[bot] nixos/*: remove unused arguments in lambdas

wip/yesman
volth 6 years ago
parent 1a6af9f88e
commit 2e979e8ceb
  1. 2
      nixos/lib/build-vms.nix
  2. 3
      nixos/lib/make-disk-image.nix
  3. 2
      nixos/lib/make-iso9660-image.nix
  4. 2
      nixos/lib/testing.nix
  5. 4
      nixos/maintainers/option-usages.nix
  6. 2
      nixos/modules/config/no-x-libs.nix
  7. 2
      nixos/modules/config/nsswitch.nix
  8. 2
      nixos/modules/config/power-management.nix
  9. 2
      nixos/modules/config/sysctl.nix
  10. 2
      nixos/modules/config/unix-odbc-drivers.nix
  11. 2
      nixos/modules/config/users-groups.nix
  12. 2
      nixos/modules/config/vpnc.nix
  13. 2
      nixos/modules/hardware/network/smc-2632w/default.nix
  14. 2
      nixos/modules/hardware/network/zydas-zd1211.nix
  15. 2
      nixos/modules/hardware/video/ati.nix
  16. 2
      nixos/modules/hardware/video/capture/mwprocapture.nix
  17. 4
      nixos/modules/hardware/video/uvcvideo/uvcdynctrl-udev-rules.nix
  18. 2
      nixos/modules/installer/cd-dvd/installation-cd-graphical-kde-new-kernel.nix
  19. 2
      nixos/modules/installer/cd-dvd/installation-cd-minimal-new-kernel.nix
  20. 2
      nixos/modules/installer/cd-dvd/installation-cd-minimal.nix
  21. 2
      nixos/modules/installer/netboot/netboot-base.nix
  22. 2
      nixos/modules/installer/netboot/netboot-minimal.nix
  23. 2
      nixos/modules/installer/scan/detected.nix
  24. 2
      nixos/modules/installer/tools/tools.nix
  25. 2
      nixos/modules/installer/virtualbox-demo.nix
  26. 2
      nixos/modules/misc/assertions.nix
  27. 2
      nixos/modules/misc/extra-arguments.nix
  28. 2
      nixos/modules/misc/ids.nix
  29. 2
      nixos/modules/misc/label.nix
  30. 2
      nixos/modules/misc/lib.nix
  31. 2
      nixos/modules/misc/locate.nix
  32. 2
      nixos/modules/misc/meta.nix
  33. 2
      nixos/modules/misc/passthru.nix
  34. 2
      nixos/modules/profiles/all-hardware.nix
  35. 2
      nixos/modules/profiles/base.nix
  36. 2
      nixos/modules/profiles/demo.nix
  37. 2
      nixos/modules/profiles/graphical.nix
  38. 2
      nixos/modules/profiles/hardened.nix
  39. 2
      nixos/modules/profiles/headless.nix
  40. 2
      nixos/modules/profiles/minimal.nix
  41. 2
      nixos/modules/profiles/qemu-guest.nix
  42. 2
      nixos/modules/programs/atop.nix
  43. 2
      nixos/modules/programs/bcc.nix
  44. 2
      nixos/modules/programs/environment.nix
  45. 2
      nixos/modules/programs/shell.nix
  46. 2
      nixos/modules/programs/systemtap.nix
  47. 2
      nixos/modules/security/hidepid.nix
  48. 2
      nixos/modules/security/oath.nix
  49. 4
      nixos/modules/services/backup/bacula.nix
  50. 2
      nixos/modules/services/backup/borgbackup.nix
  51. 2
      nixos/modules/services/backup/restic.nix
  52. 2
      nixos/modules/services/continuous-integration/jenkins/slave.nix
  53. 2
      nixos/modules/services/hardware/actkbd.nix
  54. 2
      nixos/modules/services/hardware/nvidia-optimus.nix
  55. 2
      nixos/modules/services/hardware/sane_extra_backends/brscan4.nix
  56. 2
      nixos/modules/services/logging/journalwatch.nix
  57. 2
      nixos/modules/services/mail/dovecot.nix
  58. 2
      nixos/modules/services/mail/mail.nix
  59. 2
      nixos/modules/services/misc/emby.nix
  60. 2
      nixos/modules/services/misc/jackett.nix
  61. 2
      nixos/modules/services/misc/nix-gc.nix
  62. 2
      nixos/modules/services/misc/nix-optimise.nix
  63. 2
      nixos/modules/services/misc/nix-ssh-serve.nix
  64. 2
      nixos/modules/services/misc/radarr.nix
  65. 2
      nixos/modules/services/misc/sonarr.nix
  66. 2
      nixos/modules/services/misc/taskserver/default.nix
  67. 2
      nixos/modules/services/monitoring/prometheus/exporters.nix
  68. 2
      nixos/modules/services/monitoring/smartd.nix
  69. 2
      nixos/modules/services/network-filesystems/beegfs.nix
  70. 2
      nixos/modules/services/network-filesystems/openafs/lib.nix
  71. 2
      nixos/modules/services/networking/avahi-daemon.nix
  72. 2
      nixos/modules/services/networking/cjdns.nix
  73. 4
      nixos/modules/services/networking/i2pd.nix
  74. 2
      nixos/modules/services/networking/nghttpx/nghttpx-options.nix
  75. 2
      nixos/modules/services/networking/nylon.nix
  76. 2
      nixos/modules/services/networking/pptpd.nix
  77. 2
      nixos/modules/services/networking/shout.nix
  78. 2
      nixos/modules/services/networking/ssh/sshd.nix
  79. 2
      nixos/modules/services/networking/toxvpn.nix
  80. 2
      nixos/modules/services/networking/tvheadend.nix
  81. 2
      nixos/modules/services/networking/wireguard.nix
  82. 2
      nixos/modules/services/networking/xl2tpd.nix
  83. 2
      nixos/modules/services/networking/zerobin.nix
  84. 2
      nixos/modules/services/security/oauth2_proxy_nginx.nix
  85. 4
      nixos/modules/services/security/tor.nix
  86. 2
      nixos/modules/services/torrent/flexget.nix
  87. 2
      nixos/modules/services/web-apps/matomo.nix
  88. 2
      nixos/modules/services/web-apps/youtrack.nix
  89. 2
      nixos/modules/services/web-servers/apache-httpd/limesurvey.nix
  90. 2
      nixos/modules/services/web-servers/apache-httpd/mercurial.nix
  91. 2
      nixos/modules/services/web-servers/apache-httpd/wordpress.nix
  92. 2
      nixos/modules/services/web-servers/nginx/vhost-options.nix
  93. 2
      nixos/modules/services/web-servers/zope2.nix
  94. 2
      nixos/modules/services/x11/display-managers/auto.nix
  95. 2
      nixos/modules/services/x11/terminal-server.nix
  96. 2
      nixos/modules/services/x11/window-managers/default.nix
  97. 2
      nixos/modules/services/x11/window-managers/wmii.nix
  98. 2
      nixos/modules/services/x11/xserver.nix
  99. 2
      nixos/modules/system/activation/top-level.nix
  100. 2
      nixos/modules/system/boot/kexec.nix
  101. Some files were not shown because too many files have changed in this diff Show More

@ -47,7 +47,7 @@ rec {
machinesNumbered = zipLists machines (range 1 254);
nodes_ = flip map machinesNumbered (m: nameValuePair m.fst
[ ( { config, pkgs, nodes, ... }:
[ ( { config, nodes, ... }:
let
interfacesNumbered = zipLists config.virtualisation.vlans (range 1 255);
interfaces = flip map interfacesNumbered ({ fst, snd }:

@ -24,9 +24,6 @@
# most likely fails as GRUB will probably refuse to install.
partitionTableType ? "legacy"
# Whether to invoke switch-to-configuration boot during image creation
, installBootLoader ? true
, # The root file system type.
fsType ? "ext4"

@ -1,4 +1,4 @@
{ stdenv, perl, closureInfo, xorriso, syslinux
{ stdenv, closureInfo, xorriso, syslinux
, # The file name of the resulting ISO image.
isoName ? "cd.iso"

@ -222,7 +222,7 @@ in rec {
runInMachineWithX = { require ? [], ... } @ args:
let
client =
{ config, pkgs, ... }:
{ ... }:
{
inherit require;
virtualisation.memorySize = 1024;

@ -149,7 +149,7 @@ let
else testOptions;
checkAll = checkList == [];
in
flip filter graph ({option, usedBy}:
flip filter graph ({option, ...}:
(checkAll || elem option checkList)
&& !(elem option excludedTestOptions)
);
@ -165,7 +165,7 @@ let
'';
graphToText = graph:
concatMapStrings ({option, usedBy}:
concatMapStrings ({usedBy, ...}:
concatMapStrings (user: ''
${user}
'') usedBy

@ -1,7 +1,7 @@
# This module gets rid of all dependencies on X11 client libraries
# (including fontconfig).
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,6 +1,6 @@
# Configuration for the Name Service Switch (/etc/nsswitch.conf).
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -282,7 +282,7 @@ let
};
groupOpts = { name, config, ... }: {
groupOpts = { name, ... }: {
options = {

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{lib, config, ...}:
{lib, ...}:
{
hardware = {

@ -1,4 +1,4 @@
{pkgs, config, ...}:
{pkgs, ...}:
{
hardware.firmware = [ pkgs.zd1211fw ];

@ -1,6 +1,6 @@
# This module provides the proprietary ATI X11 / OpenGL drivers.
{ config, lib, pkgs, pkgs_i686, ... }:
{ config, lib, pkgs_i686, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,6 +1,4 @@
{ lib
, stdenv
, buildEnv
{ buildEnv
, libwebcam
, makeWrapper
, runCommand

@ -1,4 +1,4 @@
{ config, pkgs, ... }:
{ pkgs, ... }:
{
imports = [ ./installation-cd-graphical-kde.nix ];

@ -1,4 +1,4 @@
{ config, pkgs, ... }:
{ pkgs, ... }:
{
imports = [ ./installation-cd-minimal.nix ];

@ -1,7 +1,7 @@
# This module defines a small NixOS installation CD. It does not
# contain any graphical stuff.
{ config, lib, pkgs, ... }:
{ ... }:
{
imports =

@ -1,7 +1,7 @@
# This module contains the basic configuration for building netboot
# images
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -1,6 +1,6 @@
# This module defines a small netboot environment.
{ config, lib, ... }:
{ ... }:
{
imports =

@ -1,6 +1,6 @@
# List all devices which are detected by nixos-generate-config.
# Common devices are enabled by default.
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -1,7 +1,7 @@
# This module generates nixos-install, nixos-rebuild,
# nixos-generate-config, etc.
{ config, lib, pkgs, modulesPath, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ lib, pkgs, config, ... }:
{ pkgs, ... }:
{
_module.args = {

@ -9,7 +9,7 @@
# Systemd can also change ownership of service directories using the
# RuntimeDirectory/StateDirectory options.
{ config, pkgs, lib, ... }:
{ lib, ... }:
{
options = {

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, ... }:
{ lib, ... }:
{
options = {

@ -1,4 +1,4 @@
{ config, options, lib, pkgs, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, ... }:
{ lib, ... }:
with lib;

@ -1,7 +1,7 @@
# This module allows you to export something from configuration
# Use case: export kernel source expression for ease of configuring
{ config, lib, ... }:
{ lib, ... }:
{
options = {

@ -3,7 +3,7 @@
# enabled in the initrd. Its primary use is in the NixOS installation
# CDs.
{ config, pkgs, ... }:
{ ... }:
{

@ -1,7 +1,7 @@
# This module defines the software packages included in the "minimal"
# installation CD. It might be useful elsewhere.
{ config, lib, pkgs, ... }:
{ lib, pkgs, ... }:
{
# Include some utilities that are useful for installing or repairing

@ -1,4 +1,4 @@
{ config, pkgs, ... }:
{ ... }:
{
imports = [ ./graphical.nix ];

@ -1,7 +1,7 @@
# This module defines a NixOS configuration with the Plasma 5 desktop.
# It's used by the graphical installation CD.
{ config, pkgs, ... }:
{ pkgs, ... }:
{
services.xserver = {

@ -1,7 +1,7 @@
# A profile with most (vanilla) hardening options enabled by default,
# potentially at the cost of features and performance.
{ config, lib, pkgs, ... }:
{ lib, pkgs, ... }:
with lib;

@ -1,7 +1,7 @@
# Common configuration for headless machines (e.g., Amazon EC2
# instances).
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -1,7 +1,7 @@
# This module defines a small NixOS configuration. It does not
# contain any graphical stuff.
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,7 +1,7 @@
# Common configuration for virtual machines running under QEMU (using
# virtio).
{ config, pkgs, ... }:
{ ... }:
{
boot.initrd.availableKernelModules = [ "virtio_net" "virtio_pci" "virtio_mmio" "virtio_blk" "virtio_scsi" "9p" "9pnet_virtio" ];

@ -1,6 +1,6 @@
# Global configuration for atop.
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
{
options.programs.bcc.enable = lib.mkEnableOption "bcc";

@ -2,7 +2,7 @@
# Most of the stuff here should probably be moved elsewhere sometime.
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,6 +1,6 @@
# This module defines a standard configuration for NixOS shells.
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, lib, ... }:
{ config, lib, ... }:
with lib;
{

@ -1,6 +1,6 @@
# This module provides configuration for the OATH PAM modules.
{ config, lib, pkgs, ... }:
{ lib, ... }:
with lib;

@ -97,7 +97,7 @@ let
${dir_cfg.extraConfig}
'';
directorOptions = {name, config, ...}:
directorOptions = {...}:
{
options = {
password = mkOption {
@ -117,7 +117,7 @@ let
};
};
deviceOptions = {name, config, ...}:
deviceOptions = {...}:
{
options = {
archiveDevice = mkOption {

@ -510,7 +510,7 @@ in {
'';
default = { };
type = types.attrsOf (types.submodule (
{ name, config, ... }: {
{ ... }: {
options = {
path = mkOption {

@ -6,7 +6,7 @@ with lib;
description = ''
Periodic backups to create with Restic.
'';
type = types.attrsOf (types.submodule ({ name, config, ... }: {
type = types.attrsOf (types.submodule ({ name, ... }: {
options = {
passwordFile = mkOption {
type = types.str;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;
let
cfg = config.services.jenkinsSlave;

@ -15,7 +15,7 @@ let
${cfg.extraConfig}
'';
bindingCfg = { config, ... }: {
bindingCfg = { ... }: {
options = {
keys = mkOption {

@ -1,4 +1,4 @@
{ config, pkgs, lib, ... }:
{ config, lib, ... }:
let kernel = config.boot.kernelPackages; in

@ -9,7 +9,7 @@ let
etcFiles = pkgs.callPackage ./brscan4_etc_files.nix { netDevices = netDeviceList; };
netDeviceOpts = { name, config, ... }: {
netDeviceOpts = { name, ... }: {
options = {

@ -1,4 +1,4 @@
{ config, lib, pkgs, services, ... }:
{ config, lib, pkgs, ... }:
with lib;
let

@ -110,7 +110,7 @@ let
special_use = \${toString mailbox.specialUse}
'' + "}";
mailboxes = { lib, pkgs, ... }: {
mailboxes = { ... }: {
options = {
name = mkOption {
type = types.strMatching ''[^"]+'';

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, lib, mono, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, lib, mono, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;
let cfg = config.nix.sshServe;

@ -1,4 +1,4 @@
{ config, pkgs, lib, mono, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, lib, mono, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -84,7 +84,7 @@ let
in flatten (mapAttrsToList mkSublist attrs);
in all isNull (findPkiDefinitions [] manualPkiOptions);
orgOptions = { name, ... }: {
orgOptions = { ... }: {
options.users = mkOption {
type = types.uniq (types.listOf types.str);
default = [];

@ -94,7 +94,7 @@ let
};
});
mkSubModule = { name, port, extraOpts, serviceOpts }: {
mkSubModule = { name, port, extraOpts, ... }: {
${name} = mkOption {
type = types.submodule {
options = (mkExporterOpts {

@ -64,7 +64,7 @@ let
"DEVICESCAN ${notifyOpts}${cfg.defaults.autodetected}"}
'';
smartdDeviceOpts = { name, ... }: {
smartdDeviceOpts = { ... }: {
options = {

@ -139,7 +139,7 @@ in
description = ''
BeeGFS configurations. Every mount point requires a separate configuration.
'';
type = with types; attrsOf (submodule ({ config, ... } : {
type = with types; attrsOf (submodule ({ ... } : {
options = {
mgmtdHost = mkOption {
type = types.str;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ...}:
{ config, lib, ...}:
let
inherit (lib) concatStringsSep getBin mkOption types;

@ -1,5 +1,5 @@
# Avahi daemon.
{ config, lib, utils, pkgs, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -9,7 +9,7 @@ let
cfg = config.services.cjdns;
connectToSubmodule =
{ options, ... }:
{ ... }:
{ options =
{ password = mkOption {
type = types.str;

@ -405,7 +405,7 @@ in
outTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
{ name, config, ... }: {
{ name, ... }: {
options = {
destinationPort = mkOption {
type = types.int;
@ -426,7 +426,7 @@ in
inTunnels = mkOption {
default = {};
type = with types; loaOf (submodule (
{ name, config, ... }: {
{ name, ... }: {
options = {
inPort = mkOption {
type = types.int;

@ -1,4 +1,4 @@
{ config, lib, ... }:
{ lib, ... }:
{ options.services.nghttpx = {
enable = lib.mkEnableOption "nghttpx";

@ -22,7 +22,7 @@ let
Deny-IP=${concatStringsSep " " cfg.deniedIPRanges}
'';
nylonOpts = { name, config, ... }: {
nylonOpts = { name, ... }: {
options = {

@ -1,4 +1,4 @@
{ config, stdenv, pkgs, lib, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ pkgs, lib, config, options, ... }:
{ pkgs, lib, config, ... }:
with lib;

@ -479,7 +479,7 @@ in
assertions = [{ assertion = if cfg.forwardX11 then cfgc.setXAuthLocation else true;
message = "cannot enable X11 forwarding without setting xauth location";}]
++ flip map cfg.listenAddresses ({ addr, port, ... }: {
++ flip map cfg.listenAddresses ({ addr, ... }: {
assertion = addr != null;
message = "addr must be specified in each listenAddresses entry";
});

@ -1,4 +1,4 @@
{ config, stdenv, pkgs, lib, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, coreutils, lib, pkgs, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -10,7 +10,7 @@ let
# interface options
interfaceOpts = { name, ... }: {
interfaceOpts = { ... }: {
options = {

@ -1,4 +1,4 @@
{ config, stdenv, pkgs, lib, ... }:
{ config, pkgs, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, lib, nodes, ... }:
{ config, pkgs, lib, ... }:
with lib;
let
cfg = config.services.zerobin;

@ -1,4 +1,4 @@
{ pkgs, config, lib, ... }:
{ config, lib, ... }:
with lib;
let
cfg = config.services.oauth2_proxy.nginx;

@ -578,7 +578,7 @@ in
];
}
'';
type = types.loaOf (types.submodule ({name, config, ...}: {
type = types.loaOf (types.submodule ({name, ...}: {
options = {
name = mkOption {
@ -638,7 +638,7 @@ in
authorizeClient = mkOption {
default = null;
description = "If configured, the hidden service is accessible for authorized clients only.";
type = types.nullOr (types.submodule ({config, ...}: {
type = types.nullOr (types.submodule ({...}: {
options = {

@ -1,4 +1,4 @@
{ config, lib, pkgs, timezone, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, services, ... }:
{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.matomo;

@ -1,4 +1,4 @@
{ config, lib, pkgs, options, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, serverInfo, php, ... }:
{ config, lib, pkgs, serverInfo, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, pkgs, serverInfo, lib, ... }:
{ config, pkgs, lib, ... }:
let
inherit (pkgs) mercurial;

@ -1,4 +1,4 @@
{ config, lib, pkgs, serverInfo, php, ... }:
{ config, lib, pkgs, serverInfo, ... }:
# http://codex.wordpress.org/Hardening_WordPress
with lib;

@ -3,7 +3,7 @@
# has additional options that affect the web server as a whole, like
# the user/group to run under.)
{ config, lib }:
{ lib, ... }:
with lib;
{

@ -6,7 +6,7 @@ let
cfg = config.services.zope2;
zope2Opts = { name, config, ... }: {
zope2Opts = { name, ... }: {
options = {
name = mkOption {

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -5,7 +5,7 @@
# not, a X server (Xvfb) is started for that user. The Xvfb instances
# persist across VNC sessions.
{ config, lib, pkgs, ... }:
{ lib, pkgs, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, ... }:
{ config, lib, ... }:
with lib;

@ -1,4 +1,4 @@
{ config, lib, pkgs, options, modulesPath, ... }:
{ config, lib, pkgs, ... }:
with lib;
let

@ -1,4 +1,4 @@
{ config, lib, pkgs, pkgs_i686, ... }:
{ config, lib, pkgs, ... }:
with lib;

@ -226,7 +226,7 @@ in
default = [];
example = lib.literalExample "[ ({ original = pkgs.openssl; replacement = pkgs.callPackage /path/to/openssl { }; }) ]";
type = types.listOf (types.submodule (
{ options, ... }: {
{ ... }: {
options.original = mkOption {
type = types.package;
description = "The original package to override.";

@ -1,4 +1,4 @@
{ config, pkgs, lib, ... }:
{ pkgs, lib, ... }:
{
config = lib.mkIf (pkgs.kexectools.meta.available) {

Some files were not shown because too many files have changed in this diff Show More

Loading…
Cancel
Save