diff options
author | volth <volth@volth.com> | 2019-08-13 21:52:01 +0000 |
---|---|---|
committer | volth <volth@volth.com> | 2019-08-28 11:07:32 +0000 |
commit | 08f68313a47a2093dc0f408a706b2c125bc59c95 (patch) | |
tree | bb48188c0bf9fac152c038426146df518ef8c562 /nixos | |
parent | 5061fe0c2c7743370e1d379d6fa60eed26ff1470 (diff) | |
download | nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar.gz nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar.bz2 nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar.lz nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar.xz nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.tar.zst nixpkgs-08f68313a47a2093dc0f408a706b2c125bc59c95.zip |
treewide: remove redundant rec
Diffstat (limited to 'nixos')
31 files changed, 32 insertions, 33 deletions
diff --git a/nixos/lib/make-options-doc/default.nix b/nixos/lib/make-options-doc/default.nix index 88e052106a2..35c8b543dec 100644 --- a/nixos/lib/make-options-doc/default.nix +++ b/nixos/lib/make-options-doc/default.nix @@ -126,7 +126,7 @@ let } ''; -in rec { +in { inherit optionsNix; optionsAsciiDoc = lib.concatStringsSep "\n" (lib.mapAttrsToList singleAsciiDoc optionsNix); diff --git a/nixos/lib/utils.nix b/nixos/lib/utils.nix index b68e55a40b9..3297cf06108 100644 --- a/nixos/lib/utils.nix +++ b/nixos/lib/utils.nix @@ -1,6 +1,6 @@ pkgs: with pkgs.lib; -rec { +{ # Check whenever fileSystem is needed for boot fsNeededForBoot = fs: fs.neededForBoot diff --git a/nixos/modules/config/malloc.nix b/nixos/modules/config/malloc.nix index a528de40649..31a659ee83f 100644 --- a/nixos/modules/config/malloc.nix +++ b/nixos/modules/config/malloc.nix @@ -6,7 +6,7 @@ let # The set of alternative malloc(3) providers. providers = { - graphene-hardened = rec { + graphene-hardened = { libPath = "${pkgs.graphene-hardened-malloc}/lib/libhardened_malloc.so"; description = '' An allocator designed to mitigate memory corruption attacks, such as diff --git a/nixos/modules/installer/cd-dvd/system-tarball-pc.nix b/nixos/modules/installer/cd-dvd/system-tarball-pc.nix index 5da5df81ede..bf8b7deb59e 100644 --- a/nixos/modules/installer/cd-dvd/system-tarball-pc.nix +++ b/nixos/modules/installer/cd-dvd/system-tarball-pc.nix @@ -129,7 +129,7 @@ in ]; nixpkgs.config = { - packageOverrides = p: rec { + packageOverrides = p: { linux_3_4 = p.linux_3_4.override { extraConfig = '' # Enable drivers in kernel for most NICs. diff --git a/nixos/modules/installer/netboot/netboot.nix b/nixos/modules/installer/netboot/netboot.nix index f9b8d95c684..5146858cccf 100644 --- a/nixos/modules/installer/netboot/netboot.nix +++ b/nixos/modules/installer/netboot/netboot.nix @@ -18,7 +18,7 @@ with lib; }; - config = rec { + config = { # Don't build the GRUB menu builder script, since we don't need it # here and it causes a cyclic dependency. boot.loader.grub.enable = false; diff --git a/nixos/modules/programs/firejail.nix b/nixos/modules/programs/firejail.nix index 46ee4bc0f7a..74c3e4425a7 100644 --- a/nixos/modules/programs/firejail.nix +++ b/nixos/modules/programs/firejail.nix @@ -5,7 +5,7 @@ with lib; let cfg = config.programs.firejail; - wrappedBins = pkgs.stdenv.mkDerivation rec { + wrappedBins = pkgs.stdenv.mkDerivation { name = "firejail-wrapped-binaries"; nativeBuildInputs = with pkgs; [ makeWrapper ]; buildCommand = '' diff --git a/nixos/modules/services/cluster/kubernetes/default.nix b/nixos/modules/services/cluster/kubernetes/default.nix index 143b41f57f6..823cc1c35f4 100644 --- a/nixos/modules/services/cluster/kubernetes/default.nix +++ b/nixos/modules/services/cluster/kubernetes/default.nix @@ -261,7 +261,7 @@ in { before = [ "kubernetes.target" ]; }; - systemd.services.kube-control-plane-online = rec { + systemd.services.kube-control-plane-online = { description = "Kubernetes control plane is online"; wantedBy = [ "kube-control-plane-online.target" ]; after = [ "kube-scheduler.service" "kube-controller-manager.service" ]; diff --git a/nixos/modules/services/continuous-integration/hydra/default.nix b/nixos/modules/services/continuous-integration/hydra/default.nix index c7fe4eeeab9..500acb48562 100644 --- a/nixos/modules/services/continuous-integration/hydra/default.nix +++ b/nixos/modules/services/continuous-integration/hydra/default.nix @@ -43,7 +43,7 @@ in ###### interface options = { - services.hydra = rec { + services.hydra = { enable = mkOption { type = types.bool; diff --git a/nixos/modules/services/hardware/sane_extra_backends/brscan4_etc_files.nix b/nixos/modules/services/hardware/sane_extra_backends/brscan4_etc_files.nix index fd19d8020fb..6bf31982b71 100644 --- a/nixos/modules/services/hardware/sane_extra_backends/brscan4_etc_files.nix +++ b/nixos/modules/services/hardware/sane_extra_backends/brscan4_etc_files.nix @@ -33,7 +33,7 @@ let addAllNetDev = xs: concatStringsSep "\n" (map addNetDev xs); in -stdenv.mkDerivation rec { +stdenv.mkDerivation { name = "brscan4-etc-files-0.4.3-3"; src = "${brscan4}/opt/brother/scanner/brscan4"; diff --git a/nixos/modules/services/misc/gitlab.nix b/nixos/modules/services/misc/gitlab.nix index 09c3a89d6a6..3b39dde341b 100644 --- a/nixos/modules/services/misc/gitlab.nix +++ b/nixos/modules/services/misc/gitlab.nix @@ -140,7 +140,7 @@ let RAILS_ENV = "production"; }; - gitlab-rake = pkgs.stdenv.mkDerivation rec { + gitlab-rake = pkgs.stdenv.mkDerivation { name = "gitlab-rake"; buildInputs = [ pkgs.makeWrapper ]; dontBuild = true; @@ -155,7 +155,7 @@ let ''; }; - gitlab-rails = pkgs.stdenv.mkDerivation rec { + gitlab-rails = pkgs.stdenv.mkDerivation { name = "gitlab-rails"; buildInputs = [ pkgs.makeWrapper ]; dontBuild = true; diff --git a/nixos/modules/services/misc/pykms.nix b/nixos/modules/services/misc/pykms.nix index ef90d124a28..ab00086e591 100644 --- a/nixos/modules/services/misc/pykms.nix +++ b/nixos/modules/services/misc/pykms.nix @@ -9,7 +9,7 @@ in { meta.maintainers = with lib.maintainers; [ peterhoeg ]; options = { - services.pykms = rec { + services.pykms = { enable = mkOption { type = types.bool; default = false; diff --git a/nixos/modules/services/misc/zoneminder.nix b/nixos/modules/services/misc/zoneminder.nix index 6c45179a6d4..3bff04e7127 100644 --- a/nixos/modules/services/misc/zoneminder.nix +++ b/nixos/modules/services/misc/zoneminder.nix @@ -312,7 +312,7 @@ in { }; systemd.services = { - zoneminder = with pkgs; rec { + zoneminder = with pkgs; { inherit (zoneminder.meta) description; documentation = [ "https://zoneminder.readthedocs.org/en/latest/" ]; path = [ diff --git a/nixos/modules/services/network-filesystems/openafs/lib.nix b/nixos/modules/services/network-filesystems/openafs/lib.nix index 1cc9bed847a..e068ee761c2 100644 --- a/nixos/modules/services/network-filesystems/openafs/lib.nix +++ b/nixos/modules/services/network-filesystems/openafs/lib.nix @@ -3,7 +3,7 @@ let inherit (lib) concatStringsSep mkOption types; -in rec { +in { mkCellServDB = cellName: db: '' >${cellName} diff --git a/nixos/modules/services/networking/kippo.nix b/nixos/modules/services/networking/kippo.nix index 40c38254a57..a04f77c9a52 100644 --- a/nixos/modules/services/networking/kippo.nix +++ b/nixos/modules/services/networking/kippo.nix @@ -11,7 +11,7 @@ with lib; let cfg = config.services.kippo; in -rec { +{ options = { services.kippo = { enable = mkOption { diff --git a/nixos/modules/services/web-apps/frab.nix b/nixos/modules/services/web-apps/frab.nix index e885dc69b3c..7914e5cc0ee 100644 --- a/nixos/modules/services/web-apps/frab.nix +++ b/nixos/modules/services/web-apps/frab.nix @@ -19,7 +19,7 @@ let RAILS_SERVE_STATIC_FILES = "1"; } // cfg.extraEnvironment; - frab-rake = pkgs.stdenv.mkDerivation rec { + frab-rake = pkgs.stdenv.mkDerivation { name = "frab-rake"; buildInputs = [ package.env pkgs.makeWrapper ]; phases = "installPhase fixupPhase"; diff --git a/nixos/modules/services/web-apps/wordpress.nix b/nixos/modules/services/web-apps/wordpress.nix index 98dc8458818..88475437058 100644 --- a/nixos/modules/services/web-apps/wordpress.nix +++ b/nixos/modules/services/web-apps/wordpress.nix @@ -133,7 +133,7 @@ let ''; }; - database = rec { + database = { host = mkOption { type = types.str; default = "localhost"; diff --git a/nixos/tests/borgbackup.nix b/nixos/tests/borgbackup.nix index fdb87dbea43..165f64b0d6d 100644 --- a/nixos/tests/borgbackup.nix +++ b/nixos/tests/borgbackup.nix @@ -44,7 +44,7 @@ in { client = { ... }: { services.borgbackup.jobs = { - local = rec { + local = { paths = dataDir; repo = localRepo; preHook = '' diff --git a/nixos/tests/ceph.nix b/nixos/tests/ceph.nix index 7408029c460..8722ea33ec5 100644 --- a/nixos/tests/ceph.nix +++ b/nixos/tests/ceph.nix @@ -1,4 +1,4 @@ -import ./make-test.nix ({pkgs, ...}: rec { +import ./make-test.nix ({pkgs, ...}: { name = "All-in-one-basic-ceph-cluster"; meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ lejonet ]; diff --git a/nixos/tests/cjdns.nix b/nixos/tests/cjdns.nix index e03bb988254..6660eecf05b 100644 --- a/nixos/tests/cjdns.nix +++ b/nixos/tests/cjdns.nix @@ -23,8 +23,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ ehmry ]; }; - nodes = rec - { # Alice finds peers over over ETHInterface. + nodes = { # Alice finds peers over over ETHInterface. alice = { ... }: { imports = [ basicConfig ]; diff --git a/nixos/tests/cockroachdb.nix b/nixos/tests/cockroachdb.nix index 56c624d8cf2..496283fddc7 100644 --- a/nixos/tests/cockroachdb.nix +++ b/nixos/tests/cockroachdb.nix @@ -100,7 +100,7 @@ in import ./make-test.nix ({ pkgs, ...} : { meta.maintainers = with pkgs.stdenv.lib.maintainers; [ thoughtpolice ]; - nodes = rec { + nodes = { node1 = makeNode "country=us,region=east,dc=1" "192.168.1.1" null; node2 = makeNode "country=us,region=west,dc=2b" "192.168.1.2" "192.168.1.1"; node3 = makeNode "country=eu,region=west,dc=2" "192.168.1.3" "192.168.1.1"; diff --git a/nixos/tests/containers-reloadable.nix b/nixos/tests/containers-reloadable.nix index 55af3d7388e..f41dea91b1e 100644 --- a/nixos/tests/containers-reloadable.nix +++ b/nixos/tests/containers-reloadable.nix @@ -1,6 +1,6 @@ import ./make-test.nix ({ pkgs, lib, ...} : let - client_base = rec { + client_base = { containers.test1 = { autoStart = true; diff --git a/nixos/tests/containers-restart_networking.nix b/nixos/tests/containers-restart_networking.nix index 0fb3b591e9f..df15f5b2f45 100644 --- a/nixos/tests/containers-restart_networking.nix +++ b/nixos/tests/containers-restart_networking.nix @@ -1,7 +1,7 @@ # Test for NixOS' container support. let - client_base = rec { + client_base = { networking.firewall.enable = false; containers.webserver = { diff --git a/nixos/tests/flannel.nix b/nixos/tests/flannel.nix index 0b261a68477..9991c5eaa32 100644 --- a/nixos/tests/flannel.nix +++ b/nixos/tests/flannel.nix @@ -1,4 +1,4 @@ -import ./make-test.nix ({ pkgs, ...} : rec { +import ./make-test.nix ({ pkgs, ...} : { name = "flannel"; meta = with pkgs.stdenv.lib.maintainers; { diff --git a/nixos/tests/hardened.nix b/nixos/tests/hardened.nix index 1ff329bd98d..90f9793b370 100644 --- a/nixos/tests/hardened.nix +++ b/nixos/tests/hardened.nix @@ -28,7 +28,7 @@ import ./make-test.nix ({ pkgs, ...} : { testScript = let - hardened-malloc-tests = pkgs.stdenv.mkDerivation rec { + hardened-malloc-tests = pkgs.stdenv.mkDerivation { name = "hardened-malloc-tests-${pkgs.graphene-hardened-malloc.version}"; src = pkgs.graphene-hardened-malloc.src; buildPhase = '' diff --git a/nixos/tests/initrd-network-ssh/default.nix b/nixos/tests/initrd-network-ssh/default.nix index b2209f297a4..796c50c610e 100644 --- a/nixos/tests/initrd-network-ssh/default.nix +++ b/nixos/tests/initrd-network-ssh/default.nix @@ -6,7 +6,7 @@ import ../make-test.nix ({ lib, ... }: maintainers = [ willibutz ]; }; - nodes = with lib; rec { + nodes = with lib; { server = { config, ... }: { diff --git a/nixos/tests/jackett.nix b/nixos/tests/jackett.nix index 399a0c27232..c749c32ad04 100644 --- a/nixos/tests/jackett.nix +++ b/nixos/tests/jackett.nix @@ -2,7 +2,7 @@ import ./make-test.nix ({ lib, ... }: with lib; -rec { +{ name = "jackett"; meta.maintainers = with maintainers; [ etu ]; diff --git a/nixos/tests/lidarr.nix b/nixos/tests/lidarr.nix index 58bf82503f8..85fcbd21d8c 100644 --- a/nixos/tests/lidarr.nix +++ b/nixos/tests/lidarr.nix @@ -2,7 +2,7 @@ import ./make-test.nix ({ lib, ... }: with lib; -rec { +{ name = "lidarr"; meta.maintainers = with maintainers; [ etu ]; diff --git a/nixos/tests/mosquitto.nix b/nixos/tests/mosquitto.nix index 86813cc8756..b4c897c3ab5 100644 --- a/nixos/tests/mosquitto.nix +++ b/nixos/tests/mosquitto.nix @@ -16,7 +16,7 @@ let "-t ${topic}" ]; -in rec { +in { name = "mosquitto"; meta = with pkgs.stdenv.lib; { maintainers = with maintainers; [ peterhoeg ]; diff --git a/nixos/tests/quake3.nix b/nixos/tests/quake3.nix index a8c5b060633..d3e59a32373 100644 --- a/nixos/tests/quake3.nix +++ b/nixos/tests/quake3.nix @@ -4,7 +4,7 @@ let # Build Quake with coverage instrumentation. overrides = pkgs: - rec { + { quake3game = pkgs.quake3game.override (args: { stdenv = pkgs.stdenvAdapters.addCoverageInstrumentation args.stdenv; }); diff --git a/nixos/tests/radarr.nix b/nixos/tests/radarr.nix index 6b9a909e44b..9bc5607ccd5 100644 --- a/nixos/tests/radarr.nix +++ b/nixos/tests/radarr.nix @@ -2,7 +2,7 @@ import ./make-test.nix ({ lib, ... }: with lib; -rec { +{ name = "radarr"; meta.maintainers = with maintainers; [ etu ]; diff --git a/nixos/tests/sonarr.nix b/nixos/tests/sonarr.nix index 3d5c3b19b6e..3e84445099a 100644 --- a/nixos/tests/sonarr.nix +++ b/nixos/tests/sonarr.nix @@ -2,7 +2,7 @@ import ./make-test.nix ({ lib, ... }: with lib; -rec { +{ name = "sonarr"; meta.maintainers = with maintainers; [ etu ]; |