCond' (as: (!(as ? _type && as._type == "param")));
mapAttrsRecursiveCond' = cond: f: set:
let
···
g =
name: value:
if isAttrs value && cond value
+
then { ${name} = recurse (path ++ [name]) value; }
else f (path ++ [name]) name value;
in mapAttrs'' g set;
in recurse [] set;
···
# Extract the options from the given set of parameters.
paramsToOptions = ps :
+
mapParamsRecursive (_path: name: param: { ${name} = param.option; }) ps;
}
+2 -2
nixos/modules/services/networking/syncthing.nix
···
systemd.packages = [ pkgs.syncthing ];
users.users = mkIf (cfg.systemService && cfg.user == defaultUser) {
-
"${defaultUser}" =
{ group = cfg.group;
home = cfg.dataDir;
createHome = true;
···
};
users.groups = mkIf (cfg.systemService && cfg.group == defaultUser) {
-
"${defaultUser}".gid =
config.ids.gids.syncthing;
};
···
systemd.packages = [ pkgs.syncthing ];
users.users = mkIf (cfg.systemService && cfg.user == defaultUser) {
+
${defaultUser} =
{ group = cfg.group;
home = cfg.dataDir;
createHome = true;
···
};
users.groups = mkIf (cfg.systemService && cfg.group == defaultUser) {
+
${defaultUser}.gid =
config.ids.gids.syncthing;
};
+2 -2
nixos/modules/services/networking/websockify.nix
···
scriptArgs = "%i";
};
-
systemd.targets."default-websockify" = {
description = "Target to start all default websockify@ services";
-
unitConfig."X-StopOnReconfiguration" = true;
wants = mapAttrsToList (name: value: "websockify@${name}:${toString value}.service") cfg.portMap;
wantedBy = [ "multi-user.target" ];
};
···
scriptArgs = "%i";
};
+
systemd.targets.default-websockify = {
description = "Target to start all default websockify@ services";
+
unitConfig.X-StopOnReconfiguration = true;
wants = mapAttrsToList (name: value: "websockify@${name}:${toString value}.service") cfg.portMap;
wantedBy = [ "multi-user.target" ];
};
+2 -2
nixos/modules/services/networking/zerobin.nix
···
};
config = mkIf (cfg.enable) {
-
users.users."${cfg.user}" =
if cfg.user == "zerobin" then {
isSystemUser = true;
group = cfg.group;
···
createHome = true;
}
else {};
-
users.groups."${cfg.group}" = {};
systemd.services.zerobin = {
enable = true;
···
};
config = mkIf (cfg.enable) {
+
users.users.${cfg.user} =
if cfg.user == "zerobin" then {
isSystemUser = true;
group = cfg.group;
···
createHome = true;
}
else {};
+
users.groups.${cfg.group} = {};
systemd.services.zerobin = {
enable = true;
+1 -1
nixos/modules/services/printing/cupsd.nix
···
};
environment.systemPackages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper;
-
environment.etc."cups".source = "/var/lib/cups";
services.dbus.packages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper;
···
};
environment.systemPackages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper;
+
environment.etc.cups.source = "/var/lib/cups";
services.dbus.packages = [ cups.out ] ++ optional polkitEnabled cups-pk-helper;
+1 -1
nixos/modules/services/security/fprot.nix
···
services.cron.systemCronJobs = [ "*/${toString cfg.updater.frequency} * * * * root start fprot-updater" ];
-
systemd.services."fprot-updater" = {
serviceConfig = {
Type = "oneshot";
RemainAfterExit = false;
···
services.cron.systemCronJobs = [ "*/${toString cfg.updater.frequency} * * * * root start fprot-updater" ];
+
systemd.services.fprot-updater = {
serviceConfig = {
Type = "oneshot";
RemainAfterExit = false;
+1 -1
nixos/modules/services/security/physlock.nix
···
# for physlock -l and physlock -L
environment.systemPackages = [ pkgs.physlock ];
-
systemd.services."physlock" = {
enable = true;
description = "Physlock";
wantedBy = optional cfg.lockOn.suspend "suspend.target"
···
# for physlock -l and physlock -L
environment.systemPackages = [ pkgs.physlock ];
+
systemd.services.physlock = {
enable = true;
description = "Physlock";
wantedBy = optional cfg.lockOn.suspend "suspend.target"
+1 -1
nixos/modules/services/security/sks.nix
···
hkpAddress = "'" + (builtins.concatStringsSep " " cfg.hkpAddress) + "'" ;
hkpPort = builtins.toString cfg.hkpPort;
in {
-
"sks-db" = {
description = "SKS database server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
···
hkpAddress = "'" + (builtins.concatStringsSep " " cfg.hkpAddress) + "'" ;
hkpPort = builtins.toString cfg.hkpPort;
in {
+
sks-db = {
description = "SKS database server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
+1 -1
nixos/modules/services/system/localtime.nix
···
config = mkIf cfg.enable {
services.geoclue2 = {
enable = true;
-
appConfig."localtime" = {
isAllowed = true;
isSystem = true;
};
···
config = mkIf cfg.enable {
services.geoclue2 = {
enable = true;
+
appConfig.localtime = {
isAllowed = true;
isSystem = true;
};
+3 -3
nixos/modules/services/torrent/deluge.nix
···
services.deluge.extraPackages = with pkgs; [ unzip gnutar xz p7zip bzip2 ];
systemd.tmpfiles.rules = [ "d '${configDir}' 0770 ${cfg.user} ${cfg.group}" ]
-
++ optional (cfg.config ? "download_location")
"d '${cfg.config.download_location}' 0770 ${cfg.user} ${cfg.group}"
-
++ optional (cfg.config ? "torrentfiles_location")
"d '${cfg.config.torrentfiles_location}' 0770 ${cfg.user} ${cfg.group}"
-
++ optional (cfg.config ? "move_completed_path")
"d '${cfg.config.move_completed_path}' 0770 ${cfg.user} ${cfg.group}";
systemd.services.deluged = {
···
services.deluge.extraPackages = with pkgs; [ unzip gnutar xz p7zip bzip2 ];
systemd.tmpfiles.rules = [ "d '${configDir}' 0770 ${cfg.user} ${cfg.group}" ]
+
++ optional (cfg.config ? download_location)
"d '${cfg.config.download_location}' 0770 ${cfg.user} ${cfg.group}"
+
++ optional (cfg.config ? torrentfiles_location)
"d '${cfg.config.torrentfiles_location}' 0770 ${cfg.user} ${cfg.group}"
+
++ optional (cfg.config ? move_completed_path)
"d '${cfg.config.move_completed_path}' 0770 ${cfg.user} ${cfg.group}";
systemd.services.deluged = {
+1 -1
nixos/modules/services/ttys/agetty.nix
···
restartIfChanged = false;
};
-
systemd.services."console-getty" =
{ serviceConfig.ExecStart = [
"" # override upstream default with an empty ExecStart
(gettyCmd "--noclear --keep-baud console 115200,38400,9600 $TERM")
···
restartIfChanged = false;
};
+
systemd.services.console-getty =
{ serviceConfig.ExecStart = [
"" # override upstream default with an empty ExecStart
(gettyCmd "--noclear --keep-baud console 115200,38400,9600 $TERM")
+2 -2
nixos/modules/services/web-apps/atlassian/confluence.nix
···
};
config = mkIf cfg.enable {
-
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.groups."${cfg.group}" = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} - - -"
···
};
config = mkIf cfg.enable {
+
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
};
+
users.groups.${cfg.group} = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} - - -"
+2 -2
nixos/modules/services/web-apps/atlassian/crowd.nix
···
};
config = mkIf cfg.enable {
-
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.groups."${cfg.group}" = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} ${cfg.group} - -"
···
};
config = mkIf cfg.enable {
+
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
};
+
users.groups.${cfg.group} = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} ${cfg.group} - -"
+2 -2
nixos/modules/services/web-apps/atlassian/jira.nix
···
};
config = mkIf cfg.enable {
-
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
};
-
users.groups."${cfg.group}" = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} - - -"
···
};
config = mkIf cfg.enable {
+
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
};
+
users.groups.${cfg.group} = {};
systemd.tmpfiles.rules = [
"d '${cfg.home}' - ${cfg.user} - - -"
+3 -3
nixos/modules/services/web-apps/icingaweb2/icingaweb2.nix
···
config = mkIf cfg.enable {
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
-
"${poolName}" = ''
listen = "${phpfpmSocketName}"
listen.owner = nginx
listen.group = nginx
···
services.nginx = {
enable = true;
virtualHosts = mkIf (cfg.virtualHost != null) {
-
"${cfg.virtualHost}" = {
root = "${pkgs.icingaweb2}/public";
extraConfig = ''
···
# /etc/icingaweb2
environment.etc = let
-
doModule = name: optionalAttrs (cfg.modules."${name}".enable) { "icingaweb2/enabledModules/${name}".source = "${pkgs.icingaweb2}/modules/${name}"; };
in {}
# Module packages
// (mapAttrs' (k: v: nameValuePair "icingaweb2/enabledModules/${k}" { source = v; }) cfg.modulePackages)
···
config = mkIf cfg.enable {
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
+
${poolName} = ''
listen = "${phpfpmSocketName}"
listen.owner = nginx
listen.group = nginx
···
services.nginx = {
enable = true;
virtualHosts = mkIf (cfg.virtualHost != null) {
+
${cfg.virtualHost} = {
root = "${pkgs.icingaweb2}/public";
extraConfig = ''
···
# /etc/icingaweb2
environment.etc = let
+
doModule = name: optionalAttrs (cfg.modules.${name}.enable) { "icingaweb2/enabledModules/${name}".source = "${pkgs.icingaweb2}/modules/${name}"; };
in {}
# Module packages
// (mapAttrs' (k: v: nameValuePair "icingaweb2/enabledModules/${k}" { source = v; }) cfg.modulePackages)
+1 -1
nixos/modules/services/web-apps/icingaweb2/module-monitoring.nix
···
};
backends = mkOption {
-
default = { "icinga" = { resource = "icinga_ido"; }; };
description = "Monitoring backends to define";
type = attrsOf (submodule ({ name, ... }: {
options = {
···
};
backends = mkOption {
+
default = { icinga = { resource = "icinga_ido"; }; };
description = "Monitoring backends to define";
type = attrsOf (submodule ({ name, ... }: {
options = {
+1 -1
nixos/modules/services/web-apps/limesurvey.nix
···
systemd.services.httpd.after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.service";
-
users.users."${user}".group = group;
};
}
···
systemd.services.httpd.after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.service";
+
users.users.${user}.group = group;
};
}
+10 -10
nixos/modules/services/web-apps/nextcloud.nix
···
phpOptions = mkOption {
type = types.attrsOf types.str;
default = {
-
"short_open_tag" = "Off";
-
"expose_php" = "Off";
-
"error_reporting" = "E_ALL & ~E_DEPRECATED & ~E_STRICT";
-
"display_errors" = "stderr";
"opcache.enable_cli" = "1";
"opcache.interned_strings_buffer" = "8";
"opcache.max_accelerated_files" = "10000";
···
"opcache.revalidate_freq" = "1";
"opcache.fast_shutdown" = "1";
"openssl.cafile" = "/etc/ssl/certs/ca-certificates.crt";
-
"catch_workers_output" = "yes";
};
description = ''
Options for PHP's php.ini file for nextcloud.
···
];
}
-
{ systemd.timers."nextcloud-cron" = {
wantedBy = [ "timers.target" ];
timerConfig.OnBootSec = "5m";
timerConfig.OnUnitActiveSec = "15m";
···
};
systemd.services = {
-
"nextcloud-setup" = let
c = cfg.config;
writePhpArrary = a: "[${concatMapStringsSep "," (val: ''"${toString val}"'') a}]";
overrideConfig = pkgs.writeText "nextcloud-config.php" ''
···
'';
serviceConfig.Type = "oneshot";
};
-
"nextcloud-cron" = {
environment.NEXTCLOUD_CONFIG_DIR = "${cfg.home}/config";
serviceConfig.Type = "oneshot";
serviceConfig.User = "nextcloud";
serviceConfig.ExecStart = "${phpPackage}/bin/php -f ${pkgs.nextcloud}/cron.php";
};
-
"nextcloud-update-plugins" = mkIf cfg.autoUpdateApps.enable {
serviceConfig.Type = "oneshot";
serviceConfig.ExecStart = "${occ}/bin/nextcloud-occ app:update --all";
startAt = cfg.autoUpdateApps.startAt;
···
services.nginx = {
enable = true;
virtualHosts = {
-
"${cfg.hostName}" = {
root = pkgs.nextcloud;
locations = {
"= /robots.txt" = {
···
phpOptions = mkOption {
type = types.attrsOf types.str;
default = {
+
short_open_tag = "Off";
+
expose_php = "Off";
+
error_reporting = "E_ALL & ~E_DEPRECATED & ~E_STRICT";
+
display_errors = "stderr";
"opcache.enable_cli" = "1";
"opcache.interned_strings_buffer" = "8";
"opcache.max_accelerated_files" = "10000";
···
"opcache.revalidate_freq" = "1";
"opcache.fast_shutdown" = "1";
"openssl.cafile" = "/etc/ssl/certs/ca-certificates.crt";
+
catch_workers_output = "yes";
};
description = ''
Options for PHP's php.ini file for nextcloud.
···
];
}
+
{ systemd.timers.nextcloud-cron = {
wantedBy = [ "timers.target" ];
timerConfig.OnBootSec = "5m";
timerConfig.OnUnitActiveSec = "15m";
···
};
systemd.services = {
+
nextcloud-setup = let
c = cfg.config;
writePhpArrary = a: "[${concatMapStringsSep "," (val: ''"${toString val}"'') a}]";
overrideConfig = pkgs.writeText "nextcloud-config.php" ''
···
'';
serviceConfig.Type = "oneshot";
};
+
nextcloud-cron = {
environment.NEXTCLOUD_CONFIG_DIR = "${cfg.home}/config";
serviceConfig.Type = "oneshot";
serviceConfig.User = "nextcloud";
serviceConfig.ExecStart = "${phpPackage}/bin/php -f ${pkgs.nextcloud}/cron.php";
};
+
nextcloud-update-plugins = mkIf cfg.autoUpdateApps.enable {
serviceConfig.Type = "oneshot";
serviceConfig.ExecStart = "${occ}/bin/nextcloud-occ app:update --all";
startAt = cfg.autoUpdateApps.startAt;
···
services.nginx = {
enable = true;
virtualHosts = {
+
${cfg.hostName} = {
root = pkgs.nextcloud;
locations = {
"= /robots.txt" = {
+2 -2
nixos/modules/services/web-apps/nexus.nix
···
};
config = mkIf cfg.enable {
-
users.users."${cfg.user}" = {
isSystemUser = true;
group = cfg.group;
home = cfg.home;
createHome = true;
};
-
users.groups."${cfg.group}" = {};
systemd.services.nexus = {
description = "Sonatype Nexus3";
···
};
config = mkIf cfg.enable {
+
users.users.${cfg.user} = {
isSystemUser = true;
group = cfg.group;
home = cfg.home;
createHome = true;
};
+
users.groups.${cfg.group} = {};
systemd.services.nexus = {
description = "Sonatype Nexus3";
+1 -1
nixos/modules/services/web-apps/pgpkeyserver-lite.nix
···
services.nginx.virtualHosts = let
hkpPort = builtins.toString cfg.hkpPort;
in {
-
"${cfg.hostname}" = {
root = webPkg;
locations = {
"/pks".extraConfig = ''
···
services.nginx.virtualHosts = let
hkpPort = builtins.toString cfg.hkpPort;
in {
+
${cfg.hostname} = {
root = webPkg;
locations = {
"/pks".extraConfig = ''
+2 -2
nixos/modules/services/web-apps/restya-board.nix
···
config = mkIf cfg.enable {
services.phpfpm.pools = {
-
"${poolName}" = {
listen = phpfpmSocketName;
phpOptions = ''
date.timezone = "CET"
···
};
services.nginx.enable = true;
-
services.nginx.virtualHosts."${cfg.virtualHost.serverName}" = {
listen = [ { addr = cfg.virtualHost.listenHost; port = cfg.virtualHost.listenPort; } ];
serverName = cfg.virtualHost.serverName;
root = runDir;
···
config = mkIf cfg.enable {
services.phpfpm.pools = {
+
${poolName} = {
listen = phpfpmSocketName;
phpOptions = ''
date.timezone = "CET"
···
};
services.nginx.enable = true;
+
services.nginx.virtualHosts.${cfg.virtualHost.serverName} = {
listen = [ { addr = cfg.virtualHost.listenHost; port = cfg.virtualHost.listenPort; } ];
serverName = cfg.virtualHost.serverName;
root = runDir;
+1 -1
nixos/modules/services/web-apps/selfoss.nix
···
config = mkIf cfg.enable {
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
-
"${poolName}" = ''
listen = "${phpfpmSocketName}";
listen.owner = nginx
listen.group = nginx
···
config = mkIf cfg.enable {
services.phpfpm.poolConfigs = mkIf (cfg.pool == "${poolName}") {
+
${poolName} = ''
listen = "${phpfpmSocketName}";
listen.owner = nginx
listen.group = nginx
+2 -2
nixos/modules/services/web-apps/tt-rss.nix
···
];
services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") {
-
"${poolName}" = {
listen = "/var/run/phpfpm/${poolName}.sock";
extraConfig = ''
listen.owner = nginx
···
services.nginx = mkIf (cfg.virtualHost != null) {
enable = true;
virtualHosts = {
-
"${cfg.virtualHost}" = {
root = "${cfg.root}";
locations."/" = {
···
];
services.phpfpm.pools = mkIf (cfg.pool == "${poolName}") {
+
${poolName} = {
listen = "/var/run/phpfpm/${poolName}.sock";
extraConfig = ''
listen.owner = nginx
···
services.nginx = mkIf (cfg.virtualHost != null) {
enable = true;
virtualHosts = {
+
${cfg.virtualHost} = {
root = "${cfg.root}";
locations."/" = {
+1 -1
nixos/modules/services/web-apps/zabbix.nix
···
<?php
// Zabbix GUI configuration file.
global $DB;
-
$DB['TYPE'] = '${ { "mysql" = "MYSQL"; "pgsql" = "POSTGRESQL"; "oracle" = "ORACLE"; }.${cfg.database.type} }';
$DB['SERVER'] = '${cfg.database.host}';
$DB['PORT'] = '${toString cfg.database.port}';
$DB['DATABASE'] = '${cfg.database.name}';
···
<?php
// Zabbix GUI configuration file.
global $DB;
+
$DB['TYPE'] = '${ { mysql = "MYSQL"; pgsql = "POSTGRESQL"; oracle = "ORACLE"; }.${cfg.database.type} }';
$DB['SERVER'] = '${cfg.database.host}';
$DB['PORT'] = '${toString cfg.database.port}';
$DB['DATABASE'] = '${cfg.database.name}';
+1 -1
nixos/modules/services/x11/clight.nix
···
longitude = mkDefault config.location.longitude;
});
-
services.geoclue2.appConfig."clightc" = {
isAllowed = true;
isSystem = true;
};
···
longitude = mkDefault config.location.longitude;
});
+
services.geoclue2.appConfig.clightc = {
isAllowed = true;
isSystem = true;
};
+2 -2
nixos/modules/services/x11/desktop-managers/gnome3.nix
···
# GNOME should have its own geoclue agent
services.geoclue2.enableDemoAgent = false;
-
services.geoclue2.appConfig."gnome-datetime-panel" = {
isAllowed = true;
isSystem = true;
};
-
services.geoclue2.appConfig."gnome-color-panel" = {
isAllowed = true;
isSystem = true;
};
···
# GNOME should have its own geoclue agent
services.geoclue2.enableDemoAgent = false;
+
services.geoclue2.appConfig.gnome-datetime-panel = {
isAllowed = true;
isSystem = true;
};
+
services.geoclue2.appConfig.gnome-color-panel = {
isAllowed = true;
isSystem = true;
};
+1 -1
nixos/modules/services/x11/desktop-managers/mate.nix
···
services.gnome3.gvfs.enable = true;
services.upower.enable = config.powerManagement.enable;
-
security.pam.services."mate-screensaver".unixAuth = true;
environment.variables.GIO_EXTRA_MODULES = [ "${pkgs.gnome3.gvfs}/lib/gio/modules" ];
···
services.gnome3.gvfs.enable = true;
services.upower.enable = config.powerManagement.enable;
+
security.pam.services.mate-screensaver.unixAuth = true;
environment.variables.GIO_EXTRA_MODULES = [ "${pkgs.gnome3.gvfs}/lib/gio/modules" ];
+1 -1
nixos/modules/services/x11/desktop-managers/plasma5.nix
···
security.wrappers = {
kcheckpass.source = "${lib.getBin plasma5.kscreenlocker}/libexec/kcheckpass";
-
"start_kdeinit".source = "${lib.getBin pkgs.kinit}/libexec/kf5/start_kdeinit";
kwin_wayland = {
source = "${lib.getBin plasma5.kwin}/bin/kwin_wayland";
capabilities = "cap_sys_nice+ep";
···
security.wrappers = {
kcheckpass.source = "${lib.getBin plasma5.kscreenlocker}/libexec/kcheckpass";
+
start_kdeinit.source = "${lib.getBin pkgs.kinit}/libexec/kf5/start_kdeinit";
kwin_wayland = {
source = "${lib.getBin plasma5.kwin}/bin/kwin_wayland";
capabilities = "cap_sys_nice+ep";
+1 -1
nixos/modules/services/x11/display-managers/lightdm.nix
···
xcfg = config.services.xserver;
dmcfg = xcfg.displayManager;
-
xEnv = config.systemd.services."display-manager".environment;
cfg = dmcfg.lightdm;
dmDefault = xcfg.desktopManager.default;
···
xcfg = config.services.xserver;
dmcfg = xcfg.displayManager;
+
xEnv = config.systemd.services.display-manager.environment;
cfg = dmcfg.lightdm;
dmDefault = xcfg.desktopManager.default;
+1 -1
nixos/modules/services/x11/display-managers/sddm.nix
···
xcfg = config.services.xserver;
dmcfg = xcfg.displayManager;
cfg = dmcfg.sddm;
-
xEnv = config.systemd.services."display-manager".environment;
inherit (pkgs) sddm;
···
xcfg = config.services.xserver;
dmcfg = xcfg.displayManager;
cfg = dmcfg.sddm;
+
xEnv = config.systemd.services.display-manager.environment;
inherit (pkgs) sddm;
+1 -1
nixos/modules/services/x11/hardware/synaptics.nix
···
services.xserver.modules = [ pkg.out ];
-
environment.etc."${etcFile}".source =
"${pkg.out}/share/X11/xorg.conf.d/70-synaptics.conf";
environment.systemPackages = [ pkg ];
···
services.xserver.modules = [ pkg.out ];
+
environment.etc.${etcFile}.source =
"${pkg.out}/share/X11/xorg.conf.d/70-synaptics.conf";
environment.systemPackages = [ pkg ];
+1 -1
nixos/modules/services/x11/redshift.nix
···
# needed so that .desktop files are installed, which geoclue cares about
environment.systemPackages = [ cfg.package ];
-
services.geoclue2.appConfig."redshift" = {
isAllowed = true;
isSystem = true;
};
···
# needed so that .desktop files are installed, which geoclue cares about
environment.systemPackages = [ cfg.package ];
+
services.geoclue2.appConfig.redshift = {
isAllowed = true;
isSystem = true;
};
+1 -1
nixos/modules/services/x11/xautolock.nix
···
] ++ (lib.flip map [ "locker" "notifier" "nowlocker" "killer" ]
(option:
{
-
assertion = cfg."${option}" != null -> builtins.substring 0 1 cfg."${option}" == "/";
message = "Please specify a canonical path for `services.xserver.xautolock.${option}`";
})
);
···
] ++ (lib.flip map [ "locker" "notifier" "nowlocker" "killer" ]
(option:
{
+
assertion = cfg.${option} != null -> builtins.substring 0 1 cfg.${option} == "/";
message = "Please specify a canonical path for `services.xserver.xautolock.${option}`";
})
);
+1 -1
nixos/modules/system/boot/kernel.nix
···
source = kernelModulesConf;
};
-
systemd.services."systemd-modules-load" =
{ wantedBy = [ "multi-user.target" ];
restartTriggers = [ kernelModulesConf ];
serviceConfig =
···
source = kernelModulesConf;
};
+
systemd.services.systemd-modules-load =
{ wantedBy = [ "multi-user.target" ];
restartTriggers = [ kernelModulesConf ];
serviceConfig =
+1 -1
nixos/modules/system/boot/kexec.nix
···
config = lib.mkIf (lib.any (lib.meta.platformMatch pkgs.stdenv.hostPlatform) pkgs.kexectools.meta.platforms) {
environment.systemPackages = [ pkgs.kexectools ];
-
systemd.services."prepare-kexec" =
{ description = "Preparation for kexec";
wantedBy = [ "kexec.target" ];
before = [ "systemd-kexec.service" ];
···
config = lib.mkIf (lib.any (lib.meta.platformMatch pkgs.stdenv.hostPlatform) pkgs.kexectools.meta.platforms) {
environment.systemPackages = [ pkgs.kexectools ];
+
systemd.services.prepare-kexec =
{ description = "Preparation for kexec";
wantedBy = [ "kexec.target" ];
before = [ "systemd-kexec.service" ];
+1 -1
nixos/modules/system/boot/loader/grub/grub.nix
···
else "${convertedFont}");
});
-
bootDeviceCounters = fold (device: attr: attr // { "${device}" = (attr."${device}" or 0) + 1; }) {}
(concatMap (args: args.devices) cfg.mirroredBoots);
convertedFont = (pkgs.runCommand "grub-font-converted.pf2" {}
···
else "${convertedFont}");
});
+
bootDeviceCounters = fold (device: attr: attr // { ${device} = (attr.${device} or 0) + 1; }) {}
(concatMap (args: args.devices) cfg.mirroredBoots);
convertedFont = (pkgs.runCommand "grub-font-converted.pf2" {}
+1 -1
nixos/modules/system/boot/luksroot.nix
···
boot.initrd.luks.devices = mkOption {
default = { };
-
example = { "luksroot".device = "/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08"; };
description = ''
The encrypted disk that should be opened before the root
filesystem is mounted. Both LVM-over-LUKS and LUKS-over-LVM
···
boot.initrd.luks.devices = mkOption {
default = { };
+
example = { luksroot.device = "/dev/disk/by-uuid/430e9eff-d852-4f68-aa3b-2fa3599ebe08"; };
description = ''
The encrypted disk that should be opened before the root
filesystem is mounted. Both LVM-over-LUKS and LUKS-over-LVM
+1 -1
nixos/modules/system/boot/systemd-nspawn.nix
···
environment.etc."systemd/nspawn".source = generateUnits "nspawn" units [] [];
-
systemd.targets."multi-user".wants = [ "machines.target" ];
};
}
···
environment.etc."systemd/nspawn".source = generateUnits "nspawn" units [] [];
+
systemd.targets.multi-user.wants = [ "machines.target" ];
};
}
+2 -2
nixos/modules/system/boot/systemd.nix
···
[Service]
${let env = cfg.globalEnvironment // def.environment;
in concatMapStrings (n:
-
let s = optionalString (env."${n}" != null)
"Environment=${builtins.toJSON "${n}=${env.${n}}"}\n";
# systemd max line length is now 1MiB
# https://github.com/systemd/systemd/commit/e6dde451a51dc5aaa7f4d98d39b8fe735f73d2af
···
systemd.generators = mkOption {
type = types.attrsOf types.path;
default = {};
-
example = { "systemd-gpt-auto-generator" = "/dev/null"; };
description = ''
Definition of systemd generators.
For each <literal>NAME = VALUE</literal> pair of the attrSet, a link is generated from
···
[Service]
${let env = cfg.globalEnvironment // def.environment;
in concatMapStrings (n:
+
let s = optionalString (env.${n} != null)
"Environment=${builtins.toJSON "${n}=${env.${n}}"}\n";
# systemd max line length is now 1MiB
# https://github.com/systemd/systemd/commit/e6dde451a51dc5aaa7f4d98d39b8fe735f73d2af
···
systemd.generators = mkOption {
type = types.attrsOf types.path;
default = {};
+
example = { systemd-gpt-auto-generator = "/dev/null"; };
description = ''
Definition of systemd generators.
For each <literal>NAME = VALUE</literal> pair of the attrSet, a link is generated from
+2 -2
nixos/modules/tasks/filesystems.nix
···
fileSystems' = toposort fsBefore (attrValues config.fileSystems);
-
fileSystems = if fileSystems' ? "result"
then # use topologically sorted fileSystems everywhere
fileSystems'.result
else # the assertion below will catch this,
···
ls = sep: concatMapStringsSep sep (x: x.mountPoint);
notAutoResizable = fs: fs.autoResize && !(hasPrefix "ext" fs.fsType || fs.fsType == "f2fs");
in [
-
{ assertion = ! (fileSystems' ? "cycle");
message = "The ‘fileSystems’ option can't be topologically sorted: mountpoint dependency path ${ls " -> " fileSystems'.cycle} loops to ${ls ", " fileSystems'.loops}";
}
{ assertion = ! (any notAutoResizable fileSystems);
···
fileSystems' = toposort fsBefore (attrValues config.fileSystems);
+
fileSystems = if fileSystems' ? result
then # use topologically sorted fileSystems everywhere
fileSystems'.result
else # the assertion below will catch this,
···
ls = sep: concatMapStringsSep sep (x: x.mountPoint);
notAutoResizable = fs: fs.autoResize && !(hasPrefix "ext" fs.fsType || fs.fsType == "f2fs");
in [
+
{ assertion = ! (fileSystems' ? cycle);
message = "The ‘fileSystems’ option can't be topologically sorted: mountpoint dependency path ${ls " -> " fileSystems'.cycle} loops to ${ls ", " fileSystems'.loops}";
}
{ assertion = ! (any notAutoResizable fileSystems);
+2 -2
nixos/modules/tasks/filesystems/zfs.nix
···
map createSyncService allPools ++
map createZfsService [ "zfs-mount" "zfs-share" "zfs-zed" ]);
-
systemd.targets."zfs-import" =
let
services = map (pool: "zfs-import-${pool}.service") dataPools;
in
···
wantedBy = [ "zfs.target" ];
};
-
systemd.targets."zfs".wantedBy = [ "multi-user.target" ];
})
(mkIf enableAutoSnapshots {
···
map createSyncService allPools ++
map createZfsService [ "zfs-mount" "zfs-share" "zfs-zed" ]);
+
systemd.targets.zfs-import =
let
services = map (pool: "zfs-import-${pool}.service") dataPools;
in
···
wantedBy = [ "zfs.target" ];
};
+
systemd.targets.zfs.wantedBy = [ "multi-user.target" ];
})
(mkIf enableAutoSnapshots {
+3 -3
nixos/modules/tasks/kbd.nix
···
config = mkMerge [
(mkIf (!setVconsole) {
-
systemd.services."systemd-vconsole-setup".enable = false;
})
(mkIf setVconsole (mkMerge [
···
# virtual consoles.
environment.etc."vconsole.conf".source = vconsoleConf;
# Provide kbd with additional packages.
-
environment.etc."kbd".source = "${kbdEnv}/share";
boot.initrd.preLVMCommands = mkBefore ''
kbd_mode ${if isUnicode then "-u" else "-a"} -C /dev/console
···
'') config.i18n.consoleColors}
'';
-
systemd.services."systemd-vconsole-setup" =
{ before = [ "display-manager.service" ];
after = [ "systemd-udev-settle.service" ];
restartTriggers = [ vconsoleConf kbdEnv ];
···
config = mkMerge [
(mkIf (!setVconsole) {
+
systemd.services.systemd-vconsole-setup.enable = false;
})
(mkIf setVconsole (mkMerge [
···
# virtual consoles.
environment.etc."vconsole.conf".source = vconsoleConf;
# Provide kbd with additional packages.
+
environment.etc.kbd.source = "${kbdEnv}/share";
boot.initrd.preLVMCommands = mkBefore ''
kbd_mode ${if isUnicode then "-u" else "-a"} -C /dev/console
···
'') config.i18n.consoleColors}
'';
+
systemd.services.systemd-vconsole-setup =
{ before = [ "display-manager.service" ];
after = [ "systemd-udev-settle.service" ];
restartTriggers = [ vconsoleConf kbdEnv ];
+2 -2
nixos/modules/tasks/network-interfaces-scripted.nix
···
// mapAttrs' createSitDevice cfg.sits
// mapAttrs' createVlanDevice cfg.vlans
// {
-
"network-setup" = networkSetup;
-
"network-local-commands" = networkLocalCommands;
};
services.udev.extraRules =
···
// mapAttrs' createSitDevice cfg.sits
// mapAttrs' createVlanDevice cfg.vlans
// {
+
network-setup = networkSetup;
+
network-local-commands = networkLocalCommands;
};
services.udev.extraRules =
+3 -3
nixos/modules/tasks/network-interfaces-systemd.nix
···
(mapAttrsToList (k: _: k) do); "";
# get those driverOptions that have been set
filterSystemdOptions = filterAttrs (sysDOpt: kOpts:
-
any (kOpt: do ? "${kOpt}") kOpts.optNames);
# build final set of systemd options to bond values
buildOptionSet = mapAttrs (_: kOpts: with kOpts;
# we simply take the first set kernel bond option
# (one option has multiple names, which is silly)
-
head (map (optN: valTransform (do."${optN}"))
# only map those that exist
-
(filter (o: do ? "${o}") optNames)));
in seq assertNoUnknownOption
(buildOptionSet (filterSystemdOptions driverOptionMapping));
···
(mapAttrsToList (k: _: k) do); "";
# get those driverOptions that have been set
filterSystemdOptions = filterAttrs (sysDOpt: kOpts:
+
any (kOpt: do ? ${kOpt}) kOpts.optNames);
# build final set of systemd options to bond values
buildOptionSet = mapAttrs (_: kOpts: with kOpts;
# we simply take the first set kernel bond option
# (one option has multiple names, which is silly)
+
head (map (optN: valTransform (do.${optN}))
# only map those that exist
+
(filter (o: do ? ${o}) optNames)));
in seq assertNoUnknownOption
(buildOptionSet (filterSystemdOptions driverOptionMapping));
+9 -9
nixos/modules/tasks/network-interfaces.nix
···
networking.wlanInterfaces = mkOption {
default = { };
example = literalExample {
-
"wlan-station0" = {
device = "wlp6s0";
};
-
"wlan-adhoc0" = {
type = "ibss";
device = "wlp6s0";
mac = "02:00:00:00:00:01";
};
-
"wlan-p2p0" = {
device = "wlp6s0";
mac = "02:00:00:00:00:02";
};
-
"wlan-ap0" = {
device = "wlp6s0";
mac = "02:00:00:00:00:03";
};
···
domainname "${cfg.domain}"
'';
-
environment.etc."hostid" = mkIf (cfg.hostId != null)
{ source = pkgs.runCommand "gen-hostid" { preferLocalBuild = true; } ''
hi="${cfg.hostId}"
${if pkgs.stdenv.isBigEndian then ''
···
# static hostname configuration needed for hostnamectl and the
# org.freedesktop.hostname1 dbus service (both provided by systemd)
-
environment.etc."hostname" = mkIf (cfg.hostName != "")
{
text = cfg.hostName + "\n";
};
···
# The network-interfaces target is kept for backwards compatibility.
# New modules must NOT use it.
-
systemd.targets."network-interfaces" =
{ description = "All Network Interfaces (deprecated)";
wantedBy = [ "network.target" ];
before = [ "network.target" ];
···
in
flip (concatMapStringsSep "\n") (attrNames wlanDeviceInterfaces) (device:
let
-
interfaces = wlanListDeviceFirst device wlanDeviceInterfaces."${device}";
curInterface = elemAt interfaces 0;
newInterfaces = drop 1 interfaces;
in ''
# It is important to have that rule first as overwriting the NAME attribute also prevents the
# next rules from matching.
-
${flip (concatMapStringsSep "\n") (wlanListDeviceFirst device wlanDeviceInterfaces."${device}") (interface:
''ACTION=="add", SUBSYSTEM=="net", ENV{DEVTYPE}=="wlan", ENV{INTERFACE}=="${interface._iName}", ${systemdAttrs interface._iName}, RUN+="${newInterfaceScript device interface}"'')}
# Add the required, new WLAN interfaces to the default WLAN interface with the
···
networking.wlanInterfaces = mkOption {
default = { };
example = literalExample {
+
wlan-station0 = {
device = "wlp6s0";
};
+
wlan-adhoc0 = {
type = "ibss";
device = "wlp6s0";
mac = "02:00:00:00:00:01";
};
+
wlan-p2p0 = {
device = "wlp6s0";
mac = "02:00:00:00:00:02";
};
+
wlan-ap0 = {
device = "wlp6s0";
mac = "02:00:00:00:00:03";
};
···
domainname "${cfg.domain}"
'';
+
environment.etc.hostid = mkIf (cfg.hostId != null)
{ source = pkgs.runCommand "gen-hostid" { preferLocalBuild = true; } ''
hi="${cfg.hostId}"
${if pkgs.stdenv.isBigEndian then ''
···
# static hostname configuration needed for hostnamectl and the
# org.freedesktop.hostname1 dbus service (both provided by systemd)
+
environment.etc.hostname = mkIf (cfg.hostName != "")
{
text = cfg.hostName + "\n";
};
···
# The network-interfaces target is kept for backwards compatibility.
# New modules must NOT use it.
+
systemd.targets.network-interfaces =
{ description = "All Network Interfaces (deprecated)";
wantedBy = [ "network.target" ];
before = [ "network.target" ];
···
in
flip (concatMapStringsSep "\n") (attrNames wlanDeviceInterfaces) (device:
let
+
interfaces = wlanListDeviceFirst device wlanDeviceInterfaces.${device};
curInterface = elemAt interfaces 0;
newInterfaces = drop 1 interfaces;
in ''
# It is important to have that rule first as overwriting the NAME attribute also prevents the
# next rules from matching.
+
${flip (concatMapStringsSep "\n") (wlanListDeviceFirst device wlanDeviceInterfaces.${device}) (interface:
''ACTION=="add", SUBSYSTEM=="net", ENV{DEVTYPE}=="wlan", ENV{INTERFACE}=="${interface._iName}", ${systemdAttrs interface._iName}, RUN+="${newInterfaceScript device interface}"'')}
# Add the required, new WLAN interfaces to the default WLAN interface with the
+1 -1
nixos/modules/virtualisation/brightbox-image.nix
···
# Always include cryptsetup so that NixOps can use it.
environment.systemPackages = [ pkgs.cryptsetup ];
-
systemd.services."fetch-ec2-data" =
{ description = "Fetch EC2 Data";
wantedBy = [ "multi-user.target" "sshd.service" ];
···
# Always include cryptsetup so that NixOps can use it.
environment.systemPackages = [ pkgs.cryptsetup ];
+
systemd.services.fetch-ec2-data =
{ description = "Fetch EC2 Data";
wantedBy = [ "multi-user.target" "sshd.service" ];
+1 -1
nixos/modules/virtualisation/containers.nix
···
serviceConfig = serviceDirectives dummyConfig;
};
in {
-
systemd.targets."multi-user".wants = [ "machines.target" ];
systemd.services = listToAttrs (filter (x: x.value != null) (
# The generic container template used by imperative containers
···
serviceConfig = serviceDirectives dummyConfig;
};
in {
+
systemd.targets.multi-user.wants = [ "machines.target" ];
systemd.services = listToAttrs (filter (x: x.value != null) (
# The generic container template used by imperative containers
+1 -1
nixos/modules/virtualisation/ec2-data.nix
···
serviceConfig.RemainAfterExit = true;
};
-
systemd.services."print-host-key" =
{ description = "Print SSH Host Key";
wantedBy = [ "multi-user.target" ];
after = [ "sshd.service" ];
···
serviceConfig.RemainAfterExit = true;
};
+
systemd.services.print-host-key =
{ description = "Print SSH Host Key";
wantedBy = [ "multi-user.target" ];
after = [ "sshd.service" ];
+1 -1
nixos/modules/virtualisation/kvmgt.nix
···
and find info about device via <command>cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description</command>
'';
example = {
-
"i915-GVTg_V5_8" = {
uuid = "a297db4a-f4c2-11e6-90f6-d3b88d6c9525";
};
};
···
and find info about device via <command>cat /sys/bus/pci/devices/*/mdev_supported_types/i915-GVTg_V5_4/description</command>
'';
example = {
+
i915-GVTg_V5_8 = {
uuid = "a297db4a-f4c2-11e6-90f6-d3b88d6c9525";
};
};
+1 -1
nixos/modules/virtualisation/virtualbox-host.nix
···
# Since we lack the right setuid/setcap binaries, set up a host-only network by default.
} (mkIf cfg.addNetworkInterface {
-
systemd.services."vboxnet0" =
{ description = "VirtualBox vboxnet0 Interface";
requires = [ "dev-vboxnetctl.device" ];
after = [ "dev-vboxnetctl.device" ];
···
# Since we lack the right setuid/setcap binaries, set up a host-only network by default.
} (mkIf cfg.addNetworkInterface {
+
systemd.services.vboxnet0 =
{ description = "VirtualBox vboxnet0 Interface";
requires = [ "dev-vboxnetctl.device" ];
after = [ "dev-vboxnetctl.device" ];
+1 -1
nixos/modules/virtualisation/vmware-guest.nix
···
serviceConfig.ExecStart = "${open-vm-tools}/bin/vmtoolsd";
};
-
environment.etc."vmware-tools".source = "${open-vm-tools}/etc/vmware-tools/*";
services.xserver = mkIf (!cfg.headless) {
videoDrivers = mkOverride 50 [ "vmware" ];
···
serviceConfig.ExecStart = "${open-vm-tools}/bin/vmtoolsd";
};
+
environment.etc.vmware-tools.source = "${open-vm-tools}/etc/vmware-tools/*";
services.xserver = mkIf (!cfg.headless) {
videoDrivers = mkOverride 50 [ "vmware" ];
+3 -3
nixos/tests/beegfs.nix
···
}
];
-
environment.etc."${connAuthFile}" = {
enable = true;
text = "ThisIsALousySecret";
mode = "0600";
···
];
environment.systemPackages = with pkgs; [ beegfs ];
-
environment.etc."${connAuthFile}" = {
enable = true;
text = "ThisIsALousySecret";
mode = "0600";
···
services.beegfs.default = {
mgmtdHost = "mgmt";
connAuthFile = "/etc/${connAuthFile}";
-
"${service}" = {
enable = true;
storeDir = "/data";
};
···
}
];
+
environment.etc.${connAuthFile} = {
enable = true;
text = "ThisIsALousySecret";
mode = "0600";
···
];
environment.systemPackages = with pkgs; [ beegfs ];
+
environment.etc.${connAuthFile} = {
enable = true;
text = "ThisIsALousySecret";
mode = "0600";
···
services.beegfs.default = {
mgmtdHost = "mgmt";
connAuthFile = "/etc/${connAuthFile}";
+
${service} = {
enable = true;
storeDir = "/data";
};
+3 -3
nixos/tests/containers-reloadable.nix
···
containers.test1 = {
autoStart = true;
config = {
-
environment.etc."check".text = "client_base";
};
};
···
imports = [ client_base ];
containers.test1.config = {
-
environment.etc."check".text = lib.mkForce "client_c1";
services.httpd.enable = true;
services.httpd.adminAddr = "nixos@example.com";
};
···
imports = [ client_base ];
containers.test1.config = {
-
environment.etc."check".text = lib.mkForce "client_c2";
services.nginx.enable = true;
};
};
···
containers.test1 = {
autoStart = true;
config = {
+
environment.etc.check.text = "client_base";
};
};
···
imports = [ client_base ];
containers.test1.config = {
+
environment.etc.check.text = lib.mkForce "client_c1";
services.httpd.enable = true;
services.httpd.adminAddr = "nixos@example.com";
};
···
imports = [ client_base ];
containers.test1.config = {
+
environment.etc.check.text = lib.mkForce "client_c2";
services.nginx.enable = true;
};
};
+3 -3
nixos/tests/elk.nix
···
'';
};
in mapAttrs mkElkTest {
-
"ELK-5" = {
elasticsearch = pkgs.elasticsearch5;
logstash = pkgs.logstash5;
kibana = pkgs.kibana5;
journalbeat = pkgs.journalbeat5;
};
-
"ELK-6" =
if enableUnfree
then {
elasticsearch = pkgs.elasticsearch6;
···
kibana = pkgs.kibana6-oss;
journalbeat = pkgs.journalbeat6;
};
-
"ELK-7" =
if enableUnfree
then {
elasticsearch = pkgs.elasticsearch7;
···
'';
};
in mapAttrs mkElkTest {
+
ELK-5 = {
elasticsearch = pkgs.elasticsearch5;
logstash = pkgs.logstash5;
kibana = pkgs.kibana5;
journalbeat = pkgs.journalbeat5;
};
+
ELK-6 =
if enableUnfree
then {
elasticsearch = pkgs.elasticsearch6;
···
kibana = pkgs.kibana6-oss;
journalbeat = pkgs.journalbeat6;
};
+
ELK-7 =
if enableUnfree
then {
elasticsearch = pkgs.elasticsearch7;
+1 -1
nixos/tests/env.nix
···
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
-
environment.etc."plainFile".text = ''
Hello World
'';
environment.etc."folder/with/file".text = ''
···
machine = { pkgs, ... }:
{
boot.kernelPackages = pkgs.linuxPackages;
+
environment.etc.plainFile.text = ''
Hello World
'';
environment.etc."folder/with/file".text = ''
+1 -1
nixos/tests/gitlab.nix
···
enable = true;
recommendedProxySettings = true;
virtualHosts = {
-
"localhost" = {
locations."/".proxyPass = "http://unix:/run/gitlab/gitlab-workhorse.socket";
};
};
···
enable = true;
recommendedProxySettings = true;
virtualHosts = {
+
localhost = {
locations."/".proxyPass = "http://unix:/run/gitlab/gitlab-workhorse.socket";
};
};
+1 -1
nixos/tests/kubernetes/base.nix
···
443 # kubernetes apiserver
];
})
-
(optionalAttrs (machine ? "extraConfiguration") (machine.extraConfiguration { inherit config pkgs lib nodes; }))
(optionalAttrs (extraConfiguration != null) (extraConfiguration { inherit config pkgs lib nodes; }))
]
) machines;
···
443 # kubernetes apiserver
];
})
+
(optionalAttrs (machine ? extraConfiguration) (machine.extraConfiguration { inherit config pkgs lib nodes; }))
(optionalAttrs (extraConfiguration != null) (extraConfiguration { inherit config pkgs lib nodes; }))
]
) machines;
+1 -1
nixos/tests/ldap.nix
···
);
slapdDatabases = {
-
"${dbSuffix}" = {
conf = ''
dn: olcBackend={1}mdb,cn=config
objectClass: olcBackendConfig
···
);
slapdDatabases = {
+
${dbSuffix} = {
conf = ''
dn: olcBackend={1}mdb,cn=config
objectClass: olcBackendConfig
+1 -1
nixos/tests/mosquitto.nix
···
enable = true;
host = "0.0.0.0";
checkPasswords = true;
-
users."${username}" = {
inherit password;
acl = [
"topic readwrite ${topic}"
···
enable = true;
host = "0.0.0.0";
checkPasswords = true;
+
users.${username} = {
inherit password;
acl = [
"topic readwrite ${topic}"
+1 -1
nixos/tests/ndppd.nix
···
};
services.ndppd = {
enable = true;
-
proxies."eth1".rules."fd42::/112" = {};
};
containers.client = {
autoStart = true;
···
};
services.ndppd = {
enable = true;
+
proxies.eth1.rules."fd42::/112" = {};
};
containers.client = {
autoStart = true;
+3 -3
nixos/tests/networking.nix
···
virtual = {
name = "Virtual";
machine = {
-
networking.interfaces."tap0" = {
ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2096::"; prefixLength = 64; } ];
virtual = true;
};
-
networking.interfaces."tun0" = {
ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
virtual = true;
···
name = "routes";
machine = {
networking.useDHCP = false;
-
networking.interfaces."eth0" = {
ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
ipv6.routes = [
···
virtual = {
name = "Virtual";
machine = {
+
networking.interfaces.tap0 = {
ipv4.addresses = [ { address = "192.168.1.1"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2096::"; prefixLength = 64; } ];
virtual = true;
};
+
networking.interfaces.tun0 = {
ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
virtual = true;
···
name = "routes";
machine = {
networking.useDHCP = false;
+
networking.interfaces.eth0 = {
ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ];
ipv6.addresses = [ { address = "2001:1470:fffd:2097::"; prefixLength = 64; } ];
ipv6.routes = [
+1 -1
nixos/tests/nextcloud/with-mysql-and-memcached.nix
···
'';
};
-
systemd.services."nextcloud-setup"= {
requires = ["mysql.service"];
after = ["mysql.service"];
};
···
'';
};
+
systemd.services.nextcloud-setup= {
requires = ["mysql.service"];
after = ["mysql.service"];
};
+2 -2
nixos/tests/nextcloud/with-postgresql-and-redis.nix
···
serviceConfig.PermissionsStartOnly = true;
};
-
systemd.services."nextcloud-setup"= {
requires = ["postgresql.service"];
after = [
"postgresql.service"
···
# At the time of writing, redis creates its socket with the "nobody"
# group. I figure this is slightly less bad than making the socket world
# readable.
-
systemd.services."chown-redis-socket" = {
enable = true;
script = ''
until ${pkgs.redis}/bin/redis-cli ping; do
···
serviceConfig.PermissionsStartOnly = true;
};
+
systemd.services.nextcloud-setup= {
requires = ["postgresql.service"];
after = [
"postgresql.service"
···
# At the time of writing, redis creates its socket with the "nobody"
# group. I figure this is slightly less bad than making the socket world
# readable.
+
systemd.services.chown-redis-socket = {
enable = true;
script = ''
until ${pkgs.redis}/bin/redis-cli ping; do
+1 -1
nixos/tests/nghttpx.nix
···
services.nginx = {
enable = true;
-
virtualHosts."server" = {
locations."/".root = nginxRoot;
};
};
···
services.nginx = {
enable = true;
+
virtualHosts.server = {
locations."/".root = nginxRoot;
};
};
+1 -1
nixos/tests/pgmanage.nix
···
pgmanage = {
enable = true;
connections = {
-
"${conn}" = "hostaddr=127.0.0.1 port=${toString config.services.postgresql.port} dbname=postgres";
};
};
};
···
pgmanage = {
enable = true;
connections = {
+
${conn} = "hostaddr=127.0.0.1 port=${toString config.services.postgresql.port} dbname=postgres";
};
};
};
+1 -1
nixos/tests/quake3.nix
···
{ server =
{ pkgs, ... }:
-
{ systemd.services."quake3-server" =
{ wantedBy = [ "multi-user.target" ];
script =
"${pkgs.quake3demo}/bin/quake3-server +set g_gametype 0 " +
···
{ server =
{ pkgs, ... }:
+
{ systemd.services.quake3-server =
{ wantedBy = [ "multi-user.target" ];
script =
"${pkgs.quake3demo}/bin/quake3-server +set g_gametype 0 " +
+12 -12
nixos/tests/strongswan-swanctl.nix
···
enable = true;
swanctl = {
connections = {
-
"rw" = {
local_addrs = [ moonIp ];
-
local."main" = {
auth = "psk";
};
-
remote."main" = {
auth = "psk";
};
children = {
-
"net" = {
local_ts = [ vlan0 ];
updown = "${strongswan}/libexec/ipsec/_updown iptables";
inherit esp_proposals;
···
};
};
secrets = {
-
ike."carol" = {
-
id."main" = carolIp;
inherit secret;
};
};
···
enable = true;
swanctl = {
connections = {
-
"home" = {
local_addrs = [ carolIp ];
remote_addrs = [ moonIp ];
-
local."main" = {
auth = "psk";
id = carolIp;
};
-
remote."main" = {
auth = "psk";
id = moonIp;
};
children = {
-
"home" = {
remote_ts = [ vlan0 ];
start_action = "trap";
updown = "${strongswan}/libexec/ipsec/_updown iptables";
···
};
};
secrets = {
-
ike."moon" = {
-
id."main" = moonIp;
inherit secret;
};
};
···
enable = true;
swanctl = {
connections = {
+
rw = {
local_addrs = [ moonIp ];
+
local.main = {
auth = "psk";
};
+
remote.main = {
auth = "psk";
};
children = {
+
net = {
local_ts = [ vlan0 ];
updown = "${strongswan}/libexec/ipsec/_updown iptables";
inherit esp_proposals;
···
};
};
secrets = {
+
ike.carol = {
+
id.main = carolIp;
inherit secret;
};
};
···
enable = true;
swanctl = {
connections = {
+
home = {
local_addrs = [ carolIp ];
remote_addrs = [ moonIp ];
+
local.main = {
auth = "psk";
id = carolIp;
};
+
remote.main = {
auth = "psk";
id = moonIp;
};
children = {
+
home = {
remote_ts = [ vlan0 ];
start_action = "trap";
updown = "${strongswan}/libexec/ipsec/_updown iptables";
···
};
};
secrets = {
+
ike.moon = {
+
id.main = moonIp;
inherit secret;
};
};
+2 -2
pkgs/applications/editors/emacs-modes/libgenerated.nix
···
, sha256 ? null
, ... }@args:
let
-
sourceArgs = args."${variant}";
version = sourceArgs.version or null;
deps = sourceArgs.deps or null;
error = sourceArgs.error or args.error or null;
···
inherit sha256;
};
packageRequires = lib.optional (! isNull deps)
-
(map (dep: pkgargs."${dep}" or self."${dep}" or null)
deps);
meta = (sourceArgs.meta or {}) // {
inherit broken;
···
, sha256 ? null
, ... }@args:
let
+
sourceArgs = args.${variant};
version = sourceArgs.version or null;
deps = sourceArgs.deps or null;
error = sourceArgs.error or args.error or null;
···
inherit sha256;
};
packageRequires = lib.optional (! isNull deps)
+
(map (dep: pkgargs.${dep} or self.${dep} or null)
deps);
meta = (sourceArgs.meta or {}) // {
inherit broken;
+1 -1
pkgs/applications/editors/emacs-modes/melpa-packages.nix
···
};
};
-
in super // overrides."${variant}");
in generateMelpa { }
···
};
};
+
in super // overrides.${variant});
in generateMelpa { }
+4 -4
pkgs/applications/editors/standardnotes/default.nix
···
version = "3.0.15";
plat = {
-
"i386-linux" = "i386";
-
"x86_64-linux" = "x86_64";
}.${stdenv.hostPlatform.system};
sha256 = {
-
"i386-linux" = "0v2nsis6vb1lnhmjd28vrfxqwwpycv02j0nvjlfzcgj4b3400j7a";
-
"x86_64-linux" = "130n586cw0836zsbwqcz3pp3h0d4ny74ngqs4k4cvfb92556r7xh";
}.${stdenv.hostPlatform.system};
in
···
version = "3.0.15";
plat = {
+
i386-linux = "i386";
+
x86_64-linux = "x86_64";
}.${stdenv.hostPlatform.system};
sha256 = {
+
i386-linux = "0v2nsis6vb1lnhmjd28vrfxqwwpycv02j0nvjlfzcgj4b3400j7a";
+
x86_64-linux = "130n586cw0836zsbwqcz3pp3h0d4ny74ngqs4k4cvfb92556r7xh";
}.${stdenv.hostPlatform.system};
in
+1 -1
pkgs/applications/editors/vim/configurable.nix
···
inherit (common) version postPatch hardeningDisable enableParallelBuilding meta;
src = builtins.getAttr source {
-
"default" = common.src; # latest release
};
patches = [ ./cflags-prune.diff ] ++ stdenv.lib.optional ftNixSupport ./ft-nix-support.patch;
···
inherit (common) version postPatch hardeningDisable enableParallelBuilding meta;
src = builtins.getAttr source {
+
default = common.src; # latest release
};
patches = [ ./cflags-prune.diff ] ++ stdenv.lib.optional ftNixSupport ./ft-nix-support.patch;
+4 -4
pkgs/applications/editors/vscode/vscode.nix
···
inherit (stdenv.hostPlatform) system;
plat = {
-
"x86_64-linux" = "linux-x64";
-
"x86_64-darwin" = "darwin";
}.${system};
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
sha256 = {
-
"x86_64-linux" = "17g7mra9a52qlrrj77cw16vqvc7fsvbhc03wrl4iq1afzxsyqi22";
-
"x86_64-darwin" = "1is04anvhl2b354h5w7i5qi7ixhzna277f7xdy4qj9gjby6zydc6";
}.${system};
in
callPackage ./generic.nix rec {
···
inherit (stdenv.hostPlatform) system;
plat = {
+
x86_64-linux = "linux-x64";
+
x86_64-darwin = "darwin";
}.${system};
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
sha256 = {
+
x86_64-linux = "17g7mra9a52qlrrj77cw16vqvc7fsvbhc03wrl4iq1afzxsyqi22";
+
x86_64-darwin = "1is04anvhl2b354h5w7i5qi7ixhzna277f7xdy4qj9gjby6zydc6";
}.${system};
in
callPackage ./generic.nix rec {
+4 -4
pkgs/applications/editors/vscode/vscodium.nix
···
inherit (stdenv.hostPlatform) system;
plat = {
-
"x86_64-linux" = "linux-x64";
-
"x86_64-darwin" = "darwin";
}.${system};
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
sha256 = {
-
"x86_64-linux" = "1ay4zvkbln2wf2j1d71mn13b6p2fqvzgz45mzrgaqwsszhbg4xzp";
-
"x86_64-darwin" = "17r9krb1qd92ybx078hkw9zlyym6kbnmbl91vjdilsq77bkf9jmw";
}.${system};
in
callPackage ./generic.nix rec {
···
inherit (stdenv.hostPlatform) system;
plat = {
+
x86_64-linux = "linux-x64";
+
x86_64-darwin = "darwin";
}.${system};
archive_fmt = if system == "x86_64-darwin" then "zip" else "tar.gz";
sha256 = {
+
x86_64-linux = "1ay4zvkbln2wf2j1d71mn13b6p2fqvzgz45mzrgaqwsszhbg4xzp";
+
x86_64-darwin = "17r9krb1qd92ybx078hkw9zlyym6kbnmbl91vjdilsq77bkf9jmw";
}.${system};
in
callPackage ./generic.nix rec {
+1 -1
pkgs/applications/kde/default.nix
···
let
inherit (args) name;
sname = args.sname or name;
-
inherit (srcs."${sname}") src version;
mkDerivation =
libsForQt5.callPackage ({ mkDerivation }: mkDerivation) {};
in
···
let
inherit (args) name;
sname = args.sname or name;
+
inherit (srcs.${sname}) src version;
mkDerivation =
libsForQt5.callPackage ({ mkDerivation }: mkDerivation) {};
in
+5 -5
pkgs/applications/misc/taskjuggler/3.x/gemset.nix
···
{
-
"mail" = {
version = "2.6.3";
source = {
type = "gem";
···
"mime-types"
];
};
-
"mime-types" = {
version = "2.6.1";
source = {
type = "gem";
sha256 = "1vnrvf245ijfyxzjbj9dr6i1hkjbyrh4yj88865wv9bs75axc5jv";
};
};
-
"taskjuggler" = {
version = "3.5.0";
source = {
type = "gem";
···
"term-ansicolor"
];
};
-
"term-ansicolor" = {
version = "1.3.2";
source = {
type = "gem";
···
"tins"
];
};
-
"tins" = {
version = "1.6.0";
source = {
type = "gem";
···
{
+
mail = {
version = "2.6.3";
source = {
type = "gem";
···
"mime-types"
];
};
+
mime-types = {
version = "2.6.1";
source = {
type = "gem";
sha256 = "1vnrvf245ijfyxzjbj9dr6i1hkjbyrh4yj88865wv9bs75axc5jv";
};
};
+
taskjuggler = {
version = "3.5.0";
source = {
type = "gem";
···
"term-ansicolor"
];
};
+
term-ansicolor = {
version = "1.3.2";
source = {
type = "gem";
···
"tins"
];
};
+
tins = {
version = "1.6.0";
source = {
type = "gem";
+2 -2
pkgs/applications/networking/browsers/firefox-bin/default.nix
···
inherit (generated) version sources;
mozillaPlatforms = {
-
"i686-linux" = "linux-i686";
-
"x86_64-linux" = "linux-x86_64";
};
arch = mozillaPlatforms.${stdenv.hostPlatform.system};
···
inherit (generated) version sources;
mozillaPlatforms = {
+
i686-linux = "linux-i686";
+
x86_64-linux = "linux-x86_64";
};
arch = mozillaPlatforms.${stdenv.hostPlatform.system};
+3 -3
pkgs/applications/networking/browsers/tor-browser-bundle-bin/default.nix
···
lang = "en-US";
srcs = {
-
"x86_64-linux" = fetchurl {
urls = [
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
···
sha256 = "0nnzynk3nlnd847c8jjghs9anmr5a2hv7nk1qxigigxqa5vqy96z";
};
-
"i686-linux" = fetchurl {
urls = [
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
···
pname = "tor-browser-bundle-bin";
inherit version;
-
src = srcs."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}");
preferLocalBuild = true;
allowSubstitutes = false;
···
lang = "en-US";
srcs = {
+
x86_64-linux = fetchurl {
urls = [
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux64-${version}_${lang}.tar.xz"
···
sha256 = "0nnzynk3nlnd847c8jjghs9anmr5a2hv7nk1qxigigxqa5vqy96z";
};
+
i686-linux = fetchurl {
urls = [
"https://dist.torproject.org/torbrowser/${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
"https://github.com/TheTorProject/gettorbrowser/releases/download/v${version}/tor-browser-linux32-${version}_${lang}.tar.xz"
···
pname = "tor-browser-bundle-bin";
inherit version;
+
src = srcs.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}");
preferLocalBuild = true;
allowSubstitutes = false;
+2 -2
pkgs/applications/networking/dropbox/default.nix
···
version = "73.4.118";
arch = {
-
"x86_64-linux" = "x86_64";
-
"i686-linux" = "x86";
}.${stdenv.hostPlatform.system};
installer = "https://clientupdates.dropboxstatic.com/dbx-releng/client/dropbox-lnx.${arch}-${version}.tar.gz";
···
version = "73.4.118";
arch = {
+
x86_64-linux = "x86_64";
+
i686-linux = "x86";
}.${stdenv.hostPlatform.system};
installer = "https://clientupdates.dropboxstatic.com/dbx-releng/client/dropbox-lnx.${arch}-${version}.tar.gz";
+4 -4
pkgs/applications/networking/instant-messengers/wire-desktop/default.nix
···
pname = "wire-desktop";
version = {
-
"x86_64-linux" = "3.9.2895";
-
"x86_64-darwin" = "3.9.2943";
}.${system} or throwSystem;
sha256 = {
-
"x86_64-linux" = "0wrn95m64j4b7ym44h9zawq13kg4m12aixlyyzp56bfyczmjq4a5";
-
"x86_64-darwin" = "1y1bzsjmjrj518q29xfx6gg1nhdbaz7y5hzaqrp241az6plp090k";
}.${system} or throwSystem;
meta = with stdenv.lib; {
···
pname = "wire-desktop";
version = {
+
x86_64-linux = "3.9.2895";
+
x86_64-darwin = "3.9.2943";
}.${system} or throwSystem;
sha256 = {
+
x86_64-linux = "0wrn95m64j4b7ym44h9zawq13kg4m12aixlyyzp56bfyczmjq4a5";
+
x86_64-darwin = "1y1bzsjmjrj518q29xfx6gg1nhdbaz7y5hzaqrp241az6plp090k";
}.${system} or throwSystem;
meta = with stdenv.lib; {
+2 -2
pkgs/applications/networking/p2p/soulseekqt/default.nix
···
mainbin = "SoulseekQt-" + (version) +"-"+ (if stdenv.is64bit then "64bit" else "32bit");
srcs = {
-
"x86_64-linux" = fetchurl {
url = "https://www.dropbox.com/s/0vi87eef3ooh7iy/${mainbin}.tgz";
sha256 = "0d1cayxr1a4j19bc5a3qp9pg22ggzmd55b6f5av3lc6lvwqqg4w6";
};
···
pname = "soulseekqt";
inherit version;
-
src = srcs."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}");
dontBuild = true;
···
mainbin = "SoulseekQt-" + (version) +"-"+ (if stdenv.is64bit then "64bit" else "32bit");
srcs = {
+
x86_64-linux = fetchurl {
url = "https://www.dropbox.com/s/0vi87eef3ooh7iy/${mainbin}.tgz";
sha256 = "0d1cayxr1a4j19bc5a3qp9pg22ggzmd55b6f5av3lc6lvwqqg4w6";
};
···
pname = "soulseekqt";
inherit version;
+
src = srcs.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}");
dontBuild = true;
+6 -6
pkgs/applications/networking/remote/anydesk/default.nix
···
let
sha256 = {
-
"x86_64-linux" = "08kdxsg9npb1nmlr2jyq7p238735kqkp7c5xckxn6rc4cp12n2y2";
-
"i686-linux" = "11r5d4234zbkkgyrd7q9x3w7s7lailnq7z4x8cnhpr8vipzrg7h2";
-
}."${stdenv.hostPlatform.system}" or (throw "system ${stdenv.hostPlatform.system} not supported");
arch = {
-
"x86_64-linux" = "amd64";
-
"i686-linux" = "i686";
-
}."${stdenv.hostPlatform.system}" or (throw "system ${stdenv.hostPlatform.system} not supported");
description = "Desktop sharing application, providing remote support and online meetings";
···
let
sha256 = {
+
x86_64-linux = "08kdxsg9npb1nmlr2jyq7p238735kqkp7c5xckxn6rc4cp12n2y2";
+
i686-linux = "11r5d4234zbkkgyrd7q9x3w7s7lailnq7z4x8cnhpr8vipzrg7h2";
+
}.${stdenv.hostPlatform.system} or (throw "system ${stdenv.hostPlatform.system} not supported");
arch = {
+
x86_64-linux = "amd64";
+
i686-linux = "i686";
+
}.${stdenv.hostPlatform.system} or (throw "system ${stdenv.hostPlatform.system} not supported");
description = "Desktop sharing application, providing remote support and online meetings";
+4 -4
pkgs/applications/networking/resilio-sync/default.nix
···
let
arch = {
-
"x86_64-linux" = "x64";
-
"i686-linux" = "i386";
}.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
libPath = stdenv.lib.makeLibraryPath [ stdenv.cc.libc ];
···
src = fetchurl {
url = "https://download-cdn.resilio.com/${version}/linux-${arch}/resilio-sync_${arch}.tar.gz";
sha256 = {
-
"x86_64-linux" = "114k7dsxn7lzv6mjq9alsqxypvkah4lmjn5w6brbvgd6m6pdwslz";
-
"i686-linux" = "1dh0hxbd33bs51xib3qwxw58h9j30v0dc10b4x4rwkbgsj11nc83";
}.${stdenv.hostPlatform.system};
};
···
let
arch = {
+
x86_64-linux = "x64";
+
i686-linux = "i386";
}.${stdenv.hostPlatform.system} or (throw "Unsupported system: ${stdenv.hostPlatform.system}");
libPath = stdenv.lib.makeLibraryPath [ stdenv.cc.libc ];
···
src = fetchurl {
url = "https://download-cdn.resilio.com/${version}/linux-${arch}/resilio-sync_${arch}.tar.gz";
sha256 = {
+
x86_64-linux = "114k7dsxn7lzv6mjq9alsqxypvkah4lmjn5w6brbvgd6m6pdwslz";
+
i686-linux = "1dh0hxbd33bs51xib3qwxw58h9j30v0dc10b4x4rwkbgsj11nc83";
}.${stdenv.hostPlatform.system};
};
+2 -2
pkgs/applications/radio/gnuradio/ais.nix
···
owner = "bistromath";
repo = "gr-ais";
# Upstream PR: https://github.com/bistromath/gr-ais/commit/8502d0252a2a1a9b8d1a71795eaeb5d820684054
-
"rev" = "8502d0252a2a1a9b8d1a71795eaeb5d820684054";
-
"sha256" = "1b9j0kc74cw12a7jv4lii77dgzqzg2s8ndzp4xmisxksgva1qfvh";
};
nativeBuildInputs = [ pkgconfig ];
···
owner = "bistromath";
repo = "gr-ais";
# Upstream PR: https://github.com/bistromath/gr-ais/commit/8502d0252a2a1a9b8d1a71795eaeb5d820684054
+
rev = "8502d0252a2a1a9b8d1a71795eaeb5d820684054";
+
sha256 = "1b9j0kc74cw12a7jv4lii77dgzqzg2s8ndzp4xmisxksgva1qfvh";
};
nativeBuildInputs = [ pkgconfig ];
+1 -1
pkgs/applications/science/logic/coq/default.nix
···
"8.9.0" = "1dkgdjc4n1m15m1p724hhi5cyxpqbjw6rxc5na6fl3v4qjjfnizh";
"8.9.1" = "1xrq6mkhpq994bncmnijf8jwmwn961kkpl4mwwlv7j3dgnysrcv2";
"8.10+beta2" = "0jk7pwydhd17ab7ii69zvi4sgrr630q2lsxhckaj3sz55cpjlhal";
-
}."${version}";
coq-version = stdenv.lib.versions.majorMinor version;
versionAtLeast = stdenv.lib.versionAtLeast coq-version;
ideFlags = stdenv.lib.optionalString (buildIde && !versionAtLeast "8.10")
···
"8.9.0" = "1dkgdjc4n1m15m1p724hhi5cyxpqbjw6rxc5na6fl3v4qjjfnizh";
"8.9.1" = "1xrq6mkhpq994bncmnijf8jwmwn961kkpl4mwwlv7j3dgnysrcv2";
"8.10+beta2" = "0jk7pwydhd17ab7ii69zvi4sgrr630q2lsxhckaj3sz55cpjlhal";
+
}.${version};
coq-version = stdenv.lib.versions.majorMinor version;
versionAtLeast = stdenv.lib.versionAtLeast coq-version;
ideFlags = stdenv.lib.optionalString (buildIde && !versionAtLeast "8.10")
+4 -4
pkgs/applications/science/math/nauty/default.nix
···
# Prevent nauty from sniffing some cpu features. While those are very
# widely available, it can lead to nasty bugs when they are not available:
# https://groups.google.com/forum/#!topic/sage-packaging/Pe4SRDNYlhA
-
"default" = [ "--disable-clz" "--disable-popcnt" ];
-
"westmere" = [ "--disable-clz" ];
-
"sandybridge" = [ "--disable-clz" ];
-
"ivybridge" = [ "--disable-clz" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"} or [];
buildInputs = [];
installPhase = ''
···
# Prevent nauty from sniffing some cpu features. While those are very
# widely available, it can lead to nasty bugs when they are not available:
# https://groups.google.com/forum/#!topic/sage-packaging/Pe4SRDNYlhA
+
default = [ "--disable-clz" "--disable-popcnt" ];
+
westmere = [ "--disable-clz" ];
+
sandybridge = [ "--disable-clz" ];
+
ivybridge = [ "--disable-clz" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"} or [];
buildInputs = [];
installPhase = ''
+1 -1
pkgs/applications/video/kodi/plugins.nix
···
};
mkController = controller: {
-
"${controller}" = mkKodiPlugin rec {
plugin = pname + "-" + controller;
namespace = "game.controller." + controller;
sourceDir = "addons/" + namespace;
···
};
mkController = controller: {
+
${controller} = mkKodiPlugin rec {
plugin = pname + "-" + controller;
namespace = "game.controller." + controller;
sourceDir = "addons/" + namespace;
+3 -3
pkgs/applications/virtualization/xen/4.10.nix
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
-
"qemu-xen" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
# rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
-
"qemu-xen-traditional" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
# rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
-
"xen-libhvm-dir-remote" = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/michalpalka/xen-libhvm;
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
+
qemu-xen = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
# rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
+
qemu-xen-traditional = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
# rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
+
xen-libhvm-dir-remote = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/michalpalka/xen-libhvm;
+3 -3
pkgs/applications/virtualization/xen/4.5.nix
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
-
"qemu-xen" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
-
"qemu-xen-traditional" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
-
"xen-libhvm-dir-remote" = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/ts468/xen-libhvm;
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
+
qemu-xen = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
+
qemu-xen-traditional = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
+
xen-libhvm-dir-remote = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/ts468/xen-libhvm;
+3 -3
pkgs/applications/virtualization/xen/4.8.nix
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
-
"qemu-xen" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
-
"qemu-xen-traditional" = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
-
"xen-libhvm-dir-remote" = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/michalpalka/xen-libhvm;
···
# Sources needed to build tools and firmwares.
xenfiles = optionalAttrs withInternalQemu {
+
qemu-xen = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen.git;
rev = "refs/tags/qemu-xen-${version}";
···
meta.description = "Xen's fork of upstream Qemu";
};
} // optionalAttrs withInternalTraditionalQemu {
+
qemu-xen-traditional = {
src = fetchgit {
url = https://xenbits.xen.org/git-http/qemu-xen-traditional.git;
rev = "refs/tags/xen-${version}";
···
meta.description = "Xen's fork of iPXE";
};
} // optionalAttrs withLibHVM {
+
xen-libhvm-dir-remote = {
src = fetchgit {
name = "xen-libhvm";
url = https://github.com/michalpalka/xen-libhvm;
+2 -2
pkgs/applications/window-managers/stumpwm/default.nix
···
sha256 = "1ml6mjk2fsfv4sf65fdbji3q5x0qiq99g1k8w7a99gsl2i8h60gc";
});
versionSpec = {
-
"latest" = {
name = "1.0.0";
rev = "refs/tags/1.0.0";
sha256 = "16r0lwhxl8g71masmfbjr7s7m7fah4ii4smi1g8zpbpiqjz48ryb";
···
sha256 = "0hmvbdk2yr5wrkiwn9dfzf65s4xc2qifj0sn6w2mghzp96cph79k";
patches = [ ./fix-module-path.patch ];
};
-
"git" = {
name = "git-20170203";
rev = "d20f24e58ab62afceae2afb6262ffef3cc318b97";
sha256 = "1gi29ds1x6dq7lz8lamnhcvcrr3cvvrg5yappfkggyhyvib1ii70";
···
sha256 = "1ml6mjk2fsfv4sf65fdbji3q5x0qiq99g1k8w7a99gsl2i8h60gc";
});
versionSpec = {
+
latest = {
name = "1.0.0";
rev = "refs/tags/1.0.0";
sha256 = "16r0lwhxl8g71masmfbjr7s7m7fah4ii4smi1g8zpbpiqjz48ryb";
···
sha256 = "0hmvbdk2yr5wrkiwn9dfzf65s4xc2qifj0sn6w2mghzp96cph79k";
patches = [ ./fix-module-path.patch ];
};
+
git = {
name = "git-20170203";
rev = "d20f24e58ab62afceae2afb6262ffef3cc318b97";
sha256 = "1gi29ds1x6dq7lz8lamnhcvcrr3cvvrg5yappfkggyhyvib1ii70";
+3 -3
pkgs/applications/window-managers/way-cooler/default.nix
···
# https://nest.pijul.com/pmeunier/carnix/discussions/22
version = "0.8.1";
deps = (callPackage ./way-cooler.nix {}).deps;
-
way_cooler_ = f: cratesIO.crates.way_cooler."${version}" deps {
-
features = cratesIO.features_.way_cooler."${version}" deps {
-
"way_cooler"."${version}" = f;
};
};
way-cooler = ((way_cooler_ { builtin-lua = true; }).override {
···
# https://nest.pijul.com/pmeunier/carnix/discussions/22
version = "0.8.1";
deps = (callPackage ./way-cooler.nix {}).deps;
+
way_cooler_ = f: cratesIO.crates.way_cooler.${version} deps {
+
features = cratesIO.features_.way_cooler.${version} deps {
+
way_cooler.${version} = f;
};
};
way-cooler = ((way_cooler_ { builtin-lua = true; }).override {
+4 -4
pkgs/build-support/bintools-wrapper/default.nix
···
else if targetPlatform.isx86_64 then "x86-64"
else if targetPlatform.isx86_32 then "i386"
else if targetPlatform.isMips then {
-
"mips" = "btsmipn32"; # n32 variant
-
"mipsel" = "ltsmipn32"; # n32 variant
-
"mips64" = "btsmip";
-
"mips64el" = "ltsmip";
}.${targetPlatform.parsed.cpu.name}
else if targetPlatform.isPower then if targetPlatform.isBigEndian then "ppc" else "lppc"
else if targetPlatform.isSparc then "sparc"
···
else if targetPlatform.isx86_64 then "x86-64"
else if targetPlatform.isx86_32 then "i386"
else if targetPlatform.isMips then {
+
mips = "btsmipn32"; # n32 variant
+
mipsel = "ltsmipn32"; # n32 variant
+
mips64 = "btsmip";
+
mips64el = "ltsmip";
}.${targetPlatform.parsed.cpu.name}
else if targetPlatform.isPower then if targetPlatform.isBigEndian then "ppc" else "lppc"
else if targetPlatform.isSparc then "sparc"
+2 -2
pkgs/build-support/fetchdocker/default.nix
···
repositories =
writeText "repositories" (builtins.toJSON {
-
"${repoTag1}" = {
-
"${tag}" = lib.last layers;
};
});
···
repositories =
writeText "repositories" (builtins.toJSON {
+
${repoTag1} = {
+
${tag} = lib.last layers;
};
});
+16 -16
pkgs/build-support/rust/build-rust-crate/test/brotli-crates.nix
···
features = mkFeatures (features.brotli_2_5_0 or {});
};
brotli_2_5_0_features = f: updateFeatures f (rec {
-
alloc_no_stdlib_1_3_0."no-stdlib" =
-
(f.alloc_no_stdlib_1_3_0."no-stdlib" or false) ||
-
(brotli_2_5_0."no-stdlib" or false) ||
-
(f.brotli_2_5_0."no-stdlib" or false);
alloc_no_stdlib_1_3_0.default = true;
brotli_2_5_0.default = (f.brotli_2_5_0.default or true);
-
brotli_decompressor_1_3_1."disable-timer" =
-
(f.brotli_decompressor_1_3_1."disable-timer" or false) ||
-
(brotli_2_5_0."disable-timer" or false) ||
-
(f.brotli_2_5_0."disable-timer" or false);
-
brotli_decompressor_1_3_1."no-stdlib" =
-
(f.brotli_decompressor_1_3_1."no-stdlib" or false) ||
-
(brotli_2_5_0."no-stdlib" or false) ||
-
(f.brotli_2_5_0."no-stdlib" or false);
brotli_decompressor_1_3_1.benchmark =
(f.brotli_decompressor_1_3_1.benchmark or false) ||
(brotli_2_5_0.benchmark or false) ||
···
features = mkFeatures (features.brotli_decompressor_1_3_1 or {});
};
brotli_decompressor_1_3_1_features = f: updateFeatures f (rec {
-
alloc_no_stdlib_1_3_0."no-stdlib" =
-
(f.alloc_no_stdlib_1_3_0."no-stdlib" or false) ||
-
(brotli_decompressor_1_3_1."no-stdlib" or false) ||
-
(f.brotli_decompressor_1_3_1."no-stdlib" or false);
alloc_no_stdlib_1_3_0.default = true;
alloc_no_stdlib_1_3_0.unsafe =
(f.alloc_no_stdlib_1_3_0.unsafe or false) ||
···
features = mkFeatures (features.brotli_2_5_0 or {});
};
brotli_2_5_0_features = f: updateFeatures f (rec {
+
alloc_no_stdlib_1_3_0.no-stdlib =
+
(f.alloc_no_stdlib_1_3_0.no-stdlib or false) ||
+
(brotli_2_5_0.no-stdlib or false) ||
+
(f.brotli_2_5_0.no-stdlib or false);
alloc_no_stdlib_1_3_0.default = true;
brotli_2_5_0.default = (f.brotli_2_5_0.default or true);
+
brotli_decompressor_1_3_1.disable-timer =
+
(f.brotli_decompressor_1_3_1.disable-timer or false) ||
+
(brotli_2_5_0.disable-timer or false) ||
+
(f.brotli_2_5_0.disable-timer or false);
+
brotli_decompressor_1_3_1.no-stdlib =
+
(f.brotli_decompressor_1_3_1.no-stdlib or false) ||
+
(brotli_2_5_0.no-stdlib or false) ||
+
(f.brotli_2_5_0.no-stdlib or false);
brotli_decompressor_1_3_1.benchmark =
(f.brotli_decompressor_1_3_1.benchmark or false) ||
(brotli_2_5_0.benchmark or false) ||
···
features = mkFeatures (features.brotli_decompressor_1_3_1 or {});
};
brotli_decompressor_1_3_1_features = f: updateFeatures f (rec {
+
alloc_no_stdlib_1_3_0.no-stdlib =
+
(f.alloc_no_stdlib_1_3_0.no-stdlib or false) ||
+
(brotli_decompressor_1_3_1.no-stdlib or false) ||
+
(f.brotli_decompressor_1_3_1.no-stdlib or false);
alloc_no_stdlib_1_3_0.default = true;
alloc_no_stdlib_1_3_0.unsafe =
(f.alloc_no_stdlib_1_3_0.unsafe or false) ||
+2 -2
pkgs/build-support/rust/default.nix
···
hostConfig = stdenv.hostPlatform.config;
rustHostConfig = {
-
"x86_64-pc-mingw32" = "x86_64-pc-windows-gnu";
-
}."${hostConfig}" or hostConfig;
ccForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}cc";
cxxForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}c++";
···
hostConfig = stdenv.hostPlatform.config;
rustHostConfig = {
+
x86_64-pc-mingw32 = "x86_64-pc-windows-gnu";
+
}.${hostConfig} or hostConfig;
ccForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}cc";
cxxForBuild="${buildPackages.stdenv.cc}/bin/${buildPackages.stdenv.cc.targetPrefix}c++";
+52 -52
pkgs/data/fonts/iosevka/package-lock.nix
···
0;
chars = stringToCharacters (substring 0 (len - padding) str);
table = {
-
"A" = [0 0 0];
-
"B" = [0 0 1];
-
"C" = [0 0 2];
-
"D" = [0 0 3];
-
"E" = [0 1 0];
-
"F" = [0 1 1];
-
"G" = [0 1 2];
-
"H" = [0 1 3];
-
"I" = [0 2 0];
-
"J" = [0 2 1];
-
"K" = [0 2 2];
-
"L" = [0 2 3];
-
"M" = [0 3 0];
-
"N" = [0 3 1];
-
"O" = [0 3 2];
-
"P" = [0 3 3];
-
"Q" = [1 0 0];
-
"R" = [1 0 1];
-
"S" = [1 0 2];
-
"T" = [1 0 3];
-
"U" = [1 1 0];
-
"V" = [1 1 1];
-
"W" = [1 1 2];
-
"X" = [1 1 3];
-
"Y" = [1 2 0];
-
"Z" = [1 2 1];
-
"a" = [1 2 2];
-
"b" = [1 2 3];
-
"c" = [1 3 0];
-
"d" = [1 3 1];
-
"e" = [1 3 2];
-
"f" = [1 3 3];
-
"g" = [2 0 0];
-
"h" = [2 0 1];
-
"i" = [2 0 2];
-
"j" = [2 0 3];
-
"k" = [2 1 0];
-
"l" = [2 1 1];
-
"m" = [2 1 2];
-
"n" = [2 1 3];
-
"o" = [2 2 0];
-
"p" = [2 2 1];
-
"q" = [2 2 2];
-
"r" = [2 2 3];
-
"s" = [2 3 0];
-
"t" = [2 3 1];
-
"u" = [2 3 2];
-
"v" = [2 3 3];
-
"w" = [3 0 0];
-
"x" = [3 0 1];
-
"y" = [3 0 2];
-
"z" = [3 0 3];
"0" = [3 1 0];
"1" = [3 1 1];
"2" = [3 1 2];
···
0;
chars = stringToCharacters (substring 0 (len - padding) str);
table = {
+
A = [0 0 0];
+
B = [0 0 1];
+
C = [0 0 2];
+
D = [0 0 3];
+
E = [0 1 0];
+
F = [0 1 1];
+
G = [0 1 2];
+
H = [0 1 3];
+
I = [0 2 0];
+
J = [0 2 1];
+
K = [0 2 2];
+
L = [0 2 3];
+
M = [0 3 0];
+
N = [0 3 1];
+
O = [0 3 2];
+
P = [0 3 3];
+
Q = [1 0 0];
+
R = [1 0 1];
+
S = [1 0 2];
+
T = [1 0 3];
+
U = [1 1 0];
+
V = [1 1 1];
+
W = [1 1 2];
+
X = [1 1 3];
+
Y = [1 2 0];
+
Z = [1 2 1];
+
a = [1 2 2];
+
b = [1 2 3];
+
c = [1 3 0];
+
d = [1 3 1];
+
e = [1 3 2];
+
f = [1 3 3];
+
g = [2 0 0];
+
h = [2 0 1];
+
i = [2 0 2];
+
j = [2 0 3];
+
k = [2 1 0];
+
l = [2 1 1];
+
m = [2 1 2];
+
n = [2 1 3];
+
o = [2 2 0];
+
p = [2 2 1];
+
q = [2 2 2];
+
r = [2 2 3];
+
s = [2 3 0];
+
t = [2 3 1];
+
u = [2 3 2];
+
v = [2 3 3];
+
w = [3 0 0];
+
x = [3 0 1];
+
y = [3 0 2];
+
z = [3 0 3];
"0" = [3 1 0];
"1" = [3 1 1];
"2" = [3 1 2];
+1 -1
pkgs/desktops/pantheon/update.nix
···
throwFlag = throw "${versionPolicy} is not a valid versionPolicy - Options are either 'release' or 'master' (defaults to release).";
-
versionFlag = { "release" = "-r"; "master" = "-m"; }.${versionPolicy} or throwFlag;
in [ updateScript versionFlag repoName attrPath ]
···
throwFlag = throw "${versionPolicy} is not a valid versionPolicy - Options are either 'release' or 'master' (defaults to release).";
+
versionFlag = { release = "-r"; master = "-m"; }.${versionPolicy} or throwFlag;
in [ updateScript versionFlag repoName attrPath ]
+1 -1
pkgs/desktops/plasma-5/default.nix
···
let
inherit (args) name;
sname = args.sname or name;
-
inherit (srcs."${sname}") src version;
outputs = args.outputs or [ "out" ];
hasBin = lib.elem "bin" outputs;
···
let
inherit (args) name;
sname = args.sname or name;
+
inherit (srcs.${sname}) src version;
outputs = args.outputs or [ "out" ];
hasBin = lib.elem "bin" outputs;
+6 -6
pkgs/development/androidndk-pkgs/androidndk-pkgs.nix
···
# than we do. We don't just use theirs because ours are less ambiguous and
# some builds need that clarity.
ndkInfoFun = { config, ... }: {
-
"x86_64-apple-darwin" = {
double = "darwin-x86_64";
};
-
"x86_64-unknown-linux-gnu" = {
double = "linux-x86_64";
};
-
"i686-unknown-linux-android" = {
triple = "i686-linux-android";
arch = "x86";
toolchain = "x86";
gccVer = "4.9";
};
-
"x86_64-unknown-linux-android" = {
triple = "x86_64-linux-android";
arch = "x86_64";
toolchain = "x86_64";
gccVer = "4.9";
};
-
"armv7a-unknown-linux-androideabi" = {
arch = "arm";
triple = "arm-linux-androideabi";
toolchain = "arm-linux-androideabi";
gccVer = "4.9";
};
-
"aarch64-unknown-linux-android" = {
arch = "arm64";
triple = "aarch64-linux-android";
toolchain = "aarch64-linux-android";
···
# than we do. We don't just use theirs because ours are less ambiguous and
# some builds need that clarity.
ndkInfoFun = { config, ... }: {
+
x86_64-apple-darwin = {
double = "darwin-x86_64";
};
+
x86_64-unknown-linux-gnu = {
double = "linux-x86_64";
};
+
i686-unknown-linux-android = {
triple = "i686-linux-android";
arch = "x86";
toolchain = "x86";
gccVer = "4.9";
};
+
x86_64-unknown-linux-android = {
triple = "x86_64-linux-android";
arch = "x86_64";
toolchain = "x86_64";
gccVer = "4.9";
};
+
armv7a-unknown-linux-androideabi = {
arch = "arm";
triple = "arm-linux-androideabi";
toolchain = "arm-linux-androideabi";
gccVer = "4.9";
};
+
aarch64-unknown-linux-android = {
arch = "arm64";
triple = "aarch64-linux-android";
toolchain = "aarch64-linux-android";
+1 -1
pkgs/development/compilers/binaryen/default.nix
···
# Map from git revs to SHA256 hashes
sha256s = {
-
"version_89" = "0rh1dq33ilq54szfgi1ajaiaj7rbylai02rhp9zm9vpwp0rw8mij";
"1.38.28" = "172s7y5f38736ic8ri3mnbdqcrkadd40a26cxcfwbscc53phl11v";
};
in
···
# Map from git revs to SHA256 hashes
sha256s = {
+
version_89 = "0rh1dq33ilq54szfgi1ajaiaj7rbylai02rhp9zm9vpwp0rw8mij";
"1.38.28" = "172s7y5f38736ic8ri3mnbdqcrkadd40a26cxcfwbscc53phl11v";
};
in
+1 -1
pkgs/development/compilers/ccl/default.nix
···
};
armv6l-linux = armv7l-linux;
};
-
cfg = options."${stdenv.hostPlatform.system}" or (throw "missing source url for platform ${stdenv.hostPlatform.system}");
in
stdenv.mkDerivation rec {
···
};
armv6l-linux = armv7l-linux;
};
+
cfg = options.${stdenv.hostPlatform.system} or (throw "missing source url for platform ${stdenv.hostPlatform.system}");
in
stdenv.mkDerivation rec {
+14 -14
pkgs/development/compilers/crystal/default.nix
···
let
archs = {
-
"x86_64-linux" = "linux-x86_64";
-
"i686-linux" = "linux-i686";
-
"x86_64-darwin" = "darwin-x86_64";
};
-
arch = archs."${stdenv.system}" or (throw "system ${stdenv.system} not supported");
checkInputs = [ git gmp openssl readline libxml2 libyaml ];
···
src = fetchurl {
url = "https://github.com/crystal-lang/crystal/releases/download/${version}/crystal-${version}-${toString rel}-${arch}.tar.gz";
-
sha256 = sha256s."${stdenv.system}";
};
buildCommand = ''
···
binaryCrystal_0_26 = genericBinary {
version = "0.26.1";
sha256s = {
-
"x86_64-linux" = "1xban102yiiwmlklxvn3xp3q546bp8hlxxpakayajkhhnpl6yv45";
-
"i686-linux" = "1igspf1lrv7wpmz0pfrkbx8m1ykvnv4zhic53cav4nicppm2v0ic";
-
"x86_64-darwin" = "1mri8bfrcldl69gczxpihxpv1shn4bijx28m3qby8vnk0ii63n9s";
};
};
binaryCrystal_0_27 = genericBinary {
version = "0.27.2";
sha256s = {
-
"x86_64-linux" = "05l5x7kx2acgnv42fj3rr17z73ix06zvi05h7d7vf3kw0izxrasm";
-
"i686-linux" = "1iwizkvn6pglc0azkyfhlmk9ap793krdgcnbihd1kvrvs4cz0mm9";
-
"x86_64-darwin" = "14c69ac2dmfwmb5q56ps3xyxxb0mrbc91ahk9h07c8fiqfii3k9g";
};
};
binaryCrystal_0_29 = genericBinary {
version = "0.29.0";
sha256s = {
-
"x86_64-linux" = "1wrk29sfx35akg7hxwpdiikvl18wd40gq1kwirw7x522hnq7vlna";
-
"i686-linux" = "1nx0piis2k3nn7kqiijqazzbvlaavhgvsln0l3dxmpfa4i4dz5h2";
-
"x86_64-darwin" = "1fd0fbyf05abivnp3igjlrm2axf65n2wdmg4aq6nqj60ipc01rvd";
};
};
···
let
archs = {
+
x86_64-linux = "linux-x86_64";
+
i686-linux = "linux-i686";
+
x86_64-darwin = "darwin-x86_64";
};
+
arch = archs.${stdenv.system} or (throw "system ${stdenv.system} not supported");
checkInputs = [ git gmp openssl readline libxml2 libyaml ];
···
src = fetchurl {
url = "https://github.com/crystal-lang/crystal/releases/download/${version}/crystal-${version}-${toString rel}-${arch}.tar.gz";
+
sha256 = sha256s.${stdenv.system};
};
buildCommand = ''
···
binaryCrystal_0_26 = genericBinary {
version = "0.26.1";
sha256s = {
+
x86_64-linux = "1xban102yiiwmlklxvn3xp3q546bp8hlxxpakayajkhhnpl6yv45";
+
i686-linux = "1igspf1lrv7wpmz0pfrkbx8m1ykvnv4zhic53cav4nicppm2v0ic";
+
x86_64-darwin = "1mri8bfrcldl69gczxpihxpv1shn4bijx28m3qby8vnk0ii63n9s";
};
};
binaryCrystal_0_27 = genericBinary {
version = "0.27.2";
sha256s = {
+
x86_64-linux = "05l5x7kx2acgnv42fj3rr17z73ix06zvi05h7d7vf3kw0izxrasm";
+
i686-linux = "1iwizkvn6pglc0azkyfhlmk9ap793krdgcnbihd1kvrvs4cz0mm9";
+
x86_64-darwin = "14c69ac2dmfwmb5q56ps3xyxxb0mrbc91ahk9h07c8fiqfii3k9g";
};
};
binaryCrystal_0_29 = genericBinary {
version = "0.29.0";
sha256s = {
+
x86_64-linux = "1wrk29sfx35akg7hxwpdiikvl18wd40gq1kwirw7x522hnq7vlna";
+
i686-linux = "1nx0piis2k3nn7kqiijqazzbvlaavhgvsln0l3dxmpfa4i4dz5h2";
+
x86_64-darwin = "1fd0fbyf05abivnp3igjlrm2axf65n2wdmg4aq6nqj60ipc01rvd";
};
};
+1 -1
pkgs/development/compilers/dmd/default.nix
···
dmdConfFile = writeTextFile {
name = "dmd.conf";
text = (lib.generators.toINI {} {
-
"Environment" = {
DFLAGS = ''-I@out@/include/dmd -L-L@out@/lib -fPIC ${stdenv.lib.optionalString (!targetPackages.stdenv.cc.isClang) "-L--export-dynamic"}'';
};
});
···
dmdConfFile = writeTextFile {
name = "dmd.conf";
text = (lib.generators.toINI {} {
+
Environment = {
DFLAGS = ''-I@out@/include/dmd -L-L@out@/lib -fPIC ${stdenv.lib.optionalString (!targetPackages.stdenv.cc.isClang) "-L--export-dynamic"}'';
};
});
+1 -1
pkgs/development/compilers/elm/packages/node-composition.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ./node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ./node-env.nix {
+5 -5
pkgs/development/compilers/ghc/8.2.2-binary.nix
···
name = "ghc-${version}-binary";
src = fetchurl ({
-
"i686-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz";
sha256 = "08w2ik55dp3n95qikmrflc91lsiq01xp53ki3jlhnbj8fqnxfrwy";
};
-
"x86_64-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz";
sha256 = "0ahv26304pqi3dm7i78si4pxwvg5f5dc2jwsfgvcrhcx5g30bqj8";
};
-
"armv7l-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-armv7-deb8-linux.tar.xz";
sha256 = "1jmv8qmnh5bn324fivbwdcaj55kvw7cb2zq9pafmlmv3qwwx7s46";
};
-
"aarch64-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-aarch64-deb8-linux.tar.xz";
sha256 = "1k2amylcp1ad67c75h1pqf7czf9m0zj1i7hdc45ghjklnfq9hrk7";
};
-
"x86_64-darwin" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz";
sha256 = "09swx71gh5habzbx55shz2xykgr96xkcy09nzinnm4z0yxicy3zr";
};
···
name = "ghc-${version}-binary";
src = fetchurl ({
+
i686-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz";
sha256 = "08w2ik55dp3n95qikmrflc91lsiq01xp53ki3jlhnbj8fqnxfrwy";
};
+
x86_64-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz";
sha256 = "0ahv26304pqi3dm7i78si4pxwvg5f5dc2jwsfgvcrhcx5g30bqj8";
};
+
armv7l-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-armv7-deb8-linux.tar.xz";
sha256 = "1jmv8qmnh5bn324fivbwdcaj55kvw7cb2zq9pafmlmv3qwwx7s46";
};
+
aarch64-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-aarch64-deb8-linux.tar.xz";
sha256 = "1k2amylcp1ad67c75h1pqf7czf9m0zj1i7hdc45ghjklnfq9hrk7";
};
+
x86_64-darwin = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz";
sha256 = "09swx71gh5habzbx55shz2xykgr96xkcy09nzinnm4z0yxicy3zr";
};
+3 -3
pkgs/development/compilers/ghc/8.6.3-binary.nix
···
name = "ghc-${version}-binary";
src = fetchurl ({
-
"i686-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz";
sha256 = "0bw8a7fxcbskf93rb4m542ff66vrmx5i5kj77qx37cbhijx70w5m";
};
-
"x86_64-linux" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz";
sha256 = "1m9gaga2pzi2cx5gvasg0rx1dlvr68gmi20l67652kag6xjsa719";
};
-
"x86_64-darwin" = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz";
sha256 = "1hbzk57v45176kxcx848p5jn5p1xbp2129ramkbzsk6plyhnkl3r";
};
···
name = "ghc-${version}-binary";
src = fetchurl ({
+
i686-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-i386-deb8-linux.tar.xz";
sha256 = "0bw8a7fxcbskf93rb4m542ff66vrmx5i5kj77qx37cbhijx70w5m";
};
+
x86_64-linux = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-deb8-linux.tar.xz";
sha256 = "1m9gaga2pzi2cx5gvasg0rx1dlvr68gmi20l67652kag6xjsa719";
};
+
x86_64-darwin = {
url = "http://haskell.org/ghc/dist/${version}/ghc-${version}-x86_64-apple-darwin.tar.xz";
sha256 = "1hbzk57v45176kxcx848p5jn5p1xbp2129ramkbzsk6plyhnkl3r";
};
+7 -7
pkgs/development/compilers/go/1.11.nix
···
'';
goarch = platform: {
-
"i686" = "386";
-
"x86_64" = "amd64";
-
"aarch64" = "arm64";
-
"arm" = "arm";
-
"armv5tel" = "arm";
-
"armv6l" = "arm";
-
"armv7l" = "arm";
}.${platform.parsed.cpu.name} or (throw "Unsupported system");
in
···
'';
goarch = platform: {
+
i686 = "386";
+
x86_64 = "amd64";
+
aarch64 = "arm64";
+
arm = "arm";
+
armv5tel = "arm";
+
armv6l = "arm";
+
armv7l = "arm";
}.${platform.parsed.cpu.name} or (throw "Unsupported system");
in
+7 -7
pkgs/development/compilers/go/1.12.nix
···
'';
goarch = platform: {
-
"i686" = "386";
-
"x86_64" = "amd64";
-
"aarch64" = "arm64";
-
"arm" = "arm";
-
"armv5tel" = "arm";
-
"armv6l" = "arm";
-
"armv7l" = "arm";
}.${platform.parsed.cpu.name} or (throw "Unsupported system");
in
···
'';
goarch = platform: {
+
i686 = "386";
+
x86_64 = "amd64";
+
aarch64 = "arm64";
+
arm = "arm";
+
armv5tel = "arm";
+
armv6l = "arm";
+
armv7l = "arm";
}.${platform.parsed.cpu.name} or (throw "Unsupported system");
in
+1 -1
pkgs/development/compilers/go/1.4.nix
···
, Security }:
let
-
libc = if stdenv ? "cross" then libcCross else stdenv.cc.libc;
in
stdenv.mkDerivation rec {
···
, Security }:
let
+
libc = if stdenv ? cross then libcCross else stdenv.cc.libc;
in
stdenv.mkDerivation rec {
+2 -2
pkgs/development/compilers/julia/shared.nix
···
makeFlags =
let
arch = head (splitString "-" stdenv.system);
-
march = { "x86_64" = stdenv.hostPlatform.platform.gcc.arch or "x86-64"; "i686" = "pentium4"; }."${arch}"
or (throw "unsupported architecture: ${arch}");
# Julia requires Pentium 4 (SSE2) or better
-
cpuTarget = { "x86_64" = "x86-64"; "i686" = "pentium4"; }."${arch}"
or (throw "unsupported architecture: ${arch}");
in [
"ARCH=${arch}"
···
makeFlags =
let
arch = head (splitString "-" stdenv.system);
+
march = { x86_64 = stdenv.hostPlatform.platform.gcc.arch or "x86-64"; i686 = "pentium4"; }.${arch}
or (throw "unsupported architecture: ${arch}");
# Julia requires Pentium 4 (SSE2) or better
+
cpuTarget = { x86_64 = "x86-64"; i686 = "pentium4"; }.${arch}
or (throw "unsupported architecture: ${arch}");
in [
"ARCH=${arch}"
+2 -2
pkgs/development/compilers/mozart/binary.nix
···
version = "2.0.0";
binaries = {
-
"x86_64-linux" = fetchurl {
url = "mirror://sourceforge/project/mozart-oz/v${version}-alpha.0/mozart2-${version}-alpha.0+build.4105.5c06ced-x86_64-linux.tar.gz";
sha256 = "0rsfrjimjxqbwprpzzlmydl3z3aiwg5qkb052jixdxjyad7gyh5z";
};
···
preferLocalBuild = true;
-
src = binaries."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}");
libPath = stdenv.lib.makeLibraryPath
[ stdenv.cc.cc
···
version = "2.0.0";
binaries = {
+
x86_64-linux = fetchurl {
url = "mirror://sourceforge/project/mozart-oz/v${version}-alpha.0/mozart2-${version}-alpha.0+build.4105.5c06ced-x86_64-linux.tar.gz";
sha256 = "0rsfrjimjxqbwprpzzlmydl3z3aiwg5qkb052jixdxjyad7gyh5z";
};
···
preferLocalBuild = true;
+
src = binaries.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}");
libPath = stdenv.lib.makeLibraryPath
[ stdenv.cc.cc
+3 -3
pkgs/development/compilers/openjdk/8.nix
···
* The JRE libraries are in directories that depend on the CPU.
*/
architecture = {
-
"i686-linux" = "i386";
-
"x86_64-linux" = "amd64";
-
"aarch64-linux" = "aarch64";
}.${stdenv.system} or (throw "Unsupported platform");
update = "222";
···
* The JRE libraries are in directories that depend on the CPU.
*/
architecture = {
+
i686-linux = "i386";
+
x86_64-linux = "amd64";
+
aarch64-linux = "aarch64";
}.${stdenv.system} or (throw "Unsupported platform");
update = "222";
+2 -2
pkgs/development/compilers/openjdk/openjfx/11.nix
···
outputHashMode = "recursive";
# Downloaded AWT jars differ by platform.
outputHash = {
-
"i686-linux" = "0mjlyf6jvbis7nrm5d394sjv4hjw6k3753hr1nwdxk8skwc3ry08";
-
"x86_64-linux" = "0d4msxswdav1xsfkpr0qd3xgqkcbxzf47v1zdy5jmg5w4bs6a78a";
}.${stdenv.system} or (throw "Unsupported platform");
};
···
outputHashMode = "recursive";
# Downloaded AWT jars differ by platform.
outputHash = {
+
i686-linux = "0mjlyf6jvbis7nrm5d394sjv4hjw6k3753hr1nwdxk8skwc3ry08";
+
x86_64-linux = "0d4msxswdav1xsfkpr0qd3xgqkcbxzf47v1zdy5jmg5w4bs6a78a";
}.${stdenv.system} or (throw "Unsupported platform");
};
+2 -2
pkgs/development/compilers/openjdk/openjfx/12.nix
···
outputHashMode = "recursive";
# Downloaded AWT jars differ by platform.
outputHash = {
-
"x86_64-linux" = "1z5qar5l28ja4pkf5l5m48xbv3x1yrnilsv9lpf2j3vkdk9h1nci";
-
"i686-linux" = "0rbygvjc7w197fi5nxldqdrm6mpiyd3n45042g3gd4s5qk08spjd";
}.${stdenv.system} or (throw "Unsupported platform");
};
···
outputHashMode = "recursive";
# Downloaded AWT jars differ by platform.
outputHash = {
+
x86_64-linux = "1z5qar5l28ja4pkf5l5m48xbv3x1yrnilsv9lpf2j3vkdk9h1nci";
+
i686-linux = "0rbygvjc7w197fi5nxldqdrm6mpiyd3n45042g3gd4s5qk08spjd";
}.${stdenv.system} or (throw "Unsupported platform");
};
+1 -1
pkgs/development/compilers/rust/bootstrap.nix
···
src = fetchurl {
url = "https://static.rust-lang.org/dist/rust-${version}-${platform}.tar.gz";
-
sha256 = hashes."${platform}";
};
in callPackage ./binary.nix
···
src = fetchurl {
url = "https://static.rust-lang.org/dist/rust-${version}-${platform}.tar.gz";
+
sha256 = hashes.${platform};
};
in callPackage ./binary.nix
+1 -1
pkgs/development/coq-modules/QuickChick/default.nix
···
sha256 = "1c34v1k37rk7v0xk2czv5n79mbjxjrm6nh3llg2mpfmdsqi68wf3";
};
};
-
param = params."${coq.coq-version}";
in
let recent = stdenv.lib.versionAtLeast coq.coq-version "8.8"; in
···
sha256 = "1c34v1k37rk7v0xk2czv5n79mbjxjrm6nh3llg2mpfmdsqi68wf3";
};
};
+
param = params.${coq.coq-version};
in
let recent = stdenv.lib.versionAtLeast coq.coq-version "8.8"; in
+1 -1
pkgs/development/coq-modules/Velisarios/default.nix
···
sha256 = "0l9885nxy0n955fj1gnijlxl55lyxiv9yjfmz8hmfrn9hl8vv1m2";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "0l9885nxy0n955fj1gnijlxl55lyxiv9yjfmz8hmfrn9hl8vv1m2";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/bignums/default.nix
···
sha256 = "1slw227idwjw9a21vj3s6kal22mrmvvlpg8r7xk590ml99bn6404";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "1slw227idwjw9a21vj3s6kal22mrmvvlpg8r7xk590ml99bn6404";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/category-theory/default.nix
···
"8.8" = v20190414;
"8.9" = v20190414;
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
"8.8" = v20190414;
"8.9" = v20190414;
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+2 -2
pkgs/development/coq-modules/contribs/default.nix
···
rev = "86ac28259030649ef51460e4de2441c8a1017751";
sha256 = "09bbk2a7pn0j76mmapl583f8a20zqd3a1m9lkml8rpwml692bzi9";
};
-
}."${coq.coq-version}";
abp = mkContrib "abp" [ "8.5" "8.6" "8.7" ] {
version = "v8.6.0";
···
rev = "aa33052c1edfc5a65885942a67c2773b5d96f8cc";
sha256 = "0mjgfdr9bzsch0dlk4vq1frkaig14dqh46r54cv0l15flxapg0iw";
};
-
}."${coq.coq-version}";
continuations = mkContrib "continuations" [ ] {
version = "v8.5.0-13-g6885310";
···
rev = "86ac28259030649ef51460e4de2441c8a1017751";
sha256 = "09bbk2a7pn0j76mmapl583f8a20zqd3a1m9lkml8rpwml692bzi9";
};
+
}.${coq.coq-version};
abp = mkContrib "abp" [ "8.5" "8.6" "8.7" ] {
version = "v8.6.0";
···
rev = "aa33052c1edfc5a65885942a67c2773b5d96f8cc";
sha256 = "0mjgfdr9bzsch0dlk4vq1frkaig14dqh46r54cv0l15flxapg0iw";
};
+
}.${coq.coq-version};
continuations = mkContrib "continuations" [ ] {
version = "v8.5.0-13-g6885310";
+1 -1
pkgs/development/coq-modules/coq-elpi/default.nix
···
sha256 = "188avk9irwjsbs5ya4ka01mpk3vw4397kv2rmsncqrrrsa1pdddk";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "188avk9irwjsbs5ya4ka01mpk3vw4397kv2rmsncqrrrsa1pdddk";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coq-ext-lib/default.nix
···
"8.8" = { version = "0.9.8"; sha256 = "0z1ix855kdjl7zw5ca664h5njd1x8mmvf5wi37fck4dj9dgamwlz"; };
"8.9" = { version = "0.10.1"; sha256 = "0r1vspad8fb8bry3zliiz4hfj4w1iib1l2gm115a94m6zbiksd95"; };
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
"8.8" = { version = "0.9.8"; sha256 = "0z1ix855kdjl7zw5ca664h5njd1x8mmvf5wi37fck4dj9dgamwlz"; };
"8.9" = { version = "0.10.1"; sha256 = "0r1vspad8fb8bry3zliiz4hfj4w1iib1l2gm115a94m6zbiksd95"; };
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coq-haskell/default.nix
···
sha256 = "09dq1vvshhlhgjccrhqgbhnq2hrys15xryfszqq11rzpgvl2zgdv";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "09dq1vvshhlhgjccrhqgbhnq2hrys15xryfszqq11rzpgvl2zgdv";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coqhammer/default.nix
···
sha256 = "0hmqwsry8ldg4g4hhwg4b84dgzibpdrg1wwsajhlyqfx3fb3n3b5";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "0hmqwsry8ldg4g4hhwg4b84dgzibpdrg1wwsajhlyqfx3fb3n3b5";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/coqprime/default.nix
···
"8.9" = v_8_8;
"8.10" = v_8_8;
};
-
param = params."${coq.coq-version}"
; in
stdenv.mkDerivation rec {
···
"8.9" = v_8_8;
"8.10" = v_8_8;
};
+
param = params.${coq.coq-version}
; in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/dpdgraph/default.nix
···
sha256 = "0qvar8gfbrcs9fmvkph5asqz4l5fi63caykx3bsn8zf0xllkwv0n";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation {
···
sha256 = "0qvar8gfbrcs9fmvkph5asqz4l5fi63caykx3bsn8zf0xllkwv0n";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation {
+1 -1
pkgs/development/coq-modules/equations/default.nix
···
sha256 = "1v5kx0xzxzsbs5r4w08rm1lrmjjggnd3ap0sd1my88ds17jzyasd";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "1v5kx0xzxzsbs5r4w08rm1lrmjjggnd3ap0sd1my88ds17jzyasd";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/coq-modules/ltac2/default.nix
···
sha256 = "0xby1kb26r9gcvk5511wqj05fqm9paynwfxlfqkmwkgnfmzk0x73";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "0xby1kb26r9gcvk5511wqj05fqm9paynwfxlfqkmwkgnfmzk0x73";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+3 -3
pkgs/development/coq-modules/mathcomp/default.nix
···
# COMPUTED using the configuration above (edit with caution) #
##############################################################
default-mathcomp-version = let v = head (
-
filter (mc: mathcomp-coq-versions."${mc}" coq.coq-version)
mathcomp-version-preference ++ ["0.0.0"]);
in if v == "0.0.0" then max-mathcomp-version else v;
···
};
};
in
-
{"${mathcomp-pkg}" = stdenv.mkDerivation (attrs // overrides attrs);};
-
getAttrOr = a: n: a."${n}" or (throw a.error);
mathcompCorePkgs_1_7 = mathcompGen "1.7.0";
mathcompCorePkgs_1_8 = mathcompGen "1.8.0";
···
# COMPUTED using the configuration above (edit with caution) #
##############################################################
default-mathcomp-version = let v = head (
+
filter (mc: mathcomp-coq-versions.${mc} coq.coq-version)
mathcomp-version-preference ++ ["0.0.0"]);
in if v == "0.0.0" then max-mathcomp-version else v;
···
};
};
in
+
{${mathcomp-pkg} = stdenv.mkDerivation (attrs // overrides attrs);};
+
getAttrOr = a: n: a.${n} or (throw a.error);
mathcompCorePkgs_1_7 = mathcompGen "1.7.0";
mathcompCorePkgs_1_8 = mathcompGen "1.8.0";
+6 -6
pkgs/development/coq-modules/mathcomp/extra.nix
···
else compatibleCoqVersions;
mc-core-deps = if builtins.isNull core-deps then [ssreflect] else core-deps;
in
-
{ "${package}" = let from = src; in
stdenv.mkDerivation rec {
inherit version;
···
owner = owner;
repo = package;
rev = version;
-
sha256 = version-sha256."${version}";
} else from;
propagatedBuildInputs = [ coq ] ++ mc-core-deps ++ extra-deps;
···
};
};
-
current-versions = versions."${current-ssreflect.version}" or {};
select = x: mapAttrs (n: pkg: {package = n;} // pkg) (recursiveUpdate param x);
···
{name = "mathcomp_${suffix}-${n}";
value = (packageGen ({
ssreflect = coqPackages."mathcomp-ssreflect_${suffix}";
-
} // pkg))."${n}";})
-
(select versions."${v}"));
all = (for-version "1.7.0" "1_7") //
(for-version "1.8.0" "1_8") //
(for-version "1.9.0" "1_9") //
(recurseIntoAttrs (mapDerivationAttrset dontDistribute (
-
mapAttrs' (n: pkg: {name = "mathcomp-${n}"; value = (packageGen pkg)."${n}";})
(select current-versions))));
in
{
···
else compatibleCoqVersions;
mc-core-deps = if builtins.isNull core-deps then [ssreflect] else core-deps;
in
+
{ ${package} = let from = src; in
stdenv.mkDerivation rec {
inherit version;
···
owner = owner;
repo = package;
rev = version;
+
sha256 = version-sha256.${version};
} else from;
propagatedBuildInputs = [ coq ] ++ mc-core-deps ++ extra-deps;
···
};
};
+
current-versions = versions.${current-ssreflect.version} or {};
select = x: mapAttrs (n: pkg: {package = n;} // pkg) (recursiveUpdate param x);
···
{name = "mathcomp_${suffix}-${n}";
value = (packageGen ({
ssreflect = coqPackages."mathcomp-ssreflect_${suffix}";
+
} // pkg)).${n};})
+
(select versions.${v}));
all = (for-version "1.7.0" "1_7") //
(for-version "1.8.0" "1_8") //
(for-version "1.9.0" "1_9") //
(recurseIntoAttrs (mapDerivationAttrset dontDistribute (
+
mapAttrs' (n: pkg: {name = "mathcomp-${n}"; value = (packageGen pkg).${n};})
(select current-versions))));
in
{
+1 -1
pkgs/development/coq-modules/paramcoq/default.nix
···
sha256 = "002xabhjlph394vydw3dx8ipv5ry2nq3py4440bk9a18ljx0w6ll";
};
};
-
param = params."${coq.coq-version}";
in
stdenv.mkDerivation rec {
···
sha256 = "002xabhjlph394vydw3dx8ipv5ry2nq3py4440bk9a18ljx0w6ll";
};
};
+
param = params.${coq.coq-version};
in
stdenv.mkDerivation rec {
+2 -2
pkgs/development/interpreters/acl2/default.nix
···
src = fetchFromGitHub {
owner = "acl2-devel";
repo = "acl2-devel";
-
rev = revs."${version}";
-
sha256 = hashes."${version}";
};
buildInputs = [ sbcl
···
src = fetchFromGitHub {
owner = "acl2-devel";
repo = "acl2-devel";
+
rev = revs.${version};
+
sha256 = hashes.${version};
};
buildInputs = [ sbcl
+1 -1
pkgs/development/interpreters/ruby/default.nix
···
(import ./patchsets.nix {
inherit patchSet useRailsExpress ops;
patchLevel = ver.patchLevel;
-
})."${ver.majMinTiny}";
postUnpack = ''
cp -r ${rubygems} $sourceRoot/rubygems
···
(import ./patchsets.nix {
inherit patchSet useRailsExpress ops;
patchLevel = ver.patchLevel;
+
}).${ver.majMinTiny};
postUnpack = ''
cp -r ${rubygems} $sourceRoot/rubygems
+8 -8
pkgs/development/libraries/fflas-ffpack/default.nix
···
"--with-lapack-libs=-l${blas.linkName}"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
-
"default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"haswell" = [ "--disable-fma4" ];
-
"broadwell" = [ "--disable-fma4" ];
-
"skylake" = [ "--disable-fma4" ];
-
"skylake-avx512" = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"};
doCheck = true;
···
"--with-lapack-libs=-l${blas.linkName}"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
+
default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
haswell = [ "--disable-fma4" ];
+
broadwell = [ "--disable-fma4" ];
+
skylake = [ "--disable-fma4" ];
+
skylake-avx512 = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"};
doCheck = true;
+8 -8
pkgs/development/libraries/g2o/default.nix
···
"-DQGLVIEWER_INCLUDE_DIR=${libsForQt5.libqglviewer}/include/QGLViewer"
"-DG2O_BUILD_EXAMPLES=OFF"
] ++ lib.optionals stdenv.isx86_64 ([ "-DDO_SSE_AUTODETECT=OFF" ] ++ {
-
"default" = [ "-DDISABLE_SSE3=ON" "-DDISABLE_SSE4_1=ON" "-DDISABLE_SSE4_2=ON" "-DDISABLE_SSE4_A=ON" ];
-
"westmere" = [ "-DDISABLE_SSE4_A=ON" ];
-
"sandybridge" = [ "-DDISABLE_SSE4_A=ON" ];
-
"ivybridge" = [ "-DDISABLE_SSE4_A=ON" ];
-
"haswell" = [ "-DDISABLE_SSE4_A=ON" ];
-
"broadwell" = [ "-DDISABLE_SSE4_A=ON" ];
-
"skylake" = [ "-DDISABLE_SSE4_A=ON" ];
-
"skylake-avx512" = [ "-DDISABLE_SSE4_A=ON" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"});
postInstall = ''
···
"-DQGLVIEWER_INCLUDE_DIR=${libsForQt5.libqglviewer}/include/QGLViewer"
"-DG2O_BUILD_EXAMPLES=OFF"
] ++ lib.optionals stdenv.isx86_64 ([ "-DDO_SSE_AUTODETECT=OFF" ] ++ {
+
default = [ "-DDISABLE_SSE3=ON" "-DDISABLE_SSE4_1=ON" "-DDISABLE_SSE4_2=ON" "-DDISABLE_SSE4_A=ON" ];
+
westmere = [ "-DDISABLE_SSE4_A=ON" ];
+
sandybridge = [ "-DDISABLE_SSE4_A=ON" ];
+
ivybridge = [ "-DDISABLE_SSE4_A=ON" ];
+
haswell = [ "-DDISABLE_SSE4_A=ON" ];
+
broadwell = [ "-DDISABLE_SSE4_A=ON" ];
+
skylake = [ "-DDISABLE_SSE4_A=ON" ];
+
skylake-avx512 = [ "-DDISABLE_SSE4_A=ON" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"});
postInstall = ''
+8 -8
pkgs/development/libraries/givaro/default.nix
···
"--disable-optimization"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
-
"default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"haswell" = [ "--disable-fma4" ];
-
"broadwell" = [ "--disable-fma4" ];
-
"skylake" = [ "--disable-fma4" ];
-
"skylake-avx512" = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"};
# On darwin, tests are linked to dylib in the nix store, so we need to make
···
"--disable-optimization"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
+
default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
haswell = [ "--disable-fma4" ];
+
broadwell = [ "--disable-fma4" ];
+
skylake = [ "--disable-fma4" ];
+
skylake-avx512 = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"};
# On darwin, tests are linked to dylib in the nix store, so we need to make
+3 -3
pkgs/development/libraries/java/swt/default.nix
···
let
platformMap = {
-
"x86_64-linux" =
{ platform = "gtk-linux-x86_64";
sha256 = "1qq0pjll6030v4ml0hifcaaik7sx3fl7ghybfdw95vsvxafwp2ff"; };
-
"i686-linux" =
{ platform = "gtk-linux-x86";
sha256 = "03mhzraikcs4fsz7d3h5af9pw1bbcfd6dglsvbk2ciwimy9zj30q"; };
-
"x86_64-darwin" =
{ platform = "cocoa-macosx-x86_64";
sha256 = "00k1mfbncvyh8klgmk0891w8jwnd5niqb16j1j8yacrm2smmlb05"; };
};
···
let
platformMap = {
+
x86_64-linux =
{ platform = "gtk-linux-x86_64";
sha256 = "1qq0pjll6030v4ml0hifcaaik7sx3fl7ghybfdw95vsvxafwp2ff"; };
+
i686-linux =
{ platform = "gtk-linux-x86";
sha256 = "03mhzraikcs4fsz7d3h5af9pw1bbcfd6dglsvbk2ciwimy9zj30q"; };
+
x86_64-darwin =
{ platform = "cocoa-macosx-x86_64";
sha256 = "00k1mfbncvyh8klgmk0891w8jwnd5niqb16j1j8yacrm2smmlb05"; };
};
+1 -1
pkgs/development/libraries/kde-frameworks/default.nix
···
let
inherit (args) name;
-
inherit (srcs."${name}") src version;
outputs = args.outputs or [ "bin" "dev" "out" ];
hasSeparateDev = lib.elem "dev" outputs;
···
let
inherit (args) name;
+
inherit (srcs.${name}) src version;
outputs = args.outputs or [ "bin" "dev" "out" ];
hasSeparateDev = lib.elem "dev" outputs;
+8 -8
pkgs/development/libraries/linbox/default.nix
···
"--disable-optimization"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
-
"default" = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"westmere" = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"sandybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"ivybridge" = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
-
"haswell" = [ "--disable-fma4" ];
-
"broadwell" = [ "--disable-fma4" ];
-
"skylake" = [ "--disable-fma4" ];
-
"skylake-avx512" = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"}
++ stdenv.lib.optionals withSage [
"--enable-sage"
···
"--disable-optimization"
] ++ stdenv.lib.optionals stdenv.isx86_64 {
# disable SIMD instructions (which are enabled *when available* by default)
+
default = [ "--disable-sse3" "--disable-ssse3" "--disable-sse41" "--disable-sse42" "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
westmere = [ "--disable-avx" "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
sandybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
ivybridge = [ "--disable-avx2" "--disable-fma" "--disable-fma4" ];
+
haswell = [ "--disable-fma4" ];
+
broadwell = [ "--disable-fma4" ];
+
skylake = [ "--disable-fma4" ];
+
skylake-avx512 = [ "--disable-fma4" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"}
++ stdenv.lib.optionals withSage [
"--enable-sage"
+4 -4
pkgs/development/libraries/openssl/default.nix
···
# TODO(@Ericson2314): Improve with mass rebuild
configurePlatforms = [];
configureScript = {
-
"x86_64-darwin" = "./Configure darwin64-x86_64-cc";
-
"x86_64-solaris" = "./Configure solaris64-x86_64-gcc";
-
"armv6l-linux" = "./Configure linux-armv4 -march=armv6";
-
"armv7l-linux" = "./Configure linux-armv4 -march=armv7-a";
}.${stdenv.hostPlatform.system} or (
if stdenv.hostPlatform == stdenv.buildPlatform
then "./config"
···
# TODO(@Ericson2314): Improve with mass rebuild
configurePlatforms = [];
configureScript = {
+
x86_64-darwin = "./Configure darwin64-x86_64-cc";
+
x86_64-solaris = "./Configure solaris64-x86_64-gcc";
+
armv6l-linux = "./Configure linux-armv4 -march=armv6";
+
armv7l-linux = "./Configure linux-armv4 -march=armv7-a";
}.${stdenv.hostPlatform.system} or (
if stdenv.hostPlatform == stdenv.buildPlatform
then "./config"
+6 -6
pkgs/development/libraries/oracle-instantclient/default.nix
···
throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}";
arch = {
-
"x86_64-linux" = "linux.x64";
-
"x86_64-darwin" = "macos.x64";
-
}."${stdenv.hostPlatform.system}" or throwSystem;
srcs = {
-
"x86_64-linux" = [
(requireSource "basic" arch version "" "5015e3c9fba84e009f7519893f798a1622c37d1ae2c55104ff502c52a0fe5194")
(requireSource "sdk" arch version "" "7f404c3573c062ce487a51ac4cfe650c878d7edf8e73b364ec852645ed1098cb")
(requireSource "sqlplus" arch version "" "d49b2bd97376591ca07e7a836278933c3f251875c215044feac73ba9f451dfc2") ]
++ optional odbcSupport (requireSource "odbc" arch version "2" "365a4ae32c7062d9fbc3fb41add748e7881f774484a175a4b41a2c294ce9095d");
-
"x86_64-darwin" = [
(requireSource "basic" arch version "2" "3ed3102e5a24f0da638694191edb34933309fb472eb1df21ad5c86eedac3ebb9")
(requireSource "sdk" arch version "2" "e0befca9c4e71ebc9f444957ffa70f01aeeec5976ea27c40406471b04c34848b")
(requireSource "sqlplus" arch version "2" "d147cbb5b2a954fdcb4b642df4f0bd1153fd56e0f56e7fa301601b4f7e2abe0e") ]
++ optional odbcSupport (requireSource "odbc" arch version "2" "1805c1ab6c8c5e8df7bdcc35d7f2b94c329ecf4dff9bde55d5f9b159ecd8b64e");
-
}."${stdenv.hostPlatform.system}" or throwSystem;
extLib = stdenv.hostPlatform.extensions.sharedLibrary;
in stdenv.mkDerivation rec {
···
throwSystem = throw "Unsupported system: ${stdenv.hostPlatform.system}";
arch = {
+
x86_64-linux = "linux.x64";
+
x86_64-darwin = "macos.x64";
+
}.${stdenv.hostPlatform.system} or throwSystem;
srcs = {
+
x86_64-linux = [
(requireSource "basic" arch version "" "5015e3c9fba84e009f7519893f798a1622c37d1ae2c55104ff502c52a0fe5194")
(requireSource "sdk" arch version "" "7f404c3573c062ce487a51ac4cfe650c878d7edf8e73b364ec852645ed1098cb")
(requireSource "sqlplus" arch version "" "d49b2bd97376591ca07e7a836278933c3f251875c215044feac73ba9f451dfc2") ]
++ optional odbcSupport (requireSource "odbc" arch version "2" "365a4ae32c7062d9fbc3fb41add748e7881f774484a175a4b41a2c294ce9095d");
+
x86_64-darwin = [
(requireSource "basic" arch version "2" "3ed3102e5a24f0da638694191edb34933309fb472eb1df21ad5c86eedac3ebb9")
(requireSource "sdk" arch version "2" "e0befca9c4e71ebc9f444957ffa70f01aeeec5976ea27c40406471b04c34848b")
(requireSource "sqlplus" arch version "2" "d147cbb5b2a954fdcb4b642df4f0bd1153fd56e0f56e7fa301601b4f7e2abe0e") ]
++ optional odbcSupport (requireSource "odbc" arch version "2" "1805c1ab6c8c5e8df7bdcc35d7f2b94c329ecf4dff9bde55d5f9b159ecd8b64e");
+
}.${stdenv.hostPlatform.system} or throwSystem;
extLib = stdenv.hostPlatform.extensions.sharedLibrary;
in stdenv.mkDerivation rec {
+8 -8
pkgs/development/libraries/qt-5/modules/qtbase.nix
···
if (!stdenv.hostPlatform.isx86_64)
then [ "-no-sse2" ]
else lib.optionals (compareVersion "5.9.0" >= 0) {
-
"default" = [ "-sse2" "-no-sse3" "-no-ssse3" "-no-sse4.1" "-no-sse4.2" "-no-avx" "-no-avx2" ];
-
"westmere" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-no-avx" "-no-avx2" ];
-
"sandybridge" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ];
-
"ivybridge" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ];
-
"haswell" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
-
"broadwell" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
-
"skylake" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
-
"skylake-avx512" = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"}
)
++ [
···
if (!stdenv.hostPlatform.isx86_64)
then [ "-no-sse2" ]
else lib.optionals (compareVersion "5.9.0" >= 0) {
+
default = [ "-sse2" "-no-sse3" "-no-ssse3" "-no-sse4.1" "-no-sse4.2" "-no-avx" "-no-avx2" ];
+
westmere = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-no-avx" "-no-avx2" ];
+
sandybridge = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ];
+
ivybridge = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-no-avx2" ];
+
haswell = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
+
broadwell = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
+
skylake = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
+
skylake-avx512 = [ "-sse2" "-sse3" "-ssse3" "-sse4.1" "-sse4.2" "-avx" "-avx2" ];
}.${stdenv.hostPlatform.platform.gcc.arch or "default"}
)
++ [
+3 -3
pkgs/development/libraries/qt-5/qtModule.nix
···
let
inherit (args) name;
-
version = args.version or srcs."${name}".version;
-
src = args.src or srcs."${name}".src;
in
mkDerivation (args // {
name = "${name}-${version}";
inherit src;
-
patches = args.patches or patches."${name}" or [];
nativeBuildInputs = (args.nativeBuildInputs or []) ++ [ perl self.qmake ];
propagatedBuildInputs = args.qtInputs ++ (args.propagatedBuildInputs or []);
···
let
inherit (args) name;
+
version = args.version or srcs.${name}.version;
+
src = args.src or srcs.${name}.src;
in
mkDerivation (args // {
name = "${name}-${version}";
inherit src;
+
patches = args.patches or patches.${name} or [];
nativeBuildInputs = (args.nativeBuildInputs or []) ++ [ perl self.qmake ];
propagatedBuildInputs = args.qtInputs ++ (args.propagatedBuildInputs or []);
+3 -3
pkgs/development/libraries/science/math/tensorflow/binary-hashes.nix
···
{
version = "1.14.0";
-
"cpu-linux-x86_64" = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-linux-x86_64-1.14.0.tar.gz";
sha256 = "04bi3ijq4sbb8c5vk964zlv0j9mrjnzzxd9q9knq3h273nc1a36k";
};
-
"gpu-linux-x86_64" = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-gpu-linux-x86_64-1.14.0.tar.gz";
sha256 = "1ffnpyj9jjgwxpjfiyjvq4dm3n6nwiksim5jld9zw7fdswh215x6";
};
-
"cpu-darwin-x86_64" = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-darwin-x86_64-1.14.0.tar.gz";
sha256 = "0zsd5ils1a17j6jzh0c7q1z56fw46gkzybbnms7h2rgg8al0rh92";
};
···
{
version = "1.14.0";
+
cpu-linux-x86_64 = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-linux-x86_64-1.14.0.tar.gz";
sha256 = "04bi3ijq4sbb8c5vk964zlv0j9mrjnzzxd9q9knq3h273nc1a36k";
};
+
gpu-linux-x86_64 = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-gpu-linux-x86_64-1.14.0.tar.gz";
sha256 = "1ffnpyj9jjgwxpjfiyjvq4dm3n6nwiksim5jld9zw7fdswh215x6";
};
+
cpu-darwin-x86_64 = {
url = "https://storage.googleapis.com/tensorflow/libtensorflow/libtensorflow-cpu-darwin-x86_64-1.14.0.tar.gz";
sha256 = "0zsd5ils1a17j6jzh0c7q1z56fw46gkzybbnms7h2rgg8al0rh92";
};
+2 -2
pkgs/development/libraries/v8/5_x.nix
···
sharedFlag = if static then "static_library" else "shared_library";
deps = {
-
"build" = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "2c67d4d74b6b3673228fab191918500a582ef3b0";
sha256 = "0jc7hci5yh792pw0ahjfxrk5xzllnlrv9llmwlgcgn2x8x6bn34q";
···
rev = "b5ecbb29a26532f72ef482569b223d5a51fd50bf";
sha256 = "0ld47wdnk8grcba221z67l3pnphv9zwifk4y44f5b946w3iwmpns";
};
-
"buildtools" = fetchgit {
url = "${git_url}/chromium/buildtools.git";
rev = "60f7f9a8b421ebf9a46041dfa2ff11c0fe59c582";
sha256 = "0i10bw7yhslklqwcx5krs3k05sicb73cpwd0mkaz96yxsvmkvjq0";
···
sharedFlag = if static then "static_library" else "shared_library";
deps = {
+
build = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "2c67d4d74b6b3673228fab191918500a582ef3b0";
sha256 = "0jc7hci5yh792pw0ahjfxrk5xzllnlrv9llmwlgcgn2x8x6bn34q";
···
rev = "b5ecbb29a26532f72ef482569b223d5a51fd50bf";
sha256 = "0ld47wdnk8grcba221z67l3pnphv9zwifk4y44f5b946w3iwmpns";
};
+
buildtools = fetchgit {
url = "${git_url}/chromium/buildtools.git";
rev = "60f7f9a8b421ebf9a46041dfa2ff11c0fe59c582";
sha256 = "0i10bw7yhslklqwcx5krs3k05sicb73cpwd0mkaz96yxsvmkvjq0";
+1 -1
pkgs/development/libraries/v8/default.nix
···
rev = "936ba8a963284a6b3737cf2f0474a7131073abee";
sha256 = "14nr22fqdpxma1kzjflj6a865vr3hfnnm2gs4vcixyq4kmfzfcy2";
};
-
"build" = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "325e95d6dae64f35b160b3dc7d73218cee5ec079";
sha256 = "0dddyxa76p2xpjhmxif05v63i5ar6h5v684fdl667sg84f5bhhxf";
···
rev = "936ba8a963284a6b3737cf2f0474a7131073abee";
sha256 = "14nr22fqdpxma1kzjflj6a865vr3hfnnm2gs4vcixyq4kmfzfcy2";
};
+
build = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "325e95d6dae64f35b160b3dc7d73218cee5ec079";
sha256 = "0dddyxa76p2xpjhmxif05v63i5ar6h5v684fdl667sg84f5bhhxf";
+2 -2
pkgs/development/libraries/v8/plv8_6_x.nix
···
rev = "0e9a47d74970bee1bbfc063c47215406f8918699";
sha256 = "07rbzrlscp8adh4z86yl5jxdnvgkc3xs950xldpk318wf9i3bh6c";
};
-
"build" = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "9338ce52d0b9bcef34c38285fbd5023b62739fac";
sha256 = "1s2sa8dy3waidsirjylc82ggb18l1108bczjc8z0v4ywyj4k0cvh";
};
-
"buildtools" = fetchgit {
url = "${git_url}/chromium/buildtools.git";
rev = "505de88083136eefd056e5ee4ca0f01fe9b33de8";
sha256 = "0vj216nhb803bggsl0hnyagj8njrm96pn8sim6xcnqb7nhz1vabw";
···
rev = "0e9a47d74970bee1bbfc063c47215406f8918699";
sha256 = "07rbzrlscp8adh4z86yl5jxdnvgkc3xs950xldpk318wf9i3bh6c";
};
+
build = fetchgit {
url = "${git_url}/chromium/src/build.git";
rev = "9338ce52d0b9bcef34c38285fbd5023b62739fac";
sha256 = "1s2sa8dy3waidsirjylc82ggb18l1108bczjc8z0v4ywyj4k0cvh";
};
+
buildtools = fetchgit {
url = "${git_url}/chromium/buildtools.git";
rev = "505de88083136eefd056e5ee4ca0f01fe9b33de8";
sha256 = "0vj216nhb803bggsl0hnyagj8njrm96pn8sim6xcnqb7nhz1vabw";
+12 -12
pkgs/development/mobile/androidenv/compose-android-packages.nix
···
platform-tools = import ./platform-tools.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
-
package = packages.platform-tools."${platformToolsVersion}";
};
build-tools = map (version:
import ./build-tools.nix {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686;
inherit (stdenv) lib;
-
package = packages.build-tools."${version}";
}
) buildToolsVersions;
···
emulator = import ./emulator.nix {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686;
inherit (stdenv) lib;
-
package = packages.emulator."${emulatorVersion}"."${os}";
};
platforms = map (version:
deployAndroidPackage {
inherit os;
-
package = packages.platforms."${version}";
}
) platformVersions;
sources = map (version:
deployAndroidPackage {
inherit os;
-
package = packages.sources."${version}";
}
) platformVersions;
···
import ./lldb.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
-
package = packages.lldb."${version}";
}
) lldbVersions;
···
import ./cmake.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
-
package = packages.cmake."${version}";
}
) cmakeVersions;
ndk-bundle = import ./ndk-bundle {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs platform-tools;
inherit (stdenv) lib;
-
package = packages.ndk-bundle."${ndkVersion}";
};
google-apis = map (version:
deployAndroidPackage {
inherit os;
-
package = addons.addons."${version}".google_apis;
}
) (builtins.filter (platformVersion: platformVersion < "26") platformVersions); # API level 26 and higher include Google APIs by default
google-tv-addons = map (version:
deployAndroidPackage {
inherit os;
-
package = addons.addons."${version}".google_tv_addon;
}
) platformVersions;
···
# Link extras
${stdenv.lib.concatMapStrings (identifier:
let
-
path = addons.extras."${identifier}".path;
addon = deployAndroidPackage {
inherit os;
-
package = addons.extras."${identifier}";
};
in
''
···
platform-tools = import ./platform-tools.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
+
package = packages.platform-tools.${platformToolsVersion};
};
build-tools = map (version:
import ./build-tools.nix {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686;
inherit (stdenv) lib;
+
package = packages.build-tools.${version};
}
) buildToolsVersions;
···
emulator = import ./emulator.nix {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs pkgs_i686;
inherit (stdenv) lib;
+
package = packages.emulator.${emulatorVersion}.${os};
};
platforms = map (version:
deployAndroidPackage {
inherit os;
+
package = packages.platforms.${version};
}
) platformVersions;
sources = map (version:
deployAndroidPackage {
inherit os;
+
package = packages.sources.${version};
}
) platformVersions;
···
import ./lldb.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
+
package = packages.lldb.${version};
}
) lldbVersions;
···
import ./cmake.nix {
inherit deployAndroidPackage os autoPatchelfHook pkgs;
inherit (stdenv) lib;
+
package = packages.cmake.${version};
}
) cmakeVersions;
ndk-bundle = import ./ndk-bundle {
inherit deployAndroidPackage os autoPatchelfHook makeWrapper pkgs platform-tools;
inherit (stdenv) lib;
+
package = packages.ndk-bundle.${ndkVersion};
};
google-apis = map (version:
deployAndroidPackage {
inherit os;
+
package = addons.addons.${version}.google_apis;
}
) (builtins.filter (platformVersion: platformVersion < "26") platformVersions); # API level 26 and higher include Google APIs by default
google-tv-addons = map (version:
deployAndroidPackage {
inherit os;
+
package = addons.addons.${version}.google_tv_addon;
}
) platformVersions;
···
# Link extras
${stdenv.lib.concatMapStrings (identifier:
let
+
path = addons.extras.${identifier}.path;
addon = deployAndroidPackage {
inherit os;
+
package = addons.extras.${identifier};
};
in
''
+2 -2
pkgs/development/mobile/androidenv/tools.nix
···
};
} else if toolsVersion == "26.1.1" then import ./tools/26.nix {
inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall;
-
package = packages.tools."${toolsVersion}";
} else import ./tools/25.nix {
inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall;
-
package = packages.tools."${toolsVersion}";
}
···
};
} else if toolsVersion == "26.1.1" then import ./tools/26.nix {
inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall;
+
package = packages.tools.${toolsVersion};
} else import ./tools/25.nix {
inherit deployAndroidPackage lib autoPatchelfHook makeWrapper os pkgs pkgs_i686 postInstall;
+
package = packages.tools.${toolsVersion};
}
+1 -1
pkgs/development/node-packages/composition-v10.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ./node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ./node-env.nix {
+1 -1
pkgs/development/node-packages/composition-v12.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-6_x"}:
let
nodeEnv = import ./node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-6_x}:
let
nodeEnv = import ./node-env.nix {
+1 -1
pkgs/development/ocaml-modules/labltk/default.nix
···
key = "1764";
sha256 = "0wgx65y1wkgf22ihpqmspqfp95fqbj3pldhp1p3b1mi8rmc37zwj";
};
-
}."${builtins.substring 0 4 ocaml.version}";
in
stdenv.mkDerivation rec {
···
key = "1764";
sha256 = "0wgx65y1wkgf22ihpqmspqfp95fqbj3pldhp1p3b1mi8rmc37zwj";
};
+
}.${builtins.substring 0 4 ocaml.version};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/ocaml-modules/lwt/legacy.nix
···
"3.0.0" = "0wwhnl9hppixcsdisinj1wmffx0nv6hkpm01z9qvkngkrazi3i88";
"2.7.1" = "0w7f59havrl2fsnvs84lm7wlqpsrldg80gy5afpnpr21zkw22g8w";
"2.6.0" = "0f1h83zh60rspm4fxd96z9h5bkhq1n1q968hgq92sq4a6bfi1c2w";
-
}."${version}"; in
let optionals = stdenv.lib.optionals (!stdenv.lib.versionAtLeast version "3"); in
···
"3.0.0" = "0wwhnl9hppixcsdisinj1wmffx0nv6hkpm01z9qvkngkrazi3i88";
"2.7.1" = "0w7f59havrl2fsnvs84lm7wlqpsrldg80gy5afpnpr21zkw22g8w";
"2.6.0" = "0f1h83zh60rspm4fxd96z9h5bkhq1n1q968hgq92sq4a6bfi1c2w";
+
}.${version}; in
let optionals = stdenv.lib.optionals (!stdenv.lib.versionAtLeast version "3"); in
+1 -1
pkgs/development/ocaml-modules/ppx_tools/default.nix
···
"4.07" = {
version = "5.1+4.06.0";
sha256 = "1ww4cspdpgjjsgiv71s0im5yjkr3544x96wsq1vpdacq7dr7zwiw"; };
-
}."${ocaml.meta.branch}";
in
stdenv.mkDerivation {
name = "ocaml${ocaml.version}-ppx_tools-${param.version}";
···
"4.07" = {
version = "5.1+4.06.0";
sha256 = "1ww4cspdpgjjsgiv71s0im5yjkr3544x96wsq1vpdacq7dr7zwiw"; };
+
}.${ocaml.meta.branch};
in
stdenv.mkDerivation {
name = "ocaml${ocaml.version}-ppx_tools-${param.version}";
+1 -1
pkgs/development/python-modules/numpy/default.nix
···
cfg = writeTextFile {
name = "site.cfg";
text = (lib.generators.toINI {} {
-
"${blasImplementation}" = {
include_dirs = "${blas}/include";
library_dirs = "${blas}/lib";
} // lib.optionalAttrs (blasImplementation == "mkl") {
···
cfg = writeTextFile {
name = "site.cfg";
text = (lib.generators.toINI {} {
+
${blasImplementation} = {
include_dirs = "${blas}/include";
library_dirs = "${blas}/lib";
} // lib.optionalAttrs (blasImplementation == "mkl") {
+1 -1
pkgs/development/python-modules/spacy/models.nix
···
meta = with stdenv.lib; {
description = "Models for the spaCy NLP library";
homepage = "https://github.com/explosion/spacy-models";
-
license = licenses."${license}";
maintainers = with maintainers; [ rvl ];
};
};
···
meta = with stdenv.lib; {
description = "Models for the spaCy NLP library";
homepage = "https://github.com/explosion/spacy-models";
+
license = licenses.${license};
maintainers = with maintainers; [ rvl ];
};
};
+2 -2
pkgs/development/ruby-modules/bundled-common/default.nix
···
name
else
let
-
gem = gems."${pname}";
version = gem.version;
in
"${pname}-${version}";
···
maybeCopyAll = pkgname: if pkgname == null then "" else
let
-
mainGem = gems."${pkgname}" or (throw "bundlerEnv: gem ${pkgname} not found");
in
copyIfBundledByPath mainGem;
···
name
else
let
+
gem = gems.${pname};
version = gem.version;
in
"${pname}-${version}";
···
maybeCopyAll = pkgname: if pkgname == null then "" else
let
+
mainGem = gems.${pkgname} or (throw "bundlerEnv: gem ${pkgname} not found");
in
copyIfBundledByPath mainGem;
+6 -6
pkgs/development/ruby-modules/bundled-common/functions.nix
···
converge expandDependencies directlyMatchingGems;
platformMatches = {rubyEngine, version, ...}: attrs: (
-
!(attrs ? "platforms") ||
builtins.length attrs.platforms == 0 ||
builtins.any (platform:
platform.engine == rubyEngine &&
-
(!(platform ? "version") || platform.version == version.majMin)
) attrs.platforms
);
groupMatches = groups: attrs:
-
groups == null || !(attrs ? "groups") ||
(intersectLists (groups ++ [ "default" ]) attrs.groups) != [];
applyGemConfigs = attrs:
-
(if gemConfig ? "${attrs.gemName}"
-
then attrs // gemConfig."${attrs.gemName}" attrs
else attrs);
genStubsScript = { lib, ruby, confFiles, bundler, groups, binPaths, ... }: ''
···
inherit (attrs.source) type;
source = removeAttrs attrs.source ["type"];
gemName = name;
-
gemPath = map (gemName: gems."${gemName}") (attrs.dependencies or []);
});
}
···
converge expandDependencies directlyMatchingGems;
platformMatches = {rubyEngine, version, ...}: attrs: (
+
!(attrs ? platforms) ||
builtins.length attrs.platforms == 0 ||
builtins.any (platform:
platform.engine == rubyEngine &&
+
(!(platform ? version) || platform.version == version.majMin)
) attrs.platforms
);
groupMatches = groups: attrs:
+
groups == null || !(attrs ? groups) ||
(intersectLists (groups ++ [ "default" ]) attrs.groups) != [];
applyGemConfigs = attrs:
+
(if gemConfig ? ${attrs.gemName}
+
then attrs // gemConfig.${attrs.gemName} attrs
else attrs);
genStubsScript = { lib, ruby, confFiles, bundler, groups, binPaths, ... }: ''
···
inherit (attrs.source) type;
source = removeAttrs attrs.source ["type"];
gemName = name;
+
gemPath = map (gemName: gems.${gemName}) (attrs.dependencies or []);
});
}
+1 -1
pkgs/development/ruby-modules/bundler-env/default.nix
···
postBuild = genStubsScript {
inherit lib ruby bundler groups;
confFiles = basicEnv.confFiles;
-
binPaths = [ basicEnv.gems."${pname}" ];
} + lib.optionalString (postBuild != null) postBuild;
meta = { platforms = ruby.meta.platforms; } // meta;
···
postBuild = genStubsScript {
inherit lib ruby bundler groups;
confFiles = basicEnv.confFiles;
+
binPaths = [ basicEnv.gems.${pname} ];
} + lib.optionalString (postBuild != null) postBuild;
meta = { platforms = ruby.meta.platforms; } // meta;
+4 -4
pkgs/development/tools/build-managers/bazel/default.nix
···
srcs.io_bazel_rules_sass
srcs.platforms
(if stdenv.hostPlatform.isDarwin
-
then srcs.${"java_tools_javac11_darwin-v2.0.zip"}
-
else srcs.${"java_tools_javac11_linux-v2.0.zip"})
-
srcs.${"coverage_output_generator-v1.0.zip"}
srcs.build_bazel_rules_nodejs
-
srcs.${"android_tools_pkg-0.7.tar.gz"}
]);
distDir = runCommand "bazel-deps" {} ''
···
srcs.io_bazel_rules_sass
srcs.platforms
(if stdenv.hostPlatform.isDarwin
+
then srcs."java_tools_javac11_darwin-v2.0.zip"
+
else srcs."java_tools_javac11_linux-v2.0.zip")
+
srcs."coverage_output_generator-v1.0.zip"
srcs.build_bazel_rules_nodejs
+
srcs."android_tools_pkg-0.7.tar.gz"
]);
distDir = runCommand "bazel-deps" {} ''
+5 -5
pkgs/development/tools/build-managers/meson/default.nix
···
let
# See https://mesonbuild.com/Reference-tables.html#cpu-families
cpuFamilies = {
-
"aarch64" = "aarch64";
-
"armv6l" = "arm";
-
"armv7l" = "arm";
-
"i686" = "x86";
-
"x86_64" = "x86_64";
};
in
python3Packages.buildPythonApplication rec {
···
let
# See https://mesonbuild.com/Reference-tables.html#cpu-families
cpuFamilies = {
+
aarch64 = "aarch64";
+
armv6l = "arm";
+
armv7l = "arm";
+
i686 = "x86";
+
x86_64 = "x86_64";
};
in
python3Packages.buildPythonApplication rec {
+6 -6
pkgs/development/tools/misc/kibana/5.x.nix
···
let
inherit (builtins) elemAt;
archOverrides = {
-
"i686" = "x86";
};
info = splitString "-" stdenv.hostPlatform.system;
arch = (elemAt info 0);
-
elasticArch = archOverrides."${arch}" or arch;
plat = elemAt info 1;
shas = {
-
"x86_64-linux" = "0hzr47hyw54b9j4c33n6f6n3pala6kjhyvinfszgikbghyhb7fsa";
-
"i686-linux" = "0bka4h31cw10ii4pfygc81pwc3wr32pzw3v4k4bi8rnqbk280fmn";
-
"x86_64-darwin" = "0jqc2g89rqkla0alqxr14sh4pccfn514jrwr7mkjivxdapygh1ll";
};
in stdenv.mkDerivation rec {
pname = "kibana";
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${pname}-${version}-${plat}-${elasticArch}.tar.gz";
-
sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture");
};
buildInputs = [ makeWrapper ];
···
let
inherit (builtins) elemAt;
archOverrides = {
+
i686 = "x86";
};
info = splitString "-" stdenv.hostPlatform.system;
arch = (elemAt info 0);
+
elasticArch = archOverrides.${arch} or arch;
plat = elemAt info 1;
shas = {
+
x86_64-linux = "0hzr47hyw54b9j4c33n6f6n3pala6kjhyvinfszgikbghyhb7fsa";
+
i686-linux = "0bka4h31cw10ii4pfygc81pwc3wr32pzw3v4k4bi8rnqbk280fmn";
+
x86_64-darwin = "0jqc2g89rqkla0alqxr14sh4pccfn514jrwr7mkjivxdapygh1ll";
};
in stdenv.mkDerivation rec {
pname = "kibana";
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${pname}-${version}-${plat}-${elasticArch}.tar.gz";
+
sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture");
};
buildInputs = [ makeWrapper ];
+5 -5
pkgs/development/tools/misc/kibana/6.x.nix
···
shas =
if enableUnfree
then {
-
"x86_64-linux" = "1i3zmzxihplwd8n994lfxhhgygdg3qxjqgrj1difa8w3vss0zbfn";
-
"x86_64-darwin" = "09a96ms9id77infxd9xxfs6r7j01mn0rz5yw3g9sl92j9ri7r52c";
}
else {
-
"x86_64-linux" = "166rhxr0qlv1yarj2mg1c3b8mxvhl70jhz53azq7ic6laj55q7fk";
-
"x86_64-darwin" = "0ngngkbl036p2mzwhp8qafi3aqzk398a218w12srfqny5n630vdk";
};
in stdenv.mkDerivation rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz";
-
sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture");
};
patches = [
···
shas =
if enableUnfree
then {
+
x86_64-linux = "1i3zmzxihplwd8n994lfxhhgygdg3qxjqgrj1difa8w3vss0zbfn";
+
x86_64-darwin = "09a96ms9id77infxd9xxfs6r7j01mn0rz5yw3g9sl92j9ri7r52c";
}
else {
+
x86_64-linux = "166rhxr0qlv1yarj2mg1c3b8mxvhl70jhz53azq7ic6laj55q7fk";
+
x86_64-darwin = "0ngngkbl036p2mzwhp8qafi3aqzk398a218w12srfqny5n630vdk";
};
in stdenv.mkDerivation rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz";
+
sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture");
};
patches = [
+5 -5
pkgs/development/tools/misc/kibana/7.x.nix
···
shas =
if enableUnfree
then {
-
"x86_64-linux" = "1mzycd0ljnkslz9p9jhq279bkpk35r7svhngxjnmsh11ampsvxb8";
-
"x86_64-darwin" = "1bz409njdpmsagh5dg062114wpa96w7pmxwfjsizwksqyyjdwdv7";
}
else {
-
"x86_64-linux" = "1x3gjc9xa03m4jfnl5vjxigzcnb8ysnhxgd8618v85x4l0010v38";
-
"x86_64-darwin" = "1nsbmrswv2jv2z7686i2sf6rrmxysbqi5ih6jjrbrqnk64xi18j2";
};
in stdenv.mkDerivation rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz";
-
sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture");
};
patches = [
···
shas =
if enableUnfree
then {
+
x86_64-linux = "1mzycd0ljnkslz9p9jhq279bkpk35r7svhngxjnmsh11ampsvxb8";
+
x86_64-darwin = "1bz409njdpmsagh5dg062114wpa96w7pmxwfjsizwksqyyjdwdv7";
}
else {
+
x86_64-linux = "1x3gjc9xa03m4jfnl5vjxigzcnb8ysnhxgd8618v85x4l0010v38";
+
x86_64-darwin = "1nsbmrswv2jv2z7686i2sf6rrmxysbqi5ih6jjrbrqnk64xi18j2";
};
in stdenv.mkDerivation rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/kibana/${name}-${plat}-${arch}.tar.gz";
+
sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture");
};
patches = [
+1 -1
pkgs/development/tools/ocaml/camlp4/default.nix
···
"4.08" = {
version = "4.08+1";
sha256 = "0qplawvxwai25bi27niw2cgz2al01kcnkj8wxwhxslpi21z6pyx1"; };
-
}."${ocaml.meta.branch}";
in
stdenv.mkDerivation rec {
···
"4.08" = {
version = "4.08+1";
sha256 = "0qplawvxwai25bi27niw2cgz2al01kcnkj8wxwhxslpi21z6pyx1"; };
+
}.${ocaml.meta.branch};
in
stdenv.mkDerivation rec {
+1 -1
pkgs/development/tools/ocaml/js_of_ocaml/default.nix
···
sha256 = {
"2.7" = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj";
"2.8.4" = "098ph50s9kqw6rc3qjn39zv9b5swdf4qr44afwqfkkjgjs5d7vbl";
-
}."${version}";
};
buildInputs = [ ocaml findlib menhir ocsigen_deriving ocamlbuild
···
sha256 = {
"2.7" = "1dali1akyd4zmkwav0d957ynxq2jj6cc94r4xiaql7ca89ajz4jj";
"2.8.4" = "098ph50s9kqw6rc3qjn39zv9b5swdf4qr44afwqfkkjgjs5d7vbl";
+
}.${version};
};
buildInputs = [ ocaml findlib menhir ocsigen_deriving ocamlbuild
+3 -3
pkgs/development/tools/selenium/chromedriver/default.nix
···
}:
let
allSpecs = {
-
"x86_64-linux" = {
system = "linux64";
sha256 = "04wb6h57daxmnv3a3xrcsznawbx7r8wyi1vk1g26z2l2ppcnsbzv";
};
-
"x86_64-darwin" = {
system = "mac64";
sha256 = "0f8j7m8ardaaw8pv02vxhwkqbcm34366bln0np0j0ig21d4fag09";
};
};
-
spec = allSpecs."${stdenv.hostPlatform.system}"
or (throw "missing chromedriver binary for ${stdenv.hostPlatform.system}");
libs = stdenv.lib.makeLibraryPath [
···
}:
let
allSpecs = {
+
x86_64-linux = {
system = "linux64";
sha256 = "04wb6h57daxmnv3a3xrcsznawbx7r8wyi1vk1g26z2l2ppcnsbzv";
};
+
x86_64-darwin = {
system = "mac64";
sha256 = "0f8j7m8ardaaw8pv02vxhwkqbcm34366bln0np0j0ig21d4fag09";
};
};
+
spec = allSpecs.${stdenv.hostPlatform.system}
or (throw "missing chromedriver binary for ${stdenv.hostPlatform.system}");
libs = stdenv.lib.makeLibraryPath [
+1 -1
pkgs/development/web/remarkjs/nodepkgs.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../node-packages/node-env.nix {
+6 -6
pkgs/games/dwarf-fortress/game.nix
···
# Other srcs are avilable like 32-bit mac & win, but I have only
# included the ones most likely to be needed by Nixpkgs users.
platforms = {
-
"x86_64-linux" = "linux";
-
"i686-linux" = "linux32";
-
"x86_64-darwin" = "osx";
-
"i686-darwin" = "osx32";
-
"x86_64-cygwin" = "win";
-
"i686-cygwin" = "win32";
};
dfVersionTriple = splitString "." dfVersion;
···
# Other srcs are avilable like 32-bit mac & win, but I have only
# included the ones most likely to be needed by Nixpkgs users.
platforms = {
+
x86_64-linux = "linux";
+
i686-linux = "linux32";
+
x86_64-darwin = "osx";
+
i686-darwin = "osx32";
+
x86_64-cygwin = "win";
+
i686-cygwin = "win32";
};
dfVersionTriple = splitString "." dfVersion;
+1 -1
pkgs/misc/base16-builder/node-packages.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../development/node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../development/node-packages/node-env.nix {
+6 -6
pkgs/misc/drivers/hplip/3.16.11.nix
···
};
hplipPlatforms = {
-
"i686-linux" = "x86_32";
-
"x86_64-linux" = "x86_64";
-
"armv6l-linux" = "arm32";
-
"armv7l-linux" = "arm32";
-
"aarch64-linux" = "arm64";
};
-
hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}"
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
···
};
hplipPlatforms = {
+
i686-linux = "x86_32";
+
x86_64-linux = "x86_64";
+
armv6l-linux = "arm32";
+
armv7l-linux = "arm32";
+
aarch64-linux = "arm64";
};
+
hplipArch = hplipPlatforms.${stdenv.hostPlatform.system}
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
+6 -6
pkgs/misc/drivers/hplip/3.18.5.nix
···
};
hplipPlatforms = {
-
"i686-linux" = "x86_32";
-
"x86_64-linux" = "x86_64";
-
"armv6l-linux" = "arm32";
-
"armv7l-linux" = "arm32";
-
"aarch64-linux" = "arm64";
};
-
hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}"
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
···
};
hplipPlatforms = {
+
i686-linux = "x86_32";
+
x86_64-linux = "x86_64";
+
armv6l-linux = "arm32";
+
armv7l-linux = "arm32";
+
aarch64-linux = "arm64";
};
+
hplipArch = hplipPlatforms.${stdenv.hostPlatform.system}
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" "arm64" ];
+5 -5
pkgs/misc/drivers/hplip/default.nix
···
};
hplipPlatforms = {
-
"i686-linux" = "x86_32";
-
"x86_64-linux" = "x86_64";
-
"armv6l-linux" = "arm32";
-
"armv7l-linux" = "arm32";
};
-
hplipArch = hplipPlatforms."${stdenv.hostPlatform.system}"
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" ];
···
};
hplipPlatforms = {
+
i686-linux = "x86_32";
+
x86_64-linux = "x86_64";
+
armv6l-linux = "arm32";
+
armv7l-linux = "arm32";
};
+
hplipArch = hplipPlatforms.${stdenv.hostPlatform.system}
or (throw "HPLIP not supported on ${stdenv.hostPlatform.system}");
pluginArches = [ "x86_32" "x86_64" "arm32" ];
+2 -2
pkgs/misc/vim-plugins/vim-utils.nix
···
${lib.concatMapStrings (plugin: ''
let g:nix_plugin_locations['${plugin.pname}'] = "${plugin.rtp}"
'') plugins}
-
let g:nix_plugin_locations['vim-addon-manager'] = "${knownPlugins."vim-addon-manager".rtp}"
let g:vim_addon_manager = {}
···
name = "vim_with_custom_plugin";
vimrcConfig.vam.knownPlugins =
vimPlugins // ({
-
"vim-trailing-whitespace" = buildVimPluginFrom2Nix {
name = "vim-trailing-whitespace";
src = fetchFromGitHub {
owner = "bronson";
···
${lib.concatMapStrings (plugin: ''
let g:nix_plugin_locations['${plugin.pname}'] = "${plugin.rtp}"
'') plugins}
+
let g:nix_plugin_locations['vim-addon-manager'] = "${knownPlugins.vim-addon-manager.rtp}"
let g:vim_addon_manager = {}
···
name = "vim_with_custom_plugin";
vimrcConfig.vam.knownPlugins =
vimPlugins // ({
+
vim-trailing-whitespace = buildVimPluginFrom2Nix {
name = "vim-trailing-whitespace";
src = fetchFromGitHub {
owner = "bronson";
+3 -3
pkgs/misc/vscode-extensions/python/default.nix
···
else throw "Only x86_64 Linux and Darwin are supported.";
languageServerSha256 = {
-
"linux-x64" = "0j9251f8dfccmg0x9gzg1cai4k5zd0alcfpb0443gs4jqakl0lr2";
-
"osx-x64" = "070qwwl08fa24rsnln4i5x9mfriqaw920l6v2j8d1r0zylxnyjsa";
-
}."${arch}";
# version is languageServerVersion in the package.json
languageServer = extractNuGet rec {
···
else throw "Only x86_64 Linux and Darwin are supported.";
languageServerSha256 = {
+
linux-x64 = "0j9251f8dfccmg0x9gzg1cai4k5zd0alcfpb0443gs4jqakl0lr2";
+
osx-x64 = "070qwwl08fa24rsnln4i5x9mfriqaw920l6v2j8d1r0zylxnyjsa";
+
}.${arch};
# version is languageServerVersion in the package.json
languageServer = extractNuGet rec {
+4 -4
pkgs/os-specific/bsd/netbsd/default.nix
···
HOST_SH = "${buildPackages.bash}/bin/sh";
MACHINE_ARCH = {
-
"i686" = "i386";
}.${stdenv'.hostPlatform.parsed.cpu.name}
or stdenv'.hostPlatform.parsed.cpu.name;
MACHINE = {
-
"x86_64" = "amd64";
-
"aarch64" = "evbarm64";
-
"i686" = "i386";
}.${stdenv'.hostPlatform.parsed.cpu.name}
or stdenv'.hostPlatform.parsed.cpu.name;
···
HOST_SH = "${buildPackages.bash}/bin/sh";
MACHINE_ARCH = {
+
i686 = "i386";
}.${stdenv'.hostPlatform.parsed.cpu.name}
or stdenv'.hostPlatform.parsed.cpu.name;
MACHINE = {
+
x86_64 = "amd64";
+
aarch64 = "evbarm64";
+
i686 = "i386";
}.${stdenv'.hostPlatform.parsed.cpu.name}
or stdenv'.hostPlatform.parsed.cpu.name;
+3 -3
pkgs/os-specific/darwin/xcode/sdk-pkgs.nix
···
minSdkVersion = "9.0";
iosPlatformArch = { parsed, ... }: {
-
"armv7a" = "armv7";
-
"aarch64" = "arm64";
-
"x86_64" = "x86_64";
}.${parsed.cpu.name};
in
···
minSdkVersion = "9.0";
iosPlatformArch = { parsed, ... }: {
+
armv7a = "armv7";
+
aarch64 = "arm64";
+
x86_64 = "x86_64";
}.${parsed.cpu.name};
in
+3 -3
pkgs/os-specific/linux/kernel/linux-rpi.nix
···
};
defconfig = {
-
"armv6l-linux" = "bcmrpi_defconfig";
-
"armv7l-linux" = "bcm2709_defconfig";
-
"aarch64-linux" = "bcmrpi3_defconfig";
}.${stdenv.hostPlatform.system} or (throw "linux_rpi not supported on '${stdenv.hostPlatform.system}'");
features = {
···
};
defconfig = {
+
armv6l-linux = "bcmrpi_defconfig";
+
armv7l-linux = "bcm2709_defconfig";
+
aarch64-linux = "bcmrpi3_defconfig";
}.${stdenv.hostPlatform.system} or (throw "linux_rpi not supported on '${stdenv.hostPlatform.system}'");
features = {
+7 -7
pkgs/servers/nosql/arangodb/default.nix
···
"-DUSE_OPTIMIZE_FOR_ARCHITECTURE=OFF"
# also avoid using builder's /proc/cpuinfo
] ++
-
{ "westmere" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"sandybridge" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"ivybridge" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"haswell" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"broadwell" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"skylake" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
-
"skylake-avx512" = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
}.${stdenv.hostPlatform.platform.gcc.arch or ""} or [ "-DHAVE_SSE42=OFF" "-DASM_OPTIMIZATIONS=OFF" ];
enableParallelBuilding = true;
···
"-DUSE_OPTIMIZE_FOR_ARCHITECTURE=OFF"
# also avoid using builder's /proc/cpuinfo
] ++
+
{ westmere = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
sandybridge = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
ivybridge = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
haswell = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
broadwell = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
skylake = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
+
skylake-avx512 = [ "-DHAVE_SSE42=ON" "-DASM_OPTIMIZATIONS=ON" ];
}.${stdenv.hostPlatform.platform.gcc.arch or ""} or [ "-DHAVE_SSE42=OFF" "-DASM_OPTIMIZATIONS=OFF" ];
enableParallelBuilding = true;
+5 -5
pkgs/servers/search/elasticsearch/7.x.nix
···
shas =
if enableUnfree
then {
-
"x86_64-linux" = "1jkfllafcjqhfydsy90jx2ghpv5cmm6gabv206niwg9qc6y6r1ik";
-
"x86_64-darwin" = "1lgyxq3yahdww0wpqmpc1mz57kmk5hy2drb1dha69k9l0ibmjf18";
}
else {
-
"x86_64-linux" = "0pg22wi2xcjla44azfvn9c58r4xq3x9jiwh7qb0d8f3nv30vfd10";
-
"x86_64-darwin" = "0d9xg3bf06mr7mw2bd16gb2xrfjncrhj19846rrj4j5gb2qjz0x2";
};
in
stdenv.mkDerivation (rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/elasticsearch/${name}-${plat}-${arch}.tar.gz";
-
sha256 = shas."${stdenv.hostPlatform.system}" or (throw "Unknown architecture");
};
patches = [ ./es-home-6.x.patch ];
···
shas =
if enableUnfree
then {
+
x86_64-linux = "1jkfllafcjqhfydsy90jx2ghpv5cmm6gabv206niwg9qc6y6r1ik";
+
x86_64-darwin = "1lgyxq3yahdww0wpqmpc1mz57kmk5hy2drb1dha69k9l0ibmjf18";
}
else {
+
x86_64-linux = "0pg22wi2xcjla44azfvn9c58r4xq3x9jiwh7qb0d8f3nv30vfd10";
+
x86_64-darwin = "0d9xg3bf06mr7mw2bd16gb2xrfjncrhj19846rrj4j5gb2qjz0x2";
};
in
stdenv.mkDerivation (rec {
···
src = fetchurl {
url = "https://artifacts.elastic.co/downloads/elasticsearch/${name}-${plat}-${arch}.tar.gz";
+
sha256 = shas.${stdenv.hostPlatform.system} or (throw "Unknown architecture");
};
patches = [ ./es-home-6.x.patch ];
+1 -1
pkgs/servers/web-apps/cryptpad/node-packages.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
+21 -21
pkgs/stdenv/default.nix
···
if crossSystem != localSystem || crossOverlays != [] then stagesCross
else if config ? replaceStdenv then stagesCustom
else { # switch
-
"i686-linux" = stagesLinux;
-
"x86_64-linux" = stagesLinux;
-
"armv5tel-linux" = stagesLinux;
-
"armv6l-linux" = stagesLinux;
-
"armv6m-linux" = stagesLinux;
-
"armv7a-linux" = stagesLinux;
-
"armv7l-linux" = stagesLinux;
-
"armv7r-linux" = stagesLinux;
-
"armv7m-linux" = stagesLinux;
-
"armv8a-linux" = stagesLinux;
-
"armv8r-linux" = stagesLinux;
-
"armv8m-linux" = stagesLinux;
-
"aarch64-linux" = stagesLinux;
-
"mipsel-linux" = stagesLinux;
-
"powerpc-linux" = /* stagesLinux */ stagesNative;
-
"powerpc64le-linux" = stagesLinux;
-
"x86_64-darwin" = stagesDarwin;
-
"x86_64-solaris" = stagesNix;
-
"i686-cygwin" = stagesNative;
-
"x86_64-cygwin" = stagesNative;
-
"x86_64-freebsd" = stagesFreeBSD;
}.${localSystem.system} or stagesNative
···
if crossSystem != localSystem || crossOverlays != [] then stagesCross
else if config ? replaceStdenv then stagesCustom
else { # switch
+
i686-linux = stagesLinux;
+
x86_64-linux = stagesLinux;
+
armv5tel-linux = stagesLinux;
+
armv6l-linux = stagesLinux;
+
armv6m-linux = stagesLinux;
+
armv7a-linux = stagesLinux;
+
armv7l-linux = stagesLinux;
+
armv7r-linux = stagesLinux;
+
armv7m-linux = stagesLinux;
+
armv8a-linux = stagesLinux;
+
armv8r-linux = stagesLinux;
+
armv8m-linux = stagesLinux;
+
aarch64-linux = stagesLinux;
+
mipsel-linux = stagesLinux;
+
powerpc-linux = /* stagesLinux */ stagesNative;
+
powerpc64le-linux = stagesLinux;
+
x86_64-darwin = stagesDarwin;
+
x86_64-solaris = stagesNix;
+
i686-cygwin = stagesNative;
+
x86_64-cygwin = stagesNative;
+
x86_64-freebsd = stagesFreeBSD;
}.${localSystem.system} or stagesNative
+1 -1
pkgs/stdenv/generic/check-meta.nix
···
'' + (builtins.getAttr reason remediation) attrs;
-
handler = if config ? "handleEvalIssue"
then config.handleEvalIssue reason
else throw;
in handler msg;
···
'' + (builtins.getAttr reason remediation) attrs;
+
handler = if config ? handleEvalIssue
then config.handleEvalIssue reason
else throw;
in handler msg;
+14 -14
pkgs/stdenv/linux/default.nix
···
, bootstrapFiles ?
let table = {
-
"glibc" = {
-
"i686-linux" = import ./bootstrap-files/i686.nix;
-
"x86_64-linux" = import ./bootstrap-files/x86_64.nix;
-
"armv5tel-linux" = import ./bootstrap-files/armv5tel.nix;
-
"armv6l-linux" = import ./bootstrap-files/armv6l.nix;
-
"armv7l-linux" = import ./bootstrap-files/armv7l.nix;
-
"aarch64-linux" = import ./bootstrap-files/aarch64.nix;
-
"mipsel-linux" = import ./bootstrap-files/loongson2f.nix;
-
"powerpc64le-linux" = import ./bootstrap-files/ppc64le.nix;
};
-
"musl" = {
-
"aarch64-linux" = import ./bootstrap-files/aarch64-musl.nix;
-
"armv6l-linux" = import ./bootstrap-files/armv6l-musl.nix;
-
"x86_64-linux" = import ./bootstrap-files/x86_64-musl.nix;
-
"powerpc64le-linux" = import ./bootstrap-files/ppc64le-musl.nix;
};
};
···
, bootstrapFiles ?
let table = {
+
glibc = {
+
i686-linux = import ./bootstrap-files/i686.nix;
+
x86_64-linux = import ./bootstrap-files/x86_64.nix;
+
armv5tel-linux = import ./bootstrap-files/armv5tel.nix;
+
armv6l-linux = import ./bootstrap-files/armv6l.nix;
+
armv7l-linux = import ./bootstrap-files/armv7l.nix;
+
aarch64-linux = import ./bootstrap-files/aarch64.nix;
+
mipsel-linux = import ./bootstrap-files/loongson2f.nix;
+
powerpc64le-linux = import ./bootstrap-files/ppc64le.nix;
};
+
musl = {
+
aarch64-linux = import ./bootstrap-files/aarch64-musl.nix;
+
armv6l-linux = import ./bootstrap-files/armv6l-musl.nix;
+
x86_64-linux = import ./bootstrap-files/x86_64-musl.nix;
+
powerpc64le-linux = import ./bootstrap-files/ppc64le-musl.nix;
};
};
+2 -2
pkgs/stdenv/native/default.nix
···
cc = let
nativePrefix = { # switch
-
"i686-solaris" = "/usr/gnu";
-
"x86_64-solaris" = "/opt/local/gcc47";
}.${system} or "/usr";
in
import ../../build-support/cc-wrapper {
···
cc = let
nativePrefix = { # switch
+
i686-solaris = "/usr/gnu";
+
x86_64-solaris = "/opt/local/gcc47";
}.${system} or "/usr";
in
import ../../build-support/cc-wrapper {
+2 -2
pkgs/tools/admin/pulumi/default.nix
···
# switch the dropdown to “manual” on https://pulumi.io/quickstart/install.html # TODO: update script
pulumiArchPackage = {
-
"x86_64-linux" = {
url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-linux-x64.tar.gz";
sha256 = "13ajgc8x5l3s93hmz6jg88if10bvd319jmkljy4n26zdp30vfqmw";
};
-
"x86_64-darwin" = {
url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-darwin-x64.tar.gz";
sha256 = "0chpbnz2s4icwgmfq6kl8blz5mg4lpdqg061w3nh0p04adpgrn48";
};
···
# switch the dropdown to “manual” on https://pulumi.io/quickstart/install.html # TODO: update script
pulumiArchPackage = {
+
x86_64-linux = {
url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-linux-x64.tar.gz";
sha256 = "13ajgc8x5l3s93hmz6jg88if10bvd319jmkljy4n26zdp30vfqmw";
};
+
x86_64-darwin = {
url = "https://get.pulumi.com/releases/sdk/pulumi-v${version}-darwin-x64.tar.gz";
sha256 = "0chpbnz2s4icwgmfq6kl8blz5mg4lpdqg061w3nh0p04adpgrn48";
};
+1 -1
pkgs/tools/backup/lvmsync/default.nix
···
let
pname = "lvmsync";
-
version = (import ./gemset.nix)."${pname}".version;
in stdenv.mkDerivation rec {
···
let
pname = "lvmsync";
+
version = (import ./gemset.nix).${pname}.version;
in stdenv.mkDerivation rec {
+3 -3
pkgs/tools/bootloaders/refind/default.nix
···
let
archids = {
-
"x86_64-linux" = { hostarch = "x86_64"; efiPlatform = "x64"; };
-
"i686-linux" = rec { hostarch = "ia32"; efiPlatform = hostarch; };
-
"aarch64-linux" = rec { hostarch = "aarch64"; efiPlatform = "aa64"; };
};
inherit
···
let
archids = {
+
x86_64-linux = { hostarch = "x86_64"; efiPlatform = "x64"; };
+
i686-linux = rec { hostarch = "ia32"; efiPlatform = hostarch; };
+
aarch64-linux = rec { hostarch = "aarch64"; efiPlatform = "aa64"; };
};
inherit
+8 -8
pkgs/tools/misc/grub/2.0x.nix
···
with stdenv.lib;
let
pcSystems = {
-
"i686-linux".target = "i386";
-
"x86_64-linux".target = "i386";
};
efiSystemsBuild = {
-
"i686-linux".target = "i386";
-
"x86_64-linux".target = "x86_64";
-
"aarch64-linux".target = "aarch64";
};
# For aarch64, we need to use '--target=aarch64-efi' when building,
# but '--target=arm64-efi' when installing. Insanity!
efiSystemsInstall = {
-
"i686-linux".target = "i386";
-
"x86_64-linux".target = "x86_64";
-
"aarch64-linux".target = "arm64";
};
canEfi = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) efiSystemsBuild);
···
with stdenv.lib;
let
pcSystems = {
+
i686-linux.target = "i386";
+
x86_64-linux.target = "i386";
};
efiSystemsBuild = {
+
i686-linux.target = "i386";
+
x86_64-linux.target = "x86_64";
+
aarch64-linux.target = "aarch64";
};
# For aarch64, we need to use '--target=aarch64-efi' when building,
# but '--target=arm64-efi' when installing. Insanity!
efiSystemsInstall = {
+
i686-linux.target = "i386";
+
x86_64-linux.target = "x86_64";
+
aarch64-linux.target = "arm64";
};
canEfi = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) efiSystemsBuild);
+3 -3
pkgs/tools/misc/grub/pvgrub_image/default.nix
···
with stdenv.lib;
let
efiSystemsBuild = {
-
"i686-linux".target = "i386";
-
"x86_64-linux".target = "x86_64";
-
"aarch64-linux".target = "aarch64";
};
in (
···
with stdenv.lib;
let
efiSystemsBuild = {
+
i686-linux.target = "i386";
+
x86_64-linux.target = "x86_64";
+
aarch64-linux.target = "aarch64";
};
in (
+2 -2
pkgs/tools/misc/grub/trusted.nix
···
with stdenv.lib;
let
pcSystems = {
-
"i686-linux".target = "i386";
-
"x86_64-linux".target = "i386";
};
inPCSystems = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) pcSystems);
···
with stdenv.lib;
let
pcSystems = {
+
i686-linux.target = "i386";
+
x86_64-linux.target = "i386";
};
inPCSystems = any (system: stdenv.hostPlatform.system == system) (mapAttrsToList (name: _: name) pcSystems);
+1 -1
pkgs/tools/networking/airfield/node.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
+1 -1
pkgs/tools/networking/envoy/default.nix
···
# Generate the BUILD file.
buildFile =
let field = name: attrs:
-
if attrs ? "${name}" then " ${name} = ${attrs.${name}},\n" else "";
in
''
licenses(["notice"]) # Apache 2
···
# Generate the BUILD file.
buildFile =
let field = name: attrs:
+
if attrs ? ${name} then " ${name} = ${attrs.${name}},\n" else "";
in
''
licenses(["notice"]) # Apache 2
+1 -1
pkgs/tools/networking/s6-networking/default.nix
···
inherit (stdenv) lib;
sslSupportEnabled = sslSupport != false;
sslLibs = {
-
"libressl" = libressl;
};
in
···
inherit (stdenv) lib;
sslSupportEnabled = sslSupport != false;
sslLibs = {
+
libressl = libressl;
};
in
+1 -1
pkgs/tools/package-management/nixui/nixui.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
+1 -1
pkgs/tools/security/bitwarden-cli/node-packages.nix
···
{pkgs ? import <nixpkgs> {
inherit system;
-
}, system ? builtins.currentSystem, nodejs ? pkgs."nodejs-10_x"}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
···
{pkgs ? import <nixpkgs> {
inherit system;
+
}, system ? builtins.currentSystem, nodejs ? pkgs.nodejs-10_x}:
let
nodeEnv = import ../../../development/node-packages/node-env.nix {
+2 -2
pkgs/tools/security/bitwarden/default.nix
···
pname = "bitwarden";
version = {
-
"x86_64-linux" = "1.15.2";
}.${system} or "";
sha256 = {
-
"x86_64-linux" = "0yz4hkqqwq2zrdjfxk5kybhs90n80k6bkn0625m47b09lwl2di4f";
}.${system} or "";
meta = with stdenv.lib; {
···
pname = "bitwarden";
version = {
+
x86_64-linux = "1.15.2";
}.${system} or "";
sha256 = {
+
x86_64-linux = "0yz4hkqqwq2zrdjfxk5kybhs90n80k6bkn0625m47b09lwl2di4f";
}.${system} or "";
meta = with stdenv.lib; {
+6 -6
pkgs/tools/security/vault/vault-bin.nix
···
sources = let
base = "https://releases.hashicorp.com/vault/${version}";
in {
-
"x86_64-linux" = fetchurl {
url = "${base}/vault_${version}_linux_amd64.zip";
sha256 = "293b88f4d31f6bcdcc8b508eccb7b856a0423270adebfa0f52f04144c5a22ae0";
};
-
"i686-linux" = fetchurl {
url = "${base}/vault_${version}_linux_386.zip";
sha256 = "9f2fb99e08fa3d25af1497516d08b5d2d8a73bcacd5354ddec024e9628795867";
};
-
"x86_64-darwin" = fetchurl {
url = "${base}/vault_${version}_darwin_amd64.zip";
sha256 = "a0a7a242f8299ac4a00af8aa10ccedaf63013c8a068f56eadfb9d730b87155ea";
};
-
"i686-darwin" = fetchurl {
url = "${base}/vault_${version}_darwin_386.zip";
sha256 = "50542cfb37abb06e8bb6b8ba41f5ca7d72a4d6a4396d4e3f4a8391bed14f63be";
};
-
"aarch64-linux" = fetchurl {
url = "${base}/vault_${version}_linux_arm64.zip";
sha256 = "c243dce14b2e48e3667c2aa5b7fb37009dd7043b56032d6ebe50dd456715fd3f";
};
···
pname = "vault-bin";
inherit version;
-
src = sources."${stdenv.hostPlatform.system}" or (throw "unsupported system: ${stdenv.hostPlatform.system}");
nativeBuildInputs = [ unzip ];
···
sources = let
base = "https://releases.hashicorp.com/vault/${version}";
in {
+
x86_64-linux = fetchurl {
url = "${base}/vault_${version}_linux_amd64.zip";
sha256 = "293b88f4d31f6bcdcc8b508eccb7b856a0423270adebfa0f52f04144c5a22ae0";
};
+
i686-linux = fetchurl {
url = "${base}/vault_${version}_linux_386.zip";
sha256 = "9f2fb99e08fa3d25af1497516d08b5d2d8a73bcacd5354ddec024e9628795867";
};
+
x86_64-darwin = fetchurl {
url = "${base}/vault_${version}_darwin_amd64.zip";
sha256 = "a0a7a242f8299ac4a00af8aa10ccedaf63013c8a068f56eadfb9d730b87155ea";
};
+
i686-darwin = fetchurl {
url = "${base}/vault_${version}_darwin_386.zip";
sha256 = "50542cfb37abb06e8bb6b8ba41f5ca7d72a4d6a4396d4e3f4a8391bed14f63be";
};
+
aarch64-linux = fetchurl {
url = "${base}/vault_${version}_linux_arm64.zip";
sha256 = "c243dce14b2e48e3667c2aa5b7fb37009dd7043b56032d6ebe50dd456715fd3f";
};
···
pname = "vault-bin";
inherit version;
+
src = sources.${stdenv.hostPlatform.system} or (throw "unsupported system: ${stdenv.hostPlatform.system}");
nativeBuildInputs = [ unzip ];
+14 -14
pkgs/tools/typesetting/kindlegen/default.nix
···
fileVersion = builtins.replaceStrings [ "." ] [ "_" ] version;
sha256 = {
-
"x86_64-linux" = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q";
-
"i686-linux" = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q";
-
"x86_64-darwin" = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs";
-
"i686-darwin" = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs";
-
"x86_64-cygwin" = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h";
-
"i686-cygwin" = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h";
-
}."${stdenv.hostPlatform.system}" or (throw "system #{stdenv.hostPlatform.system.} is not supported");
url = {
-
"x86_64-linux" = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz";
-
"i686-linux" = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz";
-
"x86_64-darwin" = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip";
-
"i686-darwin" = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip";
-
"x86_64-cygwin" = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip";
-
"i686-cygwin" = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip";
-
}."${stdenv.hostPlatform.system}" or (throw "system #{stdenv.hostPlatform.system.} is not supported");
in stdenv.mkDerivation rec {
pname = "kindlegen";
···
fileVersion = builtins.replaceStrings [ "." ] [ "_" ] version;
sha256 = {
+
x86_64-linux = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q";
+
i686-linux = "15i20kzhdcmi94w7wfhqbl6j20v47cdakjm2mn3x8w495iddna4q";
+
x86_64-darwin = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs";
+
i686-darwin = "0zniyn0s41fxqrajbgwxbcsj5vzf9m7a6yvdz2b11mphr00kpbbs";
+
x86_64-cygwin = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h";
+
i686-cygwin = "02slfh1bbpijay4skj85cjiv7z43ha8vm5aa1lwiqjk86qbl1f3h";
+
}.${stdenv.hostPlatform.system} or (throw "system #{stdenv.hostPlatform.system.} is not supported");
url = {
+
x86_64-linux = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz";
+
i686-linux = "http://kindlegen.s3.amazonaws.com/kindlegen_linux_2.6_i386_v${fileVersion}.tar.gz";
+
x86_64-darwin = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip";
+
i686-darwin = "http://kindlegen.s3.amazonaws.com/KindleGen_Mac_i386_v${fileVersion}.zip";
+
x86_64-cygwin = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip";
+
i686-cygwin = "http://kindlegen.s3.amazonaws.com/kindlegen_win32_v${fileVersion}.zip";
+
}.${stdenv.hostPlatform.system} or (throw "system #{stdenv.hostPlatform.system.} is not supported");
in stdenv.mkDerivation rec {
pname = "kindlegen";
+2 -2
pkgs/tools/typesetting/tex/texlive/default.nix
···
# the fake derivations are used for filtering of hyphenation patterns
else { inherit pname version; tlType = "run"; }
)]
-
++ lib.optional (attrs.sha512 ? "doc") (mkPkgV "doc")
-
++ lib.optional (attrs.sha512 ? "source") (mkPkgV "source")
++ lib.optional (bin ? ${pname})
( bin.${pname} // { inherit pname; tlType = "bin"; } )
++ combinePkgs (attrs.deps or {});
···
# the fake derivations are used for filtering of hyphenation patterns
else { inherit pname version; tlType = "run"; }
)]
+
++ lib.optional (attrs.sha512 ? doc) (mkPkgV "doc")
+
++ lib.optional (attrs.sha512 ? source) (mkPkgV "source")
++ lib.optional (bin ? ${pname})
( bin.${pname} // { inherit pname; tlType = "bin"; } )
++ combinePkgs (attrs.deps or {});
+4 -4
pkgs/top-level/haskell-packages.nix
···
(pkgs.lib.attrNames compiler);
in pkgs.recurseIntoAttrs (pkgs.lib.genAttrs
integerSimpleGhcNames
-
(name: compiler."${name}".override { enableIntegerSimple = true; }));
};
# Default overrides that are applied to all package sets.
···
integerSimpleGhcNames = pkgs.lib.filter
(name: ! builtins.elem name integerSimpleExcludes)
(pkgs.lib.attrNames packages);
-
in pkgs.lib.genAttrs integerSimpleGhcNames (name: packages."${name}".override {
-
ghc = bh.compiler.integer-simple."${name}";
-
buildHaskellPackages = bh.packages.integer-simple."${name}";
overrides = _self : _super : {
integer-simple = null;
integer-gmp = null;
···
(pkgs.lib.attrNames compiler);
in pkgs.recurseIntoAttrs (pkgs.lib.genAttrs
integerSimpleGhcNames
+
(name: compiler.${name}.override { enableIntegerSimple = true; }));
};
# Default overrides that are applied to all package sets.
···
integerSimpleGhcNames = pkgs.lib.filter
(name: ! builtins.elem name integerSimpleExcludes)
(pkgs.lib.attrNames packages);
+
in pkgs.lib.genAttrs integerSimpleGhcNames (name: packages.${name}.override {
+
ghc = bh.compiler.integer-simple.${name};
+
buildHaskellPackages = bh.packages.integer-simple.${name};
overrides = _self : _super : {
integer-simple = null;
integer-gmp = null;
+6 -6
pkgs/top-level/stage.nix
···
then "localSystem" else "crossSystem"} = {
parsed = stdenv.hostPlatform.parsed // {
abi = {
-
"gnu" = lib.systems.parse.abis.musl;
-
"gnueabi" = lib.systems.parse.abis.musleabi;
-
"gnueabihf" = lib.systems.parse.abis.musleabihf;
}.${stdenv.hostPlatform.parsed.abi.name}
or lib.systems.parse.abis.musl;
};
···
crossSystem = {
parsed = stdenv.hostPlatform.parsed // {
abi = {
-
"gnu" = lib.systems.parse.abis.musl;
-
"gnueabi" = lib.systems.parse.abis.musleabi;
-
"gnueabihf" = lib.systems.parse.abis.musleabihf;
}.${stdenv.hostPlatform.parsed.abi.name}
or lib.systems.parse.abis.musl;
};
···
then "localSystem" else "crossSystem"} = {
parsed = stdenv.hostPlatform.parsed // {
abi = {
+
gnu = lib.systems.parse.abis.musl;
+
gnueabi = lib.systems.parse.abis.musleabi;
+
gnueabihf = lib.systems.parse.abis.musleabihf;
}.${stdenv.hostPlatform.parsed.abi.name}
or lib.systems.parse.abis.musl;
};
···
crossSystem = {
parsed = stdenv.hostPlatform.parsed // {
abi = {
+
gnu = lib.systems.parse.abis.musl;
+
gnueabi = lib.systems.parse.abis.musleabi;
+
gnueabihf = lib.systems.parse.abis.musleabihf;
}.${stdenv.hostPlatform.parsed.abi.name}
or lib.systems.parse.abis.musl;
};