diff --git a/bordervm-configuration.nix b/bordervm-configuration.nix index 10022c4..911b4fa 100644 --- a/bordervm-configuration.nix +++ b/bordervm-configuration.nix @@ -6,7 +6,7 @@ in { options.bordervm = { keys = mkOption { type = types.listOf types.str; - default = []; + default = [ ]; }; l2tp = { host = mkOption { @@ -55,18 +55,17 @@ in { ]; config = { - boot.kernelParams = [ - "loglevel=9" - ]; + boot.kernelParams = [ "loglevel=9" ]; systemd.services.pppoe = - let conf = pkgs.writeText "kpppoed.toml" - '' - interface_name = "eth1" - services = [ "myservice" ] - lns_ipaddr = "${cfg.l2tp.host}:${builtins.toString cfg.l2tp.port}" - ac_name = "kpppoed-1.0" - ''; - in { + let + conf = pkgs.writeText "kpppoed.toml" '' + interface_name = "eth1" + services = [ "myservice" ] + lns_ipaddr = "${cfg.l2tp.host}:${builtins.toString cfg.l2tp.port}" + ac_name = "kpppoed-1.0" + ''; + in + { wantedBy = [ "multi-user.target" ]; after = [ "network-online.target" ]; serviceConfig = { @@ -83,7 +82,7 @@ in { services.dnsmasq = { enable = true; resolveLocalQueries = false; - settings = { + settings = { # domain-needed = true; dhcp-range = [ "10.0.0.10,10.0.0.240" ]; interface = "eth1"; @@ -92,17 +91,17 @@ in { systemd.services.sshd.wantedBy = pkgs.lib.mkForce [ "multi-user.target" ]; - virtualisation = { qemu = { - networkingOptions = []; - options = [] ++ - optional cfg.ethernet.pci.enable - "-device vfio-pci,host=${cfg.ethernet.pci.id}" ++ - optionals cfg.ethernet.usb.enable [ + networkingOptions = [ ]; + options = + [ ] + ++ optional cfg.ethernet.pci.enable "-device vfio-pci,host=${cfg.ethernet.pci.id}" + ++ optionals cfg.ethernet.usb.enable [ "-device usb-ehci,id=ehci" "-device usb-host,bus=ehci.0,vendorid=${cfg.ethernet.usb.vendor},productid=${cfg.ethernet.usb.product}" - ] ++ [ + ] + ++ [ "-nographic" "-serial mon:stdio" ]; @@ -136,13 +135,13 @@ in { nat = { enable = true; internalInterfaces = [ "eth1" ]; - externalInterface ="eth0"; + externalInterface = "eth0"; }; }; users.users.liminix = { isNormalUser = true; uid = 1000; - extraGroups = [ "wheel"]; + extraGroups = [ "wheel" ]; openssh.authorizedKeys.keys = cfg.keys; }; services.getty.autologinUser = "liminix"; diff --git a/bordervm.conf-example.nix b/bordervm.conf-example.nix index a27b045..93c3065 100644 --- a/bordervm.conf-example.nix +++ b/bordervm.conf-example.nix @@ -1,8 +1,12 @@ -{...}: +{ ... }: { bordervm = { # ethernet.pci = { id = "01:00.0"; enable = true; }; - ethernet.usb = { vendor = "0x0bda"; product = "0x8153"; enable = true; }; + ethernet.usb = { + vendor = "0x0bda"; + product = "0x8153"; + enable = true; + }; l2tp = { host = "l2tp.aa.net.uk"; }; diff --git a/ci.nix b/ci.nix index 1167dbd..147962c 100644 --- a/ci.nix +++ b/ci.nix @@ -1,11 +1,12 @@ { - nixpkgs -, unstable -, liminix -, ... }: + nixpkgs, + unstable, + liminix, + ... +}: let - pkgs = (import nixpkgs {}); - borderVmConf = ./bordervm.conf-example.nix; + pkgs = (import nixpkgs { }); + borderVmConf = ./bordervm.conf-example.nix; inherit (pkgs.lib.attrsets) genAttrs; devices = [ "gl-ar750" @@ -26,27 +27,35 @@ let }).outputs.default; tests = import ./tests/ci.nix; jobs = - (genAttrs devices for-device) // - tests // - { - buildEnv = (import liminix { - inherit nixpkgs borderVmConf; - device = import (liminix + "/devices/qemu"); - liminix-config = vanilla; - }).buildEnv; + (genAttrs devices for-device) + // tests + // { + buildEnv = + (import liminix { + inherit nixpkgs borderVmConf; + device = import (liminix + "/devices/qemu"); + liminix-config = vanilla; + }).buildEnv; doc = - let json = - (import liminix { - inherit nixpkgs borderVmConf; - device = import (liminix + "/devices/qemu"); - liminix-config = {...} : { + let + json = + (import liminix { + inherit nixpkgs borderVmConf; + device = import (liminix + "/devices/qemu"); + liminix-config = + { ... }: + { imports = [ ./modules/all-modules.nix ]; }; - }).outputs.optionsJson; - in pkgs.stdenv.mkDerivation { + }).outputs.optionsJson; + in + pkgs.stdenv.mkDerivation { name = "liminix-doc"; nativeBuildInputs = with pkgs; [ - gnumake sphinx fennel luaPackages.lyaml + gnumake + sphinx + fennel + luaPackages.lyaml ]; src = ./.; buildPhase = '' diff --git a/default.nix b/default.nix index 0ce516e..c61404b 100644 --- a/default.nix +++ b/default.nix @@ -1,24 +1,27 @@ { - deviceName ? null -, device ? (import ./devices/${deviceName} ) -, liminix-config ? -, nixpkgs ? -, borderVmConf ? ./bordervm.conf.nix -, imageType ? "primary" + deviceName ? null, + device ? (import ./devices/${deviceName}), + liminix-config ? , + nixpkgs ? , + borderVmConf ? ./bordervm.conf.nix, + imageType ? "primary", }: let overlay = import ./overlay.nix; - pkgs = import nixpkgs (device.system // { - overlays = [overlay]; - config = { - allowUnsupportedSystem = true; # mipsel - permittedInsecurePackages = [ - "python-2.7.18.6" # kernel backports needs python <3 - "python-2.7.18.7" - ]; - }; - }); + pkgs = import nixpkgs ( + device.system + // { + overlays = [ overlay ]; + config = { + allowUnsupportedSystem = true; # mipsel + permittedInsecurePackages = [ + "python-2.7.18.6" # kernel backports needs python <3 + "python-2.7.18.7" + ]; + }; + } + ); eval = pkgs.lib.evalModules { specialArgs = { diff --git a/doc/extract-options.nix b/doc/extract-options.nix index 90fdf2f..8f6e2c5 100644 --- a/doc/extract-options.nix +++ b/doc/extract-options.nix @@ -2,9 +2,8 @@ let conf = eval.config; rootDir = builtins.toPath ./..; - stripAnyPrefixes = lib.flip (lib.fold lib.removePrefix) - ["${rootDir}/"]; - optToDoc = name: opt : { + stripAnyPrefixes = lib.flip (lib.fold lib.removePrefix) [ "${rootDir}/" ]; + optToDoc = name: opt: { inherit name; description = opt.description or null; default = opt.default or null; @@ -25,7 +24,6 @@ let let x = lib.mapAttrsToList optToDoc sd.parameters; in x; } else - item // { declarations = map stripAnyPrefixes item.declarations; }; + item // { declarations = map stripAnyPrefixes item.declarations; }; in -builtins.map spliceServiceDefn - (pkgs.lib.optionAttrSetToDocList eval.options) +builtins.map spliceServiceDefn (pkgs.lib.optionAttrSetToDocList eval.options) diff --git a/doc/hardware.nix b/doc/hardware.nix index f06dfc5..5e7f569 100644 --- a/doc/hardware.nix +++ b/doc/hardware.nix @@ -1,16 +1,18 @@ -with import {} ; +with import { }; let inherit (builtins) stringLength readDir filter; - devices = filter (n: n != "families") - (lib.mapAttrsToList (n: t: n) (readDir ../devices)); - texts = map (n: - let d = import ../devices/${n}/default.nix; - d' = { - description = "${n}\n${substring 0 (stringLength n) "********************************"}\n"; - } // d; - in d'.description) - devices; + devices = filter (n: n != "families") (lib.mapAttrsToList (n: t: n) (readDir ../devices)); + texts = map ( + n: + let + d = import ../devices/${n}/default.nix; + d' = { + description = "${n}\n${substring 0 (stringLength n) "********************************"}\n"; + } // d; + in + d'.description + ) devices; in writeText "hwdoc" '' Supported hardware diff --git a/examples/arhcive.nix b/examples/arhcive.nix index db0c1b6..d678ac9 100644 --- a/examples/arhcive.nix +++ b/examples/arhcive.nix @@ -119,7 +119,7 @@ in rec { secrets_file services.mount_external_disk config.hardware.networkInterfaces.lan - ] ; + ]; }; users.root = { @@ -128,18 +128,22 @@ in rec { }; users.backup = { - uid=500; gid=500; gecos="Storage owner"; dir="/srv"; - shell="/dev/null"; + uid = 500; + gid = 500; + gecos = "Storage owner"; + dir = "/srv"; + shell = "/dev/null"; }; groups.backup = { - gid=500; usernames = ["backup"]; + gid = 500; + usernames = [ "backup" ]; }; defaultProfile.packages = with pkgs; [ e2fsprogs mtdutils (levitate.override { - config = { + config = { services = { inherit (config.services) dhcpc sshd watchdog; }; diff --git a/examples/demo.nix b/examples/demo.nix index f5060a9..5bf2cf4 100644 --- a/examples/demo.nix +++ b/examples/demo.nix @@ -5,7 +5,7 @@ # wherever the text "EDIT" appears - please consult the tutorial # documentation for details. -{ config, pkgs, ... } : +{ config, pkgs, ... }: let inherit (pkgs.liminix.services) bundle oneshot; inherit (pkgs) serviceFns; @@ -49,31 +49,40 @@ in rec { country_code = "GB"; wpa_passphrase = "not a real wifi password"; - hw_mode="g"; + hw_mode = "g"; ieee80211n = 1; auth_algs = 1; # 1=wpa2, 2=wep, 3=both - wpa = 2; # 1=wpa, 2=wpa2, 3=both + wpa = 2; # 1=wpa, 2=wpa2, 3=both wpa_key_mgmt = "WPA-PSK"; - wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?) - rsn_pairwise = "CCMP"; # auth for wpa2 + wpa_pairwise = "TKIP CCMP"; # auth for wpa (may not need this?) + rsn_pairwise = "CCMP"; # auth for wpa2 wmm_enabled = 1; }; }; services.int = svc.network.address.build { interface = svc.bridge.primary.build { ifname = "int"; }; - family = "inet"; address = "${ipv4LocalNet}.1"; prefixLength = 16; + family = "inet"; + address = "${ipv4LocalNet}.1"; + prefixLength = 16; }; - services.bridge = svc.bridge.members.build { + services.bridge = svc.bridge.members.build { primary = services.int; - members = with config.hardware.networkInterfaces; - [ wlan lan ]; + members = with config.hardware.networkInterfaces; [ + wlan + lan + ]; }; services.ntp = svc.ntp.build { - pools = { "pool.ntp.org" = ["iburst"]; }; - makestep = { threshold = 1.0; limit = 3; }; + pools = { + "pool.ntp.org" = [ "iburst" ]; + }; + makestep = { + threshold = 1.0; + limit = 3; + }; }; services.sshd = svc.ssh.build { }; @@ -157,8 +166,7 @@ in rec { interface = services.wan; }; - services.firewall = svc.firewall.build { - }; + services.firewall = svc.firewall.build { }; services.packet_forwarding = svc.network.forward.build { }; @@ -195,7 +203,5 @@ in rec { ]; }; - defaultProfile.packages = with pkgs; [ - min-collect-garbage - ]; + defaultProfile.packages = with pkgs; [ min-collect-garbage ]; } diff --git a/examples/recovery.nix b/examples/recovery.nix index fcd3d07..a2243b1 100644 --- a/examples/recovery.nix +++ b/examples/recovery.nix @@ -4,7 +4,7 @@ let svc = config.system.service; inherit (pkgs.pseudofile) dir symlink; inherit (pkgs.liminix.services) oneshot target; - some-util-linux = pkgs.runCommand "some-util-linux" {} '' + some-util-linux = pkgs.runCommand "some-util-linux" { } '' mkdir -p $out/bin cd ${pkgs.util-linux-small}/bin cp fdisk sfdisk mkswap $out/bin @@ -53,7 +53,7 @@ in rec { services.defaultroute4 = svc.network.route.build { via = "$(output ${services.dhcpc} router)"; target = "default"; - dependencies = [services.dhcpc]; + dependencies = [ services.dhcpc ]; }; services.resolvconf = oneshot rec { diff --git a/examples/rotuer-secrets.example.nix b/examples/rotuer-secrets.example.nix index acae8ca..58e7d29 100644 --- a/examples/rotuer-secrets.example.nix +++ b/examples/rotuer-secrets.example.nix @@ -8,12 +8,10 @@ root = { # mkpasswd -m sha512crypt passwd = "$6$6pt0mpbgcB7kC2RJ$kSBoCYGyi1.qxt7dqmexLj1l8E6oTZJZmfGyJSsMYMW.jlsETxdgQSdv6ptOYDM7DHAwf6vLG0pz3UD31XBfC1"; - openssh.authorizedKeys.keys = [ - ]; + openssh.authorizedKeys.keys = [ ]; }; lan = { prefix = "10.8.0"; }; - } diff --git a/examples/rotuer.nix b/examples/rotuer.nix index 94ca896..102ae6a 100644 --- a/examples/rotuer.nix +++ b/examples/rotuer.nix @@ -10,10 +10,10 @@ let secrets = { domainName = "fake.liminix.org"; - firewallRules = {}; + firewallRules = { }; } // (import ./rotuer-secrets.nix); svc = config.system.service; - wirelessConfig = { + wirelessConfig = { country_code = "GB"; inherit (secrets) wpa_passphrase; wmm_enabled = 1; @@ -70,13 +70,13 @@ in rec { wireless.networks = { "${secrets.ssid}" = { interface = config.hardware.networkInterfaces.wlan; - hw_mode="g"; + hw_mode = "g"; channel = "2"; ieee80211n = 1; } // wirelessConfig; "${secrets.ssid}5" = rec { interface = config.hardware.networkInterfaces.wlan5; - hw_mode="a"; + hw_mode = "a"; channel = 36; ht_capab = "[HT40+]"; vht_oper_chwidth = 1; diff --git a/modules/base.nix b/modules/base.nix index d9d4514..1284271 100644 --- a/modules/base.nix +++ b/modules/base.nix @@ -4,7 +4,7 @@ { lib, pkgs, config, ...}: let - inherit (lib) mkOption types ; + inherit (lib) mkOption types; inherit (pkgs.pseudofile) dir symlink; type_service = pkgs.liminix.lib.types.service; @@ -36,7 +36,7 @@ in { ''; # internal = true; # probably a good case to make this internal }; - rootfsType = mkOption { + rootfsType = mkOption { default = "squashfs"; type = types.enum [ "btrfs" @@ -46,7 +46,7 @@ in { "ubifs" ]; }; - rootOptions = mkOption { + rootOptions = mkOption { type = types.nullOr types.str; default = null; }; @@ -54,20 +54,29 @@ in { boot = { commandLine = mkOption { type = types.listOf types.nonEmptyStr; - default = []; + default = [ ]; description = "Kernel command line"; }; commandLineDtbNode = mkOption { - type = types.enum [ "bootargs" "bootargs-override" ]; + type = types.enum [ + "bootargs" + "bootargs-override" + ]; default = "bootargs"; description = "Kernel command line's devicetree node"; }; imageType = mkOption { - type = types.enum [ "primary" "secondary" ]; + type = types.enum [ + "primary" + "secondary" + ]; default = "primary"; }; imageFormat = mkOption { - type = types.enum ["fit" "uimage"]; + type = types.enum [ + "fit" + "uimage" + ]; default = "uimage"; }; tftp = { @@ -83,7 +92,7 @@ in { }; # These names match the uboot environment variables. I reserve # the right to change them if I think of better ones. - ipaddr = mkOption { + ipaddr = mkOption { type = types.str; description = '' Our IP address to use when creating scripts to diff --git a/modules/busybox.nix b/modules/busybox.nix index ea30b25..fe4042d 100644 --- a/modules/busybox.nix +++ b/modules/busybox.nix @@ -85,10 +85,13 @@ in { }; }; filesystem = dir { - bin = dir ({ - busybox = symlink "${busybox}/bin/busybox"; - sh = symlink "${busybox}/bin/busybox"; - } // makeLinks); + bin = dir ( + { + busybox = symlink "${busybox}/bin/busybox"; + sh = symlink "${busybox}/bin/busybox"; + } + // makeLinks + ); }; }; } diff --git a/modules/hardware.nix b/modules/hardware.nix index 006a6e2..48bdf40 100644 --- a/modules/hardware.nix +++ b/modules/hardware.nix @@ -5,14 +5,13 @@ ## you want to run on it, and would usually be set in the "device" file: ## :file:`devices/manuf-model/default.nix` - -{ lib, ...}: +{ lib, ... }: let - inherit (lib) mkOption types ; -in { + inherit (lib) mkOption types; +in +{ options = { - boot = { - }; + boot = { }; hardware = { dts = { src = mkOption { @@ -26,7 +25,7 @@ in { ''; }; includes = mkOption { - default = []; + default = [ ]; description = "List of directories to search for DTS includes (.dtsi files)"; type = types.listOf types.path; }; diff --git a/modules/mdevd.nix b/modules/mdevd.nix index 9c546f7..ddde432 100644 --- a/modules/mdevd.nix +++ b/modules/mdevd.nix @@ -14,13 +14,16 @@ in { run = "exec ${pkgs.devout}/bin/devout /run/devout.sock 4"; }; coldplug = oneshot { - name ="coldplug"; + name = "coldplug"; # would love to know what mdevd-coldplug/udevadm trigger does # that this doesn't up = '' for i in $(find /sys -name uevent); do ( echo change > $i ) ; done ''; - dependencies = [devout mdevd]; + dependencies = [ + devout + mdevd + ]; }; }; }; diff --git a/modules/outputs.nix b/modules/outputs.nix index dcad384..16742a5 100644 --- a/modules/outputs.nix +++ b/modules/outputs.nix @@ -1,8 +1,8 @@ { - config -, pkgs -, lib -, ... + config, + pkgs, + lib, + ... }: let inherit (lib) mkOption types concatStringsSep; @@ -22,7 +22,7 @@ in # but only part of one. kernel = mkOption { type = types.package; - internal = true; + internal = true; description = '' kernel ****** @@ -42,7 +42,7 @@ in }; dtb = mkOption { type = types.package; - internal = true; + internal = true; description = '' dtb *** @@ -52,7 +52,7 @@ in }; uimage = mkOption { type = types.package; - internal = true; + internal = true; description = '' uimage ****** @@ -68,7 +68,7 @@ in }; manifest = mkOption { type = types.package; - internal = true; + internal = true; description = '' Debugging aid. JSON rendition of config.filesystem, on which can run "nix-store -q --tree" on it and find diff --git a/modules/ramdisk.nix b/modules/ramdisk.nix index 0863651..fa8d84a 100644 --- a/modules/ramdisk.nix +++ b/modules/ramdisk.nix @@ -1,8 +1,4 @@ -{ - config -, lib -, ... -}: +{ config, lib, ... }: let inherit (lib) mkIf mkEnableOption; # types concatStringsSep; in { diff --git a/modules/squashfs.nix b/modules/squashfs.nix index 6137024..7e10738 100644 --- a/modules/squashfs.nix +++ b/modules/squashfs.nix @@ -1,8 +1,8 @@ { - config -, pkgs -, lib -, ... + config, + pkgs, + lib, + ... }: let inherit (pkgs) liminix; diff --git a/modules/usb.nix b/modules/usb.nix index 2ff6e6d..da3d1f7 100644 --- a/modules/usb.nix +++ b/modules/usb.nix @@ -24,8 +24,6 @@ EXT4_FS = "y"; EXT4_USE_FOR_EXT2 = "y"; FS_ENCRYPTION = "y"; - - }; }; } diff --git a/modules/users.nix b/modules/users.nix index 4ccda9f..89774f2 100644 --- a/modules/users.nix +++ b/modules/users.nix @@ -17,10 +17,16 @@ let concatStrings concatStringsSep mapAttrsToList mkOption types; inherit (builtins) toString; inherit (pkgs.pseudofile) dir; - passwd-file = - let lines = mapAttrsToList (name: u: "${name}:${if u ? passwd then u.passwd else "!!"}:${toString u.uid}:${toString u.gid}:${u.gecos}:${u.dir}:${u.shell}\n" ) - config.users; - in concatStrings lines; + passwd-file = + let + lines = mapAttrsToList ( + name: u: + "${name}:${ + if u ? passwd then u.passwd else "!!" + }:${toString u.uid}:${toString u.gid}:${u.gecos}:${u.dir}:${u.shell}\n" + ) config.users; + in + concatStrings lines; group-file = let lines = mapAttrsToList (name: {gid, usernames ? []}: diff --git a/modules/wlan.nix b/modules/wlan.nix index f992cb5..8a63406 100644 --- a/modules/wlan.nix +++ b/modules/wlan.nix @@ -4,7 +4,7 @@ let inherit (pkgs) stdenv wireless-regdb; regulatory = stdenv.mkDerivation { name = "regulatory.db"; - phases = ["installPhase"]; + phases = [ "installPhase" ]; installPhase = '' mkdir -p $out cp ${wireless-regdb}/lib/firmware/regulatory.db $out/ diff --git a/overlay.nix b/overlay.nix index 7ab36f7..de77733 100644 --- a/overlay.nix +++ b/overlay.nix @@ -46,7 +46,7 @@ in extraPkgs // { # liminix library functions lim = { - parseInt = s : (builtins.fromTOML "r=${s}").r; + parseInt = s: (builtins.fromTOML "r=${s}").r; }; # keep these alphabetical @@ -74,7 +74,6 @@ extraPkgs // { # should texinfo be in nativeBuildInputs instead of # buildInputs? texinfo = null; - }; # luarocks wants a cross-compiled cmake (which seems like a bug, @@ -186,9 +185,12 @@ extraPkgs // { # done. Do it the ugly way.. postPatch = o.postPatch - + (with final; - lib.optionalString (stdenv.buildPlatform != stdenv.hostPlatform) - "\nsed -i.bak 's/linux.*-mips/linux-mops/' Configure\n"); + + ( + with final; + lib.optionalString ( + stdenv.buildPlatform != stdenv.hostPlatform + ) "\nsed -i.bak 's/linux.*-mips/linux-mops/' Configure\n" + ); }); pppBuild = prev.ppp; @@ -200,13 +202,12 @@ extraPkgs // { }); in q.override { nixosTestRunner = true; sdlSupport = false; }; rsyncSmall = - let r = prev.rsync.overrideAttrs(o: { - configureFlags = o.configureFlags ++ [ - "--disable-openssl" - ]; - }); - in r.override { openssl = null; }; - + let + r = prev.rsync.overrideAttrs (o: { + configureFlags = o.configureFlags ++ [ "--disable-openssl" ]; + }); + in + r.override { openssl = null; }; inherit s6; s6-linux-init = prev.s6-linux-init.override { @@ -224,14 +225,14 @@ extraPkgs // { ubootQemuAarch64 = final.buildUBoot { defconfig = "qemu_arm64_defconfig"; - extraMeta.platforms = ["aarch64-linux"]; - filesToInstall = ["u-boot.bin"]; + extraMeta.platforms = [ "aarch64-linux" ]; + filesToInstall = [ "u-boot.bin" ]; }; ubootQemuArm = final.buildUBoot { defconfig = "qemu_arm_defconfig"; - extraMeta.platforms = ["armv7l-linux"]; - filesToInstall = ["u-boot.bin"]; + extraMeta.platforms = [ "armv7l-linux" ]; + filesToInstall = [ "u-boot.bin" ]; extraConfig = '' CONFIG_CMD_UBI=y CONFIG_CMD_UBIFS=y @@ -245,8 +246,8 @@ extraPkgs // { ubootQemuMips = final.buildUBoot { defconfig = "malta_defconfig"; - extraMeta.platforms = ["mips-linux"]; - filesToInstall = ["u-boot.bin"]; + extraMeta.platforms = [ "mips-linux" ]; + filesToInstall = [ "u-boot.bin" ]; # define the prompt to be the same as arm{32,64} so # we can use the same expect script for both extraPatches = [ ./pkgs/u-boot/0002-virtio-init-for-malta.patch ]; @@ -268,7 +269,7 @@ extraPkgs // { CONFIG_MIPS_BOOT_FDT=y CONFIG_OF_LIBFDT=y CONFIG_OF_STDOUT_VIA_ALIAS=y - ''; + ''; }; libusb1 = prev.libusb1.override { @@ -283,5 +284,4 @@ extraPkgs // { translateManpages = false; capabilitiesSupport = false; }; - } diff --git a/pkgs/anoia/default.nix b/pkgs/anoia/default.nix index b981f48..a91f86b 100644 --- a/pkgs/anoia/default.nix +++ b/pkgs/anoia/default.nix @@ -1,10 +1,10 @@ { - fennel -, stdenv -, linotify -, lua -, lualinux -, cpio + fennel, + stdenv, + linotify, + lua, + lualinux, + cpio, }: let pname = "anoia"; in stdenv.mkDerivation { diff --git a/pkgs/default.nix b/pkgs/default.nix index a25a122..cbbc211 100644 --- a/pkgs/default.nix +++ b/pkgs/default.nix @@ -1,7 +1,4 @@ -{ - callPackage -, lib -}: +{ callPackage, lib }: let typeChecked = caller: type: value: let @@ -11,11 +8,11 @@ let in (mergeDefinitions [] type' defs).mergedValue; in { liminix = { - builders = { - squashfs = callPackage ./liminix-tools/builders/squashfs.nix {}; - dtb = callPackage ./kernel/dtb.nix {}; - uimage = callPackage ./kernel/uimage.nix {}; - kernel = callPackage ./kernel {}; + builders = { + squashfs = callPackage ./liminix-tools/builders/squashfs.nix { }; + dtb = callPackage ./kernel/dtb.nix { }; + uimage = callPackage ./kernel/uimage.nix { }; + kernel = callPackage ./kernel { }; }; callService = path : parameters : let pkg = callPackage path {}; @@ -49,71 +46,71 @@ in { }; inherit typeChecked; }; - networking = callPackage ./liminix-tools/networking {}; - services = callPackage ./liminix-tools/services {}; + networking = callPackage ./liminix-tools/networking { }; + services = callPackage ./liminix-tools/services { }; }; # please keep the rest of this list alphabetised :-) - anoia = callPackage ./anoia {}; - devout = callPackage ./devout {}; - fennel = callPackage ./fennel {}; - fennelrepl = callPackage ./fennelrepl {}; - firewallgen = callPackage ./firewallgen {}; - firmware-utils = callPackage ./firmware-utils {}; - gen_init_cpio = callPackage ./gen_init_cpio {}; - go-l2tp = callPackage ./go-l2tp {}; - hi = callPackage ./hi {}; - ifwait = callPackage ./ifwait {}; - initramfs-peek = callPackage ./initramfs-peek {}; - kernel-backport = callPackage ./kernel-backport {}; - kmodloader = callPackage ./kmodloader {}; - levitate = callPackage ./levitate {}; - libubootenv = callPackage ./libubootenv {}; - linotify = callPackage ./linotify {}; - lualinux = callPackage ./lualinux {}; + anoia = callPackage ./anoia { }; + devout = callPackage ./devout { }; + fennel = callPackage ./fennel { }; + fennelrepl = callPackage ./fennelrepl { }; + firewallgen = callPackage ./firewallgen { }; + firmware-utils = callPackage ./firmware-utils { }; + gen_init_cpio = callPackage ./gen_init_cpio { }; + go-l2tp = callPackage ./go-l2tp { }; + hi = callPackage ./hi { }; + ifwait = callPackage ./ifwait { }; + initramfs-peek = callPackage ./initramfs-peek { }; + kernel-backport = callPackage ./kernel-backport { }; + kmodloader = callPackage ./kmodloader { }; + levitate = callPackage ./levitate { }; + libubootenv = callPackage ./libubootenv { }; + linotify = callPackage ./linotify { }; + lualinux = callPackage ./lualinux { }; # we need to build real lzma instead of using xz, because the lzma # decoder in u-boot doesn't understand streaming lzma archives # ("Stream with EOS marker is not supported") and xz can't create # non-streaming ones. See # https://sourceforge.net/p/squashfs/mailman/message/26599379/ - lzma = callPackage ./lzma {}; + lzma = callPackage ./lzma { }; - mac80211 = callPackage ./mac80211 {}; - zyxel-bootconfig = callPackage ./zyxel-bootconfig {}; - min-collect-garbage = callPackage ./min-collect-garbage {}; - min-copy-closure = callPackage ./min-copy-closure {}; - minisock = callPackage ./minisock {}; - nellie = callPackage ./nellie {}; - netlink-lua = callPackage ./netlink-lua {}; - odhcp-script = callPackage ./odhcp-script {}; - odhcp6c = callPackage ./odhcp6c {}; - openwrt = callPackage ./openwrt {}; - ppp = callPackage ./ppp {}; - pppoe = callPackage ./pppoe {}; - preinit = callPackage ./preinit {}; - pseudofile = callPackage ./pseudofile {}; - routeros = callPackage ./routeros {}; - run-liminix-vm = callPackage ./run-liminix-vm {}; - s6-init-bin = callPackage ./s6-init-bin {}; - s6-rc-database = callPackage ./s6-rc-database {}; - s6-rc-up-tree = callPackage ./s6-rc-up-tree {}; + mac80211 = callPackage ./mac80211 { }; + zyxel-bootconfig = callPackage ./zyxel-bootconfig { }; + min-collect-garbage = callPackage ./min-collect-garbage { }; + min-copy-closure = callPackage ./min-copy-closure { }; + minisock = callPackage ./minisock { }; + nellie = callPackage ./nellie { }; + netlink-lua = callPackage ./netlink-lua { }; + odhcp-script = callPackage ./odhcp-script { }; + odhcp6c = callPackage ./odhcp6c { }; + openwrt = callPackage ./openwrt { }; + ppp = callPackage ./ppp { }; + pppoe = callPackage ./pppoe { }; + preinit = callPackage ./preinit { }; + pseudofile = callPackage ./pseudofile { }; + routeros = callPackage ./routeros { }; + run-liminix-vm = callPackage ./run-liminix-vm { }; + s6-init-bin = callPackage ./s6-init-bin { }; + s6-rc-database = callPackage ./s6-rc-database { }; + s6-rc-up-tree = callPackage ./s6-rc-up-tree { }; # schnapps is written by Turris and provides a high-level interface # to btrfs snapshots. It may be useful on the Turris Omnia to # install Liminix while retaining the ability to rollback to the # vendor OS, or even to derisk Liminix updates on that device - schnapps = callPackage ./schnapps {}; + schnapps = callPackage ./schnapps { }; - serviceFns = callPackage ./service-fns {}; - swconfig = callPackage ./swconfig {}; - systemconfig = callPackage ./systemconfig {}; - tufted = callPackage ./tufted {}; - uevent-watch = callPackage ./uevent-watch {}; - usb-modeswitch = callPackage ./usb-modeswitch {}; - writeAshScript = callPackage ./write-ash-script {}; - writeAshScriptBin = callPackage ./write-ash-script/bin.nix {}; - writeFennel = callPackage ./write-fennel {}; - writeFennelScript = callPackage ./write-fennel-script {}; + serviceFns = callPackage ./service-fns { }; + swconfig = callPackage ./swconfig { }; + systemconfig = callPackage ./systemconfig { }; + tufted = callPackage ./tufted { }; + uevent-watch = callPackage ./uevent-watch { }; + usb-modeswitch = callPackage ./usb-modeswitch { }; + writeAshScript = callPackage ./write-ash-script { }; + writeAshScriptBin = callPackage ./write-ash-script/bin.nix { }; + writeFennel = callPackage ./write-fennel { }; + writeFennelScript = callPackage ./write-fennel-script { }; } diff --git a/pkgs/devout/default.nix b/pkgs/devout/default.nix index 2144b63..c6a7185 100644 --- a/pkgs/devout/default.nix +++ b/pkgs/devout/default.nix @@ -1,10 +1,11 @@ -{ nellie -, writeFennel -, anoia -, fennel -, stdenv -, fennelrepl -, lualinux +{ + nellie, + writeFennel, + anoia, + fennel, + stdenv, + fennelrepl, + lualinux, }: stdenv.mkDerivation { name = "devout"; diff --git a/pkgs/fennel/default.nix b/pkgs/fennel/default.nix index 4e1424c..49da531 100644 --- a/pkgs/fennel/default.nix +++ b/pkgs/fennel/default.nix @@ -1,7 +1,7 @@ { - stdenv -, lua -, fetchFromSourcehut + stdenv, + lua, + fetchFromSourcehut, }: let pname = "fennel"; in stdenv.mkDerivation { diff --git a/pkgs/go-l2tp/default.nix b/pkgs/go-l2tp/default.nix index 636a611..1dc7c6e 100644 --- a/pkgs/go-l2tp/default.nix +++ b/pkgs/go-l2tp/default.nix @@ -1,7 +1,7 @@ { - buildGoModule -, fetchFromGitHub -, ppp + buildGoModule, + fetchFromGitHub, + ppp, }: buildGoModule rec { @@ -12,7 +12,7 @@ buildGoModule rec { repo = "go-l2tp"; owner = "katalix"; rev = "570d763"; - hash= "sha256-R8ImKPkPBC+FvzKOBEZ3VxQ12dEjtfRa7AH94xMsAGA="; + hash = "sha256-R8ImKPkPBC+FvzKOBEZ3VxQ12dEjtfRa7AH94xMsAGA="; }; patchPhase = '' @@ -23,5 +23,4 @@ buildGoModule rec { doCheck = false; vendorHash = "sha256-hOkhJhToN/VJwjQmnQJSPGz26/YDR2Ch+1yeW51OF+U="; - } diff --git a/pkgs/ifwait/default.nix b/pkgs/ifwait/default.nix index f8564f9..528adbf 100644 --- a/pkgs/ifwait/default.nix +++ b/pkgs/ifwait/default.nix @@ -1,9 +1,15 @@ -{ netlink-lua -, writeFennelScript -, runCommand -, anoia +{ + netlink-lua, + writeFennelScript, + runCommand, + anoia, }: -runCommand "ifwait" {} '' +runCommand "ifwait" { } '' mkdir -p $out/bin - cp -p ${writeFennelScript "ifwait" [anoia netlink-lua] ./ifwait.fnl} $out/bin/ifwait + cp -p ${ + writeFennelScript "ifwait" [ + anoia + netlink-lua + ] ./ifwait.fnl + } $out/bin/ifwait '' diff --git a/pkgs/initramfs-peek/default.nix b/pkgs/initramfs-peek/default.nix index 39067cb..a20aeba 100644 --- a/pkgs/initramfs-peek/default.nix +++ b/pkgs/initramfs-peek/default.nix @@ -1,14 +1,14 @@ { - busybox -, pkgsBuildBuild -, runCommand -, cpio -, writeReferencesToFile -, writeScript -} : + busybox, + pkgsBuildBuild, + runCommand, + cpio, + writeReferencesToFile, + writeScript, +}: let inherit (pkgsBuildBuild) gen_init_cpio; - script = writeScript "init" '' + script = writeScript "init" '' #!/bin/sh exec >/dev/console echo Running in initramfs diff --git a/pkgs/kernel-backport/default.nix b/pkgs/kernel-backport/default.nix index 3abfb58..a2e7990 100644 --- a/pkgs/kernel-backport/default.nix +++ b/pkgs/kernel-backport/default.nix @@ -1,17 +1,18 @@ -{ stdenv -, git -, python2 -, which -, fetchgit -, fetchFromGitHub -, coccinelle +{ + stdenv, + git, + python2, + which, + fetchgit, + fetchFromGitHub, + coccinelle, }: let donorTree = fetchFromGitHub { owner = "torvalds"; repo = "linux"; - rev = "e2c1a934fd8e4288e7a32f4088ceaccf469eb74c"; # 5.15.94 - hash= "sha256-Jg3EgL86CseuzYMAlUG3CDWPCo8glMSIZs10l7EuhWI="; + rev = "e2c1a934fd8e4288e7a32f4088ceaccf469eb74c"; # 5.15.94 + hash = "sha256-Jg3EgL86CseuzYMAlUG3CDWPCo8glMSIZs10l7EuhWI="; }; backports = stdenv.mkDerivation { name = "linux-backports"; diff --git a/pkgs/kernel/default.nix b/pkgs/kernel/default.nix index de636c3..9634127 100644 --- a/pkgs/kernel/default.nix +++ b/pkgs/kernel/default.nix @@ -1,29 +1,38 @@ -{ stdenv - , buildPackages - , writeText - , lib +{ + stdenv, + buildPackages, + writeText, + lib, - , config - , src - , version ? "0" - , extraPatchPhase ? "echo" - , targets ? ["vmlinux"] -} : + config, + src, + version ? "0", + extraPatchPhase ? "echo", + targets ? [ "vmlinux" ], +}: let writeConfig = import ./write-kconfig.nix { inherit lib writeText; }; kconfigFile = writeConfig "kconfig" config; arch = stdenv.hostPlatform.linuxArch; - targetNames = map baseNameOf targets; - inherit lib; in + targetNames = map baseNameOf targets; + inherit lib; +in stdenv.mkDerivation rec { name = "kernel"; inherit src extraPatchPhase; - hardeningDisable = ["all"]; - nativeBuildInputs = [buildPackages.stdenv.cc] ++ - (with buildPackages.pkgs; [ - rsync bc bison flex pkg-config - openssl ncurses.all perl - ]); + hardeningDisable = [ "all" ]; + nativeBuildInputs = + [ buildPackages.stdenv.cc ] + ++ (with buildPackages.pkgs; [ + rsync + bc + bison + flex + pkg-config + openssl + ncurses.all + perl + ]); CC = "${stdenv.cc.bintools.targetPrefix}gcc"; HOSTCC = with buildPackages.pkgs; "gcc -I${openssl}/include -I${ncurses}/include"; diff --git a/pkgs/kmodloader/default.nix b/pkgs/kmodloader/default.nix index a61ce9a..5011d28 100644 --- a/pkgs/kmodloader/default.nix +++ b/pkgs/kmodloader/default.nix @@ -1,12 +1,12 @@ { - liminix -, lib -, targets ? [] -, kernel ? null -, runCommand -, pkgsBuildBuild -, dependencies ? [] -} : + liminix, + lib, + targets ? [ ], + kernel ? null, + runCommand, + pkgsBuildBuild, + dependencies ? [ ], +}: let inherit (liminix.services) oneshot; inherit (lib) concatStringsSep; diff --git a/pkgs/levitate/default.nix b/pkgs/levitate/default.nix index 8bbbfb6..5d75872 100644 --- a/pkgs/levitate/default.nix +++ b/pkgs/levitate/default.nix @@ -1,14 +1,14 @@ { - writeScriptBin -, writeScript -, systemconfig -, execline -, lib -, config ? {} -, liminix -, pseudofile -, pkgs -} : + writeScriptBin, + writeScript, + systemconfig, + execline, + lib, + config ? { }, + liminix, + pseudofile, + pkgs, +}: let inherit (pseudofile) dir symlink; inherit (liminix.services) oneshot; @@ -16,7 +16,7 @@ let newRoot = "/run/maintenance"; sysconfig = let - doChroot = writeScript "exec" '' + doChroot = writeScript "exec" '' #!${execline}/bin/execlineb -P cd ${newRoot} foreground { mount --move ${newRoot} / } diff --git a/pkgs/libubootenv/default.nix b/pkgs/libubootenv/default.nix index d1bed0b..5389fcd 100644 --- a/pkgs/libubootenv/default.nix +++ b/pkgs/libubootenv/default.nix @@ -1,9 +1,10 @@ -{ stdenv -, cmake -, zlib -, libyaml -, fetchFromGitHub -} : +{ + stdenv, + cmake, + zlib, + libyaml, + fetchFromGitHub, +}: stdenv.mkDerivation { name = "libubootenv"; src = fetchFromGitHub { diff --git a/pkgs/linotify/default.nix b/pkgs/linotify/default.nix index b3e3bc2..f05a0e4 100644 --- a/pkgs/linotify/default.nix +++ b/pkgs/linotify/default.nix @@ -15,5 +15,4 @@ in lua.pkgs.buildLuaPackage { mkdir -p "$out/lib/lua/${lua.luaversion}" cp inotify.so "$out/lib/lua/${lua.luaversion}/" ''; - } diff --git a/pkgs/lualinux/default.nix b/pkgs/lualinux/default.nix index 39e186b..cb56146 100644 --- a/pkgs/lualinux/default.nix +++ b/pkgs/lualinux/default.nix @@ -21,5 +21,4 @@ in lua.pkgs.buildLuaPackage { mkdir -p "$out/lib/lua/${lua.luaversion}" cp ${pname}.so "$out/lib/lua/${lua.luaversion}/" ''; - } diff --git a/pkgs/lzma/default.nix b/pkgs/lzma/default.nix index 27210c9..3d611ce 100644 --- a/pkgs/lzma/default.nix +++ b/pkgs/lzma/default.nix @@ -1,7 +1,4 @@ -{ - stdenv -, fetchurl -}: +{ stdenv, fetchurl }: stdenv.mkDerivation { pname = "lzma"; version = "4.32.7"; diff --git a/pkgs/mac80211/default.nix b/pkgs/mac80211/default.nix index 315d4d1..13fbb74 100644 --- a/pkgs/mac80211/default.nix +++ b/pkgs/mac80211/default.nix @@ -1,17 +1,17 @@ # make out-of-tree modules given a backported kernel source tree { - extraConfig ? {} -, drivers ? [ ] -, kernel-backport -, stdenv -, writeText -, klibBuild ? null -, buildPackages -, fetchFromGitHub + extraConfig ? { }, + drivers ? [ ], + kernel-backport, + stdenv, + writeText, + klibBuild ? null, + buildPackages, + fetchFromGitHub, -, liminix -, lib + liminix, + lib, }: let arch = stdenv.hostPlatform.linuxArch; diff --git a/pkgs/min-copy-closure/default.nix b/pkgs/min-copy-closure/default.nix index ce06dba..450e2fd 100644 --- a/pkgs/min-copy-closure/default.nix +++ b/pkgs/min-copy-closure/default.nix @@ -1,9 +1,10 @@ { - stdenv -, nix -, cpio -, openssh -}: stdenv.mkDerivation { + stdenv, + nix, + cpio, + openssh, +}: +stdenv.mkDerivation { name = "min-copy-closure"; buildInputs = [ ]; propagatedBuildInputs = [ cpio openssh nix ]; diff --git a/pkgs/odhcp-script/default.nix b/pkgs/odhcp-script/default.nix index 9b2f1c1..c6a3e86 100644 --- a/pkgs/odhcp-script/default.nix +++ b/pkgs/odhcp-script/default.nix @@ -1,6 +1,6 @@ { - writeFennelScript -, anoia -, lualinux + writeFennelScript, + anoia, + lualinux, }: writeFennelScript "odhcpc-script" [anoia lualinux] ./odhcp6-script.fnl diff --git a/pkgs/odhcp6c/default.nix b/pkgs/odhcp6c/default.nix index 98da0ca..2e8186d 100644 --- a/pkgs/odhcp6c/default.nix +++ b/pkgs/odhcp6c/default.nix @@ -1,7 +1,9 @@ -{ stdenv -, cmake -, fetchFromGitHub -, ...} : +{ + stdenv, + cmake, + fetchFromGitHub, + ... +}: # let switchDotH = buildPackages.fetchurl { # url = "https://git.openwrt.org/?p=openwrt/openwrt.git;a=blob_plain;f=target/linux/generic/files/include/uapi/linux/switch.h;hb=99a188828713d6ff9c541590b08d4e63ef52f6d7"; # sha256 = "15kmhhcpd84y4f45rf8zai98c61jyvkc37p90pcxirna01x33wi8"; diff --git a/pkgs/openwrt/default.nix b/pkgs/openwrt/default.nix index 086cae4..2fb16ec 100644 --- a/pkgs/openwrt/default.nix +++ b/pkgs/openwrt/default.nix @@ -1,7 +1,4 @@ -{ - fetchFromGitHub -, pkgsBuildBuild -}: +{ fetchFromGitHub, pkgsBuildBuild }: let src = fetchFromGitHub { name = "openwrt-source"; @@ -10,7 +7,7 @@ let rev = "refs/tags/v23.05.2"; hash = "sha256-kP+cSOB6LiOMWs7g+ji7P7ehiDYDwRdmT4R5jSzw6K4="; }; - doPatch = family : '' + doPatch = family: '' cp -av ${src}/target/linux/generic/files/* . chmod -R u+w . cp -av ${src}/target/linux/${family}/files/* . diff --git a/pkgs/ppp/default.nix b/pkgs/ppp/default.nix index ca7b623..7a93dff 100644 --- a/pkgs/ppp/default.nix +++ b/pkgs/ppp/default.nix @@ -1,8 +1,8 @@ { - fetchFromGitHub -, stdenv -, autoreconfHook -, substituteAll + fetchFromGitHub, + stdenv, + autoreconfHook, + substituteAll, # , openssl }: stdenv.mkDerivation { pname = "ppp"; @@ -35,6 +35,4 @@ "man" "dev" ]; - - } diff --git a/pkgs/pppoe/default.nix b/pkgs/pppoe/default.nix index 39f862d..7e27c60 100644 --- a/pkgs/pppoe/default.nix +++ b/pkgs/pppoe/default.nix @@ -1,7 +1,9 @@ -{ lib -, stdenv -, fetchFromGitHub -, ppp } : +{ + lib, + stdenv, + fetchFromGitHub, + ppp, +}: stdenv.mkDerivation rec { pname = "rp-pppoe"; version = "3.15"; @@ -20,7 +22,9 @@ stdenv.mkDerivation rec { export PPPD=${ppp}/sbin/pppd ''; - configureFlags = lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ "rpppoe_cv_pack_bitfields=rev" ]; + configureFlags = lib.optionals (stdenv.buildPlatform != stdenv.hostPlatform) [ + "rpppoe_cv_pack_bitfields=rev" + ]; postConfigure = '' sed -i Makefile -e 's@DESTDIR)/etc/ppp@out)/etc/ppp@' diff --git a/pkgs/preinit/default.nix b/pkgs/preinit/default.nix index c373005..952461c 100644 --- a/pkgs/preinit/default.nix +++ b/pkgs/preinit/default.nix @@ -1,12 +1,9 @@ -{ - stdenv -, gdb - }: +{ stdenv, gdb }: stdenv.mkDerivation { name = "preinit"; src = ./.; -# NIX_DEBUG=2; + # NIX_DEBUG=2; hardeningDisable = [ "all" ]; postBuild = '' @@ -14,8 +11,8 @@ stdenv.mkDerivation { ls -l preinit ''; - makeFlags = ["preinit"]; - stripAllList = ["bin"]; + makeFlags = [ "preinit" ]; + stripAllList = [ "bin" ]; installPhase = '' mkdir -p $out/bin cp preinit $out/bin diff --git a/pkgs/pseudofile/default.nix b/pkgs/pseudofile/default.nix index 68a45fb..7bc2eb1 100644 --- a/pkgs/pseudofile/default.nix +++ b/pkgs/pseudofile/default.nix @@ -1,7 +1,4 @@ -{ - writeText -, lib -}: +{ writeText, lib }: let inherit (lib.attrsets) mapAttrsToList; visit = prefix: attrset: diff --git a/pkgs/routeros/default.nix b/pkgs/routeros/default.nix index 7a895c2..cff3079 100644 --- a/pkgs/routeros/default.nix +++ b/pkgs/routeros/default.nix @@ -1,9 +1,9 @@ { - stdenv -, python3 -, qemu -, fetchzip -, writeShellApplication + stdenv, + python3, + qemu, + fetchzip, + writeShellApplication, }: let chr-image = fetchzip { @@ -14,7 +14,7 @@ let ros-exec-script = stdenv.mkDerivation { name = "ros-exec-script"; src = ./.; - buildInputs = [python3]; + buildInputs = [ python3 ]; buildPhase = ":"; installPhase = '' mkdir -p $out/bin diff --git a/pkgs/run-liminix-vm/default.nix b/pkgs/run-liminix-vm/default.nix index d7c8cc5..78dc4e6 100644 --- a/pkgs/run-liminix-vm/default.nix +++ b/pkgs/run-liminix-vm/default.nix @@ -1,18 +1,19 @@ { - qemuLim -, socat -, writeShellScript -, writeFennel -, runCommand -, lib -, lua -, pkgsBuildBuild -}: let + qemuLim, + socat, + writeShellScript, + writeFennel, + runCommand, + lib, + lua, + pkgsBuildBuild, +}: +let run-liminix-vm = pkgsBuildBuild.writeFennel "run-liminix-vm" { packages = [ qemuLim lua.pkgs.luaposix lua.pkgs.fennel ]; } ./run-liminix-vm.fnl; connect = writeShellScript "connect-vm" '' - export PATH="${lib.makeBinPath [socat]}:$PATH" + export PATH="${lib.makeBinPath [ socat ]}:$PATH" socat -,raw,echo=0,icanon=0,isig=0,icrnl=0,escape=0x0f unix-connect:$1 ''; in runCommand "vm" {} '' diff --git a/pkgs/s6-init-bin/default.nix b/pkgs/s6-init-bin/default.nix index c43feaf..3f19e06 100644 --- a/pkgs/s6-init-bin/default.nix +++ b/pkgs/s6-init-bin/default.nix @@ -1,10 +1,10 @@ { - s6-linux-init -, execline -, writeScript -, stdenvNoCC -, lib -, s6-rc + s6-linux-init, + execline, + writeScript, + stdenvNoCC, + lib, + s6-rc, }: let hpr = name: arg: writeScript name '' diff --git a/pkgs/s6-rc-database/default.nix b/pkgs/s6-rc-database/default.nix index 49ef99c..8879a89 100644 --- a/pkgs/s6-rc-database/default.nix +++ b/pkgs/s6-rc-database/default.nix @@ -2,11 +2,11 @@ # config.services and calling s6-rc-compile on them { - stdenvNoCC -, buildPackages -, closureInfo -, writeText -, services ? [] + stdenvNoCC, + buildPackages, + closureInfo, + writeText, + services ? [ ], }: let closure-info = closureInfo { rootPaths = services; }; in stdenvNoCC.mkDerivation { diff --git a/pkgs/schnapps/default.nix b/pkgs/schnapps/default.nix index f84f052..e3518b8 100644 --- a/pkgs/schnapps/default.nix +++ b/pkgs/schnapps/default.nix @@ -1,17 +1,17 @@ { - stdenv -, fetchFromGitLab -, makeWrapper -, btrfs-progs -, util-linux-small -, lib + stdenv, + fetchFromGitLab, + makeWrapper, + btrfs-progs, + util-linux-small, + lib, }: let search_path = lib.makeBinPath [btrfs-progs util-linux-small]; in stdenv.mkDerivation { pname = "schnapps"; version = "2.13.0"; - src =fetchFromGitLab { + src = fetchFromGitLab { domain = "gitlab.nic.cz"; owner = "turris"; repo = "schnapps"; diff --git a/pkgs/service-fns/default.nix b/pkgs/service-fns/default.nix index b2c1ad8..4b7e225 100644 --- a/pkgs/service-fns/default.nix +++ b/pkgs/service-fns/default.nix @@ -1,4 +1,4 @@ -{writeText}: +{ writeText }: writeText "service-fns.sh" '' output() { cat $1/.outputs/$2; } output_word() { diff --git a/pkgs/swconfig/default.nix b/pkgs/swconfig/default.nix index 43cc8d6..7bbd6de 100644 --- a/pkgs/swconfig/default.nix +++ b/pkgs/swconfig/default.nix @@ -14,8 +14,8 @@ in stdenv.mkDerivation { name = "swconfig"; buildInputs = [ buildPackages.pkg-config ]; nativeBuildInputs = [ libnl ]; - CFLAGS="-O2 -Ifrom_kernel -I${libnl.dev}/include/libnl3"; - LDFLAGS="-L${libnl.out}/lib"; + CFLAGS = "-O2 -Ifrom_kernel -I${libnl.dev}/include/libnl3"; + LDFLAGS = "-L${libnl.out}/lib"; patchPhase = '' mkdir -p from_kernel/linux diff --git a/pkgs/systemconfig/default.nix b/pkgs/systemconfig/default.nix index f6a6f9d..4813313 100644 --- a/pkgs/systemconfig/default.nix +++ b/pkgs/systemconfig/default.nix @@ -5,12 +5,12 @@ # they should contain { - writeText -, writeFennelScript -, lib -, s6-init-bin -, closureInfo -, stdenv + writeText, + writeFennelScript, + lib, + s6-init-bin, + closureInfo, + stdenv, }: let inherit (lib.attrsets) mapAttrsToList; diff --git a/pkgs/tufted/default.nix b/pkgs/tufted/default.nix index 861f8fd..319e091 100644 --- a/pkgs/tufted/default.nix +++ b/pkgs/tufted/default.nix @@ -1,8 +1,8 @@ { - lua5_3 -, stdenv -, makeWrapper -} : + lua5_3, + stdenv, + makeWrapper, +}: let lua = lua5_3.withPackages (ps: with ps; [ luasocket luaposix fennel diff --git a/pkgs/uevent-watch/default.nix b/pkgs/uevent-watch/default.nix index 2295510..d8f5356 100644 --- a/pkgs/uevent-watch/default.nix +++ b/pkgs/uevent-watch/default.nix @@ -1,11 +1,12 @@ -{ nellie -, lualinux -, writeFennel -, anoia -, fennel -, stdenv -, fennelrepl -, s6-rc-up-tree +{ + nellie, + lualinux, + writeFennel, + anoia, + fennel, + stdenv, + fennelrepl, + s6-rc-up-tree, }: stdenv.mkDerivation { name = "uevent-watch"; diff --git a/pkgs/usb-modeswitch/default.nix b/pkgs/usb-modeswitch/default.nix index 7b5c021..dbb77c5 100644 --- a/pkgs/usb-modeswitch/default.nix +++ b/pkgs/usb-modeswitch/default.nix @@ -1,9 +1,10 @@ # usb modeswitch without udev, tcl, coreutils, bash dependencies -{ stdenv -, lib -, fetchurl -, pkg-config -, libusb1 +{ + stdenv, + lib, + fetchurl, + pkg-config, + libusb1, }: let pname = "usb-modeswitch"; @@ -12,7 +13,7 @@ in stdenv.mkDerivation { inherit pname version; src = fetchurl { - url = "http://www.draisberghof.de/usb_modeswitch/${pname}-${version}.tar.bz2"; + url = "http://www.draisberghof.de/usb_modeswitch/${pname}-${version}.tar.bz2"; sha256 = "18wbbxc5cfsmikba0msdvd5qlaga27b32nhrzicyd9mdddp265f2"; }; @@ -34,6 +35,6 @@ in stdenv.mkDerivation { meta = { license = lib.licenses.gpl2; - maintainers = []; + maintainers = [ ]; }; } diff --git a/pkgs/write-ash-script/default.nix b/pkgs/write-ash-script/default.nix index 0763a0f..f637c5d 100644 --- a/pkgs/write-ash-script/default.nix +++ b/pkgs/write-ash-script/default.nix @@ -1,13 +1,15 @@ +{ writeScript, lib }: +name: { - writeScript -, lib -} -: name : { runtimeInputs ? [] } : text : writeScript name '' -#!/bin/sh -set -o errexit -set -o nounset -set -o pipefail + runtimeInputs ? [ ], +}: +text: +writeScript name '' + #!/bin/sh + set -o errexit + set -o nounset + set -o pipefail -export PATH="${lib.makeBinPath runtimeInputs}:$PATH" -${text} + export PATH="${lib.makeBinPath runtimeInputs}:$PATH" + ${text} '' diff --git a/pkgs/write-fennel-script/default.nix b/pkgs/write-fennel-script/default.nix index ff46eb1..60f99ae 100644 --- a/pkgs/write-fennel-script/default.nix +++ b/pkgs/write-fennel-script/default.nix @@ -1,5 +1,3 @@ -{ writeFennel -, stdenv -}: -name : packages : source : +{ writeFennel, stdenv }: +name: packages: source: writeFennel name { inherit packages; } source diff --git a/pkgs/write-fennel/default.nix b/pkgs/write-fennel/default.nix index 7c6b0e0..2fc1f51 100644 --- a/pkgs/write-fennel/default.nix +++ b/pkgs/write-fennel/default.nix @@ -1,38 +1,38 @@ { - lua -, lib -, fennel -, stdenv + lua, + lib, + fennel, + stdenv, }: -name : +name: { - packages ? [], + packages ? [ ], correlate ? false, - mainFunction ? null -} : source : - let - luapath = builtins.map - (f: - "${f}/share/lua/${lua.luaversion}/?.lua;" + - "${f}/share/lua/${lua.luaversion}/?/init.lua;") - packages; - luacpath = builtins.map (f: "${f}/lib/lua/${lua.luaversion}/?.so;") packages; - luaFlags = lib.optionalString (mainFunction !=null) "-e dofile(arg[0]).${mainFunction}()"; - in stdenv.mkDerivation { - inherit name; - src = ./.; - nativeBuildInputs = [ fennel ]; - buildPhase = '' - ( - echo "#!${lua}/bin/lua ${luaFlags}" - echo "package.path = ${lib.strings.escapeShellArg (builtins.concatStringsSep "" luapath)} .. package.path" - echo "package.cpath = ${lib.strings.escapeShellArg (builtins.concatStringsSep "" luacpath)} .. package.cpath" - echo "local ok, stdlib = pcall(require,'posix.stdlib'); if ok then stdlib.setenv('PATH',${lib.escapeShellArg (lib.makeBinPath packages)} .. \":\" .. os.getenv('PATH')) end" - fennel ${if correlate then "--correlate" else ""} --compile ${source} - ) > ${name}.lua - ''; - installPhase = '' - cp ${name}.lua $out - chmod +x $out - ''; - } + mainFunction ? null, +}: +source: +let + luapath = builtins.map ( + f: "${f}/share/lua/${lua.luaversion}/?.lua;" + "${f}/share/lua/${lua.luaversion}/?/init.lua;" + ) packages; + luacpath = builtins.map (f: "${f}/lib/lua/${lua.luaversion}/?.so;") packages; + luaFlags = lib.optionalString (mainFunction != null) "-e dofile(arg[0]).${mainFunction}()"; +in +stdenv.mkDerivation { + inherit name; + src = ./.; + nativeBuildInputs = [ fennel ]; + buildPhase = '' + ( + echo "#!${lua}/bin/lua ${luaFlags}" + echo "package.path = ${lib.strings.escapeShellArg (builtins.concatStringsSep "" luapath)} .. package.path" + echo "package.cpath = ${lib.strings.escapeShellArg (builtins.concatStringsSep "" luacpath)} .. package.cpath" + echo "local ok, stdlib = pcall(require,'posix.stdlib'); if ok then stdlib.setenv('PATH',${lib.escapeShellArg (lib.makeBinPath packages)} .. \":\" .. os.getenv('PATH')) end" + fennel ${if correlate then "--correlate" else ""} --compile ${source} + ) > ${name}.lua + ''; + installPhase = '' + cp ${name}.lua $out + chmod +x $out + ''; +} diff --git a/pkgs/zyxel-bootconfig/default.nix b/pkgs/zyxel-bootconfig/default.nix index 4b72ccf..cc1b871 100644 --- a/pkgs/zyxel-bootconfig/default.nix +++ b/pkgs/zyxel-bootconfig/default.nix @@ -1,7 +1,4 @@ -{ - stdenv -, openwrt -}: +{ stdenv, openwrt }: stdenv.mkDerivation { name = "zyxel-bootconfig"; inherit (openwrt) src; diff --git a/tests/ci.nix b/tests/ci.nix index 4fbd953..9c94e45 100644 --- a/tests/ci.nix +++ b/tests/ci.nix @@ -5,7 +5,7 @@ pppoe = import ./pppoe/test.nix; jffs2 = import ./jffs2/test.nix; ext4 = import ./ext4/test.nix; - min-copy-closure = import ./min-copy-closure/test.nix; + min-copy-closure = import ./min-copy-closure/test.nix; fennel = import ./fennel/test.nix; tftpboot = import ./tftpboot/test.nix; updown = import ./updown/test.nix; diff --git a/vanilla-configuration.nix b/vanilla-configuration.nix index d43da17..1096b82 100644 --- a/vanilla-configuration.nix +++ b/vanilla-configuration.nix @@ -1,4 +1,4 @@ -{ config, pkgs, ... } : +{ config, pkgs, ... }: let inherit (pkgs.liminix.services) target; svc = config.system.service; @@ -31,5 +31,5 @@ in rec { ipaddr = "192.168.8.251"; }; - defaultProfile.packages = [ pkgs.hello ] ; + defaultProfile.packages = [ pkgs.hello ]; }