chore: move meta option to top level in many modules

+5 -6
nixos/modules/image/repart.nix
···
;
inherit fileSystems definitionsDirectory mkfsEnv;
};
+
};
-
meta.maintainers = with lib.maintainers; [
-
nikstur
-
willibutz
-
];
-
-
};
+
meta.maintainers = with lib.maintainers; [
+
nikstur
+
willibutz
+
];
}
+2 -2
nixos/modules/security/isolate.nix
···
systemd.slices.isolate = {
description = "Isolate Sandbox Slice";
};
-
-
meta.maintainers = with maintainers; [ virchau13 ];
};
+
+
meta.maintainers = with maintainers; [ virchau13 ];
}
-2
nixos/modules/security/please.nix
···
sshAgentAuth = true;
usshAuth = true;
};
-
-
meta.maintainers = [ ];
};
}
+2 -2
nixos/modules/services/misc/devpi-server.nix
···
networking.firewall = lib.mkIf cfg.openFirewall {
allowedTCPPorts = [ cfg.port ];
};
-
-
meta.maintainers = [ lib.maintainers.cafkafk ];
};
+
+
meta.maintainers = [ lib.maintainers.cafkafk ];
}
+5 -5
nixos/modules/services/networking/ntp/chrony.nix
···
};
};
-
config = mkIf cfg.enable {
-
meta.maintainers = with lib.maintainers; [
-
thoughtpolice
-
vifino
-
];
+
meta.maintainers = with lib.maintainers; [
+
thoughtpolice
+
vifino
+
];
+
config = mkIf cfg.enable {
environment.systemPackages = [ chronyPkg ];
users.groups.chrony.gid = config.ids.gids.chrony;
+2 -2
nixos/modules/services/networking/ntp/ntpd.nix
···
###### implementation
-
config = mkIf config.services.ntp.enable {
-
meta.maintainers = with lib.maintainers; [ thoughtpolice ];
+
meta.maintainers = with lib.maintainers; [ thoughtpolice ];
+
config = mkIf config.services.ntp.enable {
# Make tools such as ntpq available in the system path.
environment.systemPackages = [ pkgs.ntp ];
services.timesyncd.enable = mkForce false;
+2 -1
nixos/modules/services/networking/ntp/openntpd.nix
···
###### implementation
+
meta.maintainers = with lib.maintainers; [ thoughtpolice ];
+
config = mkIf cfg.enable {
-
meta.maintainers = with lib.maintainers; [ thoughtpolice ];
services.timesyncd.enable = mkForce false;
# Add ntpctl to the environment for status checking
+7 -7
nixos/modules/services/networking/stunnel.nix
···
Type = "forking";
};
};
-
-
meta.maintainers = with lib.maintainers; [
-
# Server side
-
lschuermann
-
# Client side
-
das_j
-
];
};
+
+
meta.maintainers = with lib.maintainers; [
+
# Server side
+
lschuermann
+
# Client side
+
das_j
+
];
}
+2 -2
nixos/modules/services/networking/whoogle-search.nix
···
RestartSec = "5s";
};
};
-
-
meta.maintainers = with lib.maintainers; [ malte-v ];
};
+
+
meta.maintainers = with lib.maintainers; [ malte-v ];
}
+2 -1
nixos/modules/services/networking/xandikos.nix
···
};
+
meta.maintainers = with lib.maintainers; [ _0x4A6F ];
+
config = mkIf cfg.enable (mkMerge [
{
-
meta.maintainers = with lib.maintainers; [ _0x4A6F ];
systemd.services.xandikos = {
description = "A Simple Calendar and Contact Server";
+1 -2
nixos/modules/services/web-apps/immich-public-proxy.nix
···
};
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ];
-
-
meta.maintainers = with lib.maintainers; [ jaculabilis ];
};
+
meta.maintainers = with lib.maintainers; [ jaculabilis ];
}
+1 -2
nixos/modules/services/web-apps/immich.nix
···
};
};
users.groups = mkIf (cfg.group == "immich") { immich = { }; };
-
-
meta.maintainers = with lib.maintainers; [ jvanbruegge ];
};
+
meta.maintainers = with lib.maintainers; [ jvanbruegge ];
}
+2 -2
nixos/modules/services/web-apps/trilium.nix
···
};
};
+
meta.maintainers = with lib.maintainers; [ fliegendewurst ];
+
config = lib.mkIf cfg.enable (
lib.mkMerge [
{
-
meta.maintainers = with lib.maintainers; [ fliegendewurst ];
-
users.groups.trilium = { };
users.users.trilium = {
description = "Trilium User";
+2 -3
nixos/modules/system/boot/uki.nix
···
--config=${cfg.configFile} \
--output="$out/${config.system.boot.loader.ukiFile}"
'';
+
};
-
meta.maintainers = with lib.maintainers; [ nikstur ];
-
-
};
+
meta.maintainers = with lib.maintainers; [ nikstur ];
}