-{ lib, pkgs, config, mylibs, ... }:
+{ lib, pkgs, config, ... }:
let
name = "goaccess";
cfg = config.services.webstats;
enableRollback = true;
};
- eldiron = { config, pkgs, mylibs, myconfig, ... }:
+ eldiron = { config, pkgs, myconfig, ... }:
{
nixpkgs.overlays = builtins.attrValues (import ../overlays);
_module.args = {
pkgsNext = import <nixpkgsNext> {};
pkgsPrevious = import <nixpkgsPrevious> {};
- mylibs = import ../libs.nix { inherit pkgs; };
myconfig = {
inherit privateFiles;
env = import "${privateFiles}/environment.nix";
-{ lib, pkgs, config, myconfig, mylibs, ... }:
+{ lib, pkgs, config, myconfig, ... }:
let
varDir = "/var/lib/buildbot";
buildbot_common = pkgs.python3Packages.buildPythonPackage rec {
-{ lib, pkgs, config, myconfig, mylibs, ... }:
+{ lib, pkgs, config, myconfig, ... }:
let
cfg = config.services.myGitolite;
in {
};
system.activationScripts.gitolite = let
- gitolite_ldap_groups = mylibs.wrap {
+ gitolite_ldap_groups = pkgs.mylibs.wrap {
name = "gitolite_ldap_groups.sh";
file = ./gitolite_ldap_groups.sh;
vars = {
-{ lib, pkgs, config, mylibs, myconfig, ... }:
+{ lib, pkgs, config, myconfig, ... }:
{
config = {
networking.firewall.allowedTCPPorts = [ 22 ];
# move it in the nix store.
environment.etc."ssh/ldap_authorized_keys" = let
ldap_authorized_keys =
- mylibs.wrap {
+ pkgs.mylibs.wrap {
name = "ldap_authorized_keys";
file = ./ldap_authorized_keys.sh;
paths = [ pkgs.which pkgs.gitolite pkgs.openldap pkgs.stdenv.shellPackage pkgs.gnugrep pkgs.gnused pkgs.coreutils ];