mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-07-13 21:50:33 +03:00
treewide: Fix incorrect string indentations
(cherry picked from commit dd7d5339f7
)
This commit is contained in:
parent
772006e8c0
commit
f6ea57fd16
17 changed files with 69 additions and 44 deletions
|
@ -597,11 +597,13 @@ in rec {
|
||||||
(expr "\t${ind}" value)
|
(expr "\t${ind}" value)
|
||||||
]) x));
|
]) x));
|
||||||
|
|
||||||
in ''<?xml version="1.0" encoding="UTF-8"?>
|
in
|
||||||
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
''
|
||||||
<plist version="1.0">
|
<?xml version="1.0" encoding="UTF-8"?>
|
||||||
${expr "" v}
|
<!DOCTYPE plist PUBLIC "-//Apple Computer//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
|
||||||
</plist>'';
|
<plist version="1.0">
|
||||||
|
${expr "" v}
|
||||||
|
</plist>'';
|
||||||
|
|
||||||
/**
|
/**
|
||||||
Translate a simple Nix expression to Dhall notation.
|
Translate a simple Nix expression to Dhall notation.
|
||||||
|
|
|
@ -1748,8 +1748,8 @@ rec {
|
||||||
```
|
```
|
||||||
:::
|
:::
|
||||||
*/
|
*/
|
||||||
crossLists = warn
|
crossLists = warn ''
|
||||||
''lib.crossLists is deprecated, use lib.mapCartesianProduct instead.
|
lib.crossLists is deprecated, use lib.mapCartesianProduct instead.
|
||||||
|
|
||||||
For example, the following function call:
|
For example, the following function call:
|
||||||
|
|
||||||
|
|
|
@ -1,6 +1,7 @@
|
||||||
{ config, lib, pkgs, ... }:
|
{ config, lib, pkgs, ... }:
|
||||||
{
|
{
|
||||||
options.hardware.wooting.enable = lib.mkEnableOption ''support for Wooting keyboards.
|
options.hardware.wooting.enable = lib.mkEnableOption ''
|
||||||
|
support for Wooting keyboards.
|
||||||
Note that users must be in the "input" group for udev rules to apply'';
|
Note that users must be in the "input" group for udev rules to apply'';
|
||||||
|
|
||||||
config = lib.mkIf config.hardware.wooting.enable {
|
config = lib.mkIf config.hardware.wooting.enable {
|
||||||
|
|
|
@ -95,7 +95,7 @@ let
|
||||||
path = [
|
path = [
|
||||||
config.services.borgbackup.package pkgs.openssh
|
config.services.borgbackup.package pkgs.openssh
|
||||||
];
|
];
|
||||||
script = "exec " + lib.optionalString cfg.inhibitsSleep ''\
|
script = "exec " + lib.optionalString cfg.inhibitsSleep ''
|
||||||
${pkgs.systemd}/bin/systemd-inhibit \
|
${pkgs.systemd}/bin/systemd-inhibit \
|
||||||
--who="borgbackup" \
|
--who="borgbackup" \
|
||||||
--what="sleep" \
|
--what="sleep" \
|
||||||
|
@ -173,7 +173,7 @@ let
|
||||||
mode != "none" -> passCommand != null || passphrase != null;
|
mode != "none" -> passCommand != null || passphrase != null;
|
||||||
message =
|
message =
|
||||||
"passCommand or passphrase has to be specified because"
|
"passCommand or passphrase has to be specified because"
|
||||||
+ '' borgbackup.jobs.${name}.encryption != "none"'';
|
+ " borgbackup.jobs.${name}.encryption != \"none\"";
|
||||||
};
|
};
|
||||||
|
|
||||||
mkRepoService = name: cfg:
|
mkRepoService = name: cfg:
|
||||||
|
|
|
@ -323,7 +323,8 @@ in
|
||||||
after = [ "network.target" ];
|
after = [ "network.target" ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Slice = "kubernetes.slice";
|
Slice = "kubernetes.slice";
|
||||||
ExecStart = ''${top.package}/bin/kube-apiserver \
|
ExecStart = ''
|
||||||
|
${top.package}/bin/kube-apiserver \
|
||||||
--allow-privileged=${boolToString cfg.allowPrivileged} \
|
--allow-privileged=${boolToString cfg.allowPrivileged} \
|
||||||
--authorization-mode=${concatStringsSep "," cfg.authorizationMode} \
|
--authorization-mode=${concatStringsSep "," cfg.authorizationMode} \
|
||||||
${optionalString (elem "ABAC" cfg.authorizationMode)
|
${optionalString (elem "ABAC" cfg.authorizationMode)
|
||||||
|
|
|
@ -65,7 +65,8 @@ in
|
||||||
path = with pkgs; [ iptables conntrack-tools ];
|
path = with pkgs; [ iptables conntrack-tools ];
|
||||||
serviceConfig = {
|
serviceConfig = {
|
||||||
Slice = "kubernetes.slice";
|
Slice = "kubernetes.slice";
|
||||||
ExecStart = ''${top.package}/bin/kube-proxy \
|
ExecStart = ''
|
||||||
|
${top.package}/bin/kube-proxy \
|
||||||
--bind-address=${cfg.bindAddress} \
|
--bind-address=${cfg.bindAddress} \
|
||||||
${optionalString (top.clusterCidr!=null)
|
${optionalString (top.clusterCidr!=null)
|
||||||
"--cluster-cidr=${top.clusterCidr}"} \
|
"--cluster-cidr=${top.clusterCidr}"} \
|
||||||
|
|
|
@ -214,7 +214,8 @@ in {
|
||||||
masterAuth = mkOption {
|
masterAuth = mkOption {
|
||||||
type = with types; nullOr str;
|
type = with types; nullOr str;
|
||||||
default = null;
|
default = null;
|
||||||
description = ''If the master is password protected (using the requirePass configuration)
|
description = ''
|
||||||
|
If the master is password protected (using the requirePass configuration)
|
||||||
it is possible to tell the slave to authenticate before starting the replication synchronization
|
it is possible to tell the slave to authenticate before starting the replication synchronization
|
||||||
process, otherwise the master will refuse the slave request.
|
process, otherwise the master will refuse the slave request.
|
||||||
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)'';
|
(STORED PLAIN TEXT, WORLD-READABLE IN NIX STORE)'';
|
||||||
|
|
|
@ -61,7 +61,8 @@ in
|
||||||
# in sections.
|
# in sections.
|
||||||
type = attrsOf (attrsOf json.type);
|
type = attrsOf (attrsOf json.type);
|
||||||
default = { };
|
default = { };
|
||||||
example = literalExpression ''{
|
example = literalExpression ''
|
||||||
|
{
|
||||||
"log-level-debug" = {
|
"log-level-debug" = {
|
||||||
"context.properties" = {
|
"context.properties" = {
|
||||||
# Output Debug log messages as opposed to only the default level (Notice)
|
# Output Debug log messages as opposed to only the default level (Notice)
|
||||||
|
@ -88,7 +89,8 @@ in
|
||||||
}
|
}
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
}'';
|
}
|
||||||
|
'';
|
||||||
description = ''
|
description = ''
|
||||||
Additional configuration for the WirePlumber daemon when run in
|
Additional configuration for the WirePlumber daemon when run in
|
||||||
single-instance mode (the default in nixpkgs and currently the only
|
single-instance mode (the default in nixpkgs and currently the only
|
||||||
|
@ -166,7 +168,8 @@ in
|
||||||
configPackages = mkOption {
|
configPackages = mkOption {
|
||||||
type = listOf package;
|
type = listOf package;
|
||||||
default = [ ];
|
default = [ ];
|
||||||
example = literalExpression ''[
|
example = literalExpression ''
|
||||||
|
[
|
||||||
(pkgs.writeTextDir "share/wireplumber/wireplumber.conf.d/10-bluez.conf" '''
|
(pkgs.writeTextDir "share/wireplumber/wireplumber.conf.d/10-bluez.conf" '''
|
||||||
monitor.bluez.properties = {
|
monitor.bluez.properties = {
|
||||||
bluez5.roles = [ a2dp_sink a2dp_source bap_sink bap_source hsp_hs hsp_ag hfp_hf hfp_ag ]
|
bluez5.roles = [ a2dp_sink a2dp_source bap_sink bap_source hsp_hs hsp_ag hfp_hf hfp_ag ]
|
||||||
|
@ -175,7 +178,8 @@ in
|
||||||
bluez5.hfphsp-backend = "native"
|
bluez5.hfphsp-backend = "native"
|
||||||
}
|
}
|
||||||
''')
|
''')
|
||||||
]'';
|
]
|
||||||
|
'';
|
||||||
description = ''
|
description = ''
|
||||||
List of packages that provide WirePlumber configuration, in the form of
|
List of packages that provide WirePlumber configuration, in the form of
|
||||||
`share/wireplumber/*/*.conf` files.
|
`share/wireplumber/*/*.conf` files.
|
||||||
|
|
|
@ -1080,12 +1080,13 @@ in {
|
||||||
warnings = [
|
warnings = [
|
||||||
(mkIf
|
(mkIf
|
||||||
(cfg.registry.enable && versionAtLeast (getVersion cfg.packages.gitlab) "16.0.0" && cfg.registry.package == pkgs.docker-distribution)
|
(cfg.registry.enable && versionAtLeast (getVersion cfg.packages.gitlab) "16.0.0" && cfg.registry.package == pkgs.docker-distribution)
|
||||||
''Support for container registries other than gitlab-container-registry has ended since GitLab 16.0.0 and is scheduled for removal in a future release.
|
''
|
||||||
|
Support for container registries other than gitlab-container-registry has ended since GitLab 16.0.0 and is scheduled for removal in a future release.
|
||||||
Please back up your data and migrate to the gitlab-container-registry package.''
|
Please back up your data and migrate to the gitlab-container-registry package.''
|
||||||
)
|
)
|
||||||
(mkIf
|
(mkIf
|
||||||
(versionAtLeast (getVersion cfg.packages.gitlab) "16.2.0" && versionOlder (getVersion cfg.packages.gitlab) "16.5.0")
|
(versionAtLeast (getVersion cfg.packages.gitlab) "16.2.0" && versionOlder (getVersion cfg.packages.gitlab) "16.5.0") ''
|
||||||
''GitLab instances created or updated between versions [15.11.0, 15.11.2] have an incorrect database schema.
|
GitLab instances created or updated between versions [15.11.0, 15.11.2] have an incorrect database schema.
|
||||||
Check the upstream documentation for a workaround: https://docs.gitlab.com/ee/update/versions/gitlab_16_changes.html#undefined-column-error-upgrading-to-162-or-later''
|
Check the upstream documentation for a workaround: https://docs.gitlab.com/ee/update/versions/gitlab_16_changes.html#undefined-column-error-upgrading-to-162-or-later''
|
||||||
)
|
)
|
||||||
];
|
];
|
||||||
|
|
|
@ -42,8 +42,9 @@ let
|
||||||
StateDirectory = stateDirectory;
|
StateDirectory = stateDirectory;
|
||||||
User = "ceph";
|
User = "ceph";
|
||||||
Group = if daemonType == "osd" then "disk" else "ceph";
|
Group = if daemonType == "osd" then "disk" else "ceph";
|
||||||
ExecStart = ''${ceph.out}/bin/${if daemonType == "rgw" then "radosgw" else "ceph-${daemonType}"} \
|
ExecStart = ''
|
||||||
-f --cluster ${clusterName} --id ${daemonId}'';
|
${ceph.out}/bin/${if daemonType == "rgw" then "radosgw" else "ceph-${daemonType}"} \
|
||||||
|
-f --cluster ${clusterName} --id ${daemonId}'';
|
||||||
} // lib.optionalAttrs (daemonType == "osd") {
|
} // lib.optionalAttrs (daemonType == "osd") {
|
||||||
ExecStartPre = "${ceph.lib}/libexec/ceph/ceph-osd-prestart.sh --id ${daemonId} --cluster ${clusterName}";
|
ExecStartPre = "${ceph.lib}/libexec/ceph/ceph-osd-prestart.sh --id ${daemonId} --cluster ${clusterName}";
|
||||||
RestartSec = "20s";
|
RestartSec = "20s";
|
||||||
|
|
|
@ -119,7 +119,8 @@ in
|
||||||
MAX 0.5 144 7200
|
MAX 0.5 144 7200
|
||||||
MIN 0.5 144 7200
|
MIN 0.5 144 7200
|
||||||
'';
|
'';
|
||||||
description = ''Configure the ping frequency and retention of the rrd files.
|
description = ''
|
||||||
|
Configure the ping frequency and retention of the rrd files.
|
||||||
Once set, changing the interval will require deletion or migration of all
|
Once set, changing the interval will require deletion or migration of all
|
||||||
the collected data.'';
|
the collected data.'';
|
||||||
};
|
};
|
||||||
|
|
|
@ -33,14 +33,16 @@ in
|
||||||
settings = mkOption {
|
settings = mkOption {
|
||||||
description = "Configuration for [tinyproxy](https://tinyproxy.github.io/).";
|
description = "Configuration for [tinyproxy](https://tinyproxy.github.io/).";
|
||||||
default = { };
|
default = { };
|
||||||
example = literalExpression ''{
|
example = literalExpression ''
|
||||||
|
{
|
||||||
Port 8888;
|
Port 8888;
|
||||||
Listen 127.0.0.1;
|
Listen 127.0.0.1;
|
||||||
Timeout 600;
|
Timeout 600;
|
||||||
Allow 127.0.0.1;
|
Allow 127.0.0.1;
|
||||||
Anonymous = ['"Host"' '"Authorization"'];
|
Anonymous = ['"Host"' '"Authorization"'];
|
||||||
ReversePath = '"/example/" "http://www.example.com/"';
|
ReversePath = '"/example/" "http://www.example.com/"';
|
||||||
}'';
|
}
|
||||||
|
'';
|
||||||
type = types.submodule ({name, ...}: {
|
type = types.submodule ({name, ...}: {
|
||||||
freeformType = settingsFormat.type;
|
freeformType = settingsFormat.type;
|
||||||
options = {
|
options = {
|
||||||
|
|
|
@ -194,7 +194,8 @@ let
|
||||||
allowedIPs = mkOption {
|
allowedIPs = mkOption {
|
||||||
example = [ "10.192.122.3/32" "10.192.124.1/24" ];
|
example = [ "10.192.122.3/32" "10.192.124.1/24" ];
|
||||||
type = with types; listOf str;
|
type = with types; listOf str;
|
||||||
description = ''List of IP (v4 or v6) addresses with CIDR masks from
|
description = ''
|
||||||
|
List of IP (v4 or v6) addresses with CIDR masks from
|
||||||
which this peer is allowed to send incoming traffic and to which
|
which this peer is allowed to send incoming traffic and to which
|
||||||
outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may
|
outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may
|
||||||
be specified for matching all IPv4 addresses, and ::/0 may be specified
|
be specified for matching all IPv4 addresses, and ::/0 may be specified
|
||||||
|
@ -205,7 +206,8 @@ let
|
||||||
default = null;
|
default = null;
|
||||||
example = "demo.wireguard.io:12913";
|
example = "demo.wireguard.io:12913";
|
||||||
type = with types; nullOr str;
|
type = with types; nullOr str;
|
||||||
description = ''Endpoint IP or hostname of the peer, followed by a colon,
|
description = ''
|
||||||
|
Endpoint IP or hostname of the peer, followed by a colon,
|
||||||
and then a port number of the peer.'';
|
and then a port number of the peer.'';
|
||||||
};
|
};
|
||||||
|
|
||||||
|
@ -213,7 +215,8 @@ let
|
||||||
default = null;
|
default = null;
|
||||||
type = with types; nullOr int;
|
type = with types; nullOr int;
|
||||||
example = 25;
|
example = 25;
|
||||||
description = ''This is optional and is by default off, because most
|
description = ''
|
||||||
|
This is optional and is by default off, because most
|
||||||
users will not need it. It represents, in seconds, between 1 and 65535
|
users will not need it. It represents, in seconds, between 1 and 65535
|
||||||
inclusive, how often to send an authenticated empty packet to the peer,
|
inclusive, how often to send an authenticated empty packet to the peer,
|
||||||
for the purpose of keeping a stateful firewall or NAT mapping valid
|
for the purpose of keeping a stateful firewall or NAT mapping valid
|
||||||
|
|
|
@ -127,7 +127,8 @@ let
|
||||||
default = null;
|
default = null;
|
||||||
type = with types; nullOr str;
|
type = with types; nullOr str;
|
||||||
example = "container";
|
example = "container";
|
||||||
description = ''The pre-existing network namespace in which the
|
description = ''
|
||||||
|
The pre-existing network namespace in which the
|
||||||
WireGuard interface is created, and which retains the socket even if the
|
WireGuard interface is created, and which retains the socket even if the
|
||||||
interface is moved via {option}`interfaceNamespace`. When
|
interface is moved via {option}`interfaceNamespace`. When
|
||||||
`null`, the interface is created in the init namespace.
|
`null`, the interface is created in the init namespace.
|
||||||
|
@ -139,7 +140,8 @@ let
|
||||||
default = null;
|
default = null;
|
||||||
type = with types; nullOr str;
|
type = with types; nullOr str;
|
||||||
example = "init";
|
example = "init";
|
||||||
description = ''The pre-existing network namespace the WireGuard
|
description = ''
|
||||||
|
The pre-existing network namespace the WireGuard
|
||||||
interface is moved to. The special value `init` means
|
interface is moved to. The special value `init` means
|
||||||
the init namespace. When `null`, the interface is not
|
the init namespace. When `null`, the interface is not
|
||||||
moved.
|
moved.
|
||||||
|
@ -240,7 +242,8 @@ let
|
||||||
allowedIPs = mkOption {
|
allowedIPs = mkOption {
|
||||||
example = [ "10.192.122.3/32" "10.192.124.1/24" ];
|
example = [ "10.192.122.3/32" "10.192.124.1/24" ];
|
||||||
type = with types; listOf str;
|
type = with types; listOf str;
|
||||||
description = ''List of IP (v4 or v6) addresses with CIDR masks from
|
description = ''
|
||||||
|
List of IP (v4 or v6) addresses with CIDR masks from
|
||||||
which this peer is allowed to send incoming traffic and to which
|
which this peer is allowed to send incoming traffic and to which
|
||||||
outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may
|
outgoing traffic for this peer is directed. The catch-all 0.0.0.0/0 may
|
||||||
be specified for matching all IPv4 addresses, and ::/0 may be specified
|
be specified for matching all IPv4 addresses, and ::/0 may be specified
|
||||||
|
@ -300,7 +303,8 @@ let
|
||||||
default = null;
|
default = null;
|
||||||
type = with types; nullOr int;
|
type = with types; nullOr int;
|
||||||
example = 25;
|
example = 25;
|
||||||
description = ''This is optional and is by default off, because most
|
description = ''
|
||||||
|
This is optional and is by default off, because most
|
||||||
users will not need it. It represents, in seconds, between 1 and 65535
|
users will not need it. It represents, in seconds, between 1 and 65535
|
||||||
inclusive, how often to send an authenticated empty packet to the peer,
|
inclusive, how often to send an authenticated empty packet to the peer,
|
||||||
for the purpose of keeping a stateful firewall or NAT mapping valid
|
for the purpose of keeping a stateful firewall or NAT mapping valid
|
||||||
|
|
|
@ -143,7 +143,8 @@ in
|
||||||
User = cfg.user;
|
User = cfg.user;
|
||||||
Group = cfg.group;
|
Group = cfg.group;
|
||||||
WorkingDirectory = cfg.stateDir;
|
WorkingDirectory = cfg.stateDir;
|
||||||
ExecStart = ''${cfg.package}/bin/galene \
|
ExecStart = ''
|
||||||
|
${cfg.package}/bin/galene \
|
||||||
${optionalString (cfg.insecure) "-insecure"} \
|
${optionalString (cfg.insecure) "-insecure"} \
|
||||||
-data ${cfg.dataDir} \
|
-data ${cfg.dataDir} \
|
||||||
-groups ${cfg.groupsDir} \
|
-groups ${cfg.groupsDir} \
|
||||||
|
|
|
@ -768,15 +768,17 @@ in {
|
||||||
description = ''
|
description = ''
|
||||||
Extra options which should be appended to Nextcloud's config.php file.
|
Extra options which should be appended to Nextcloud's config.php file.
|
||||||
'';
|
'';
|
||||||
example = literalExpression '' {
|
example = literalExpression ''
|
||||||
redis = {
|
{
|
||||||
host = "/run/redis/redis.sock";
|
redis = {
|
||||||
port = 0;
|
host = "/run/redis/redis.sock";
|
||||||
dbindex = 0;
|
port = 0;
|
||||||
password = "secret";
|
dbindex = 0;
|
||||||
timeout = 1.5;
|
password = "secret";
|
||||||
};
|
timeout = 1.5;
|
||||||
} '';
|
};
|
||||||
|
}
|
||||||
|
'';
|
||||||
};
|
};
|
||||||
|
|
||||||
secretFile = mkOption {
|
secretFile = mkOption {
|
||||||
|
|
|
@ -319,8 +319,8 @@ in
|
||||||
|
|
||||||
system.extraSystemBuilderCmds =
|
system.extraSystemBuilderCmds =
|
||||||
optionalString
|
optionalString
|
||||||
config.system.copySystemConfiguration
|
config.system.copySystemConfiguration ''
|
||||||
''ln -s '${import ../../../lib/from-env.nix "NIXOS_CONFIG" <nixos-config>}' \
|
ln -s '${import ../../../lib/from-env.nix "NIXOS_CONFIG" <nixos-config>}' \
|
||||||
"$out/configuration.nix"
|
"$out/configuration.nix"
|
||||||
'' +
|
'' +
|
||||||
optionalString
|
optionalString
|
||||||
|
|
Loading…
Add table
Add a link
Reference in a new issue