diff options
Diffstat (limited to 'nixos/tests')
154 files changed, 274 insertions, 274 deletions
diff --git a/nixos/tests/acme.nix b/nixos/tests/acme.nix index c5898db6b3253..6d728b387e145 100644 --- a/nixos/tests/acme.nix +++ b/nixos/tests/acme.nix @@ -1,5 +1,5 @@ let - commonConfig = { config, lib, pkgs, nodes, ... }: { + commonConfig = { lib, nodes, ... }: { networking.nameservers = [ nodes.letsencrypt.config.networking.primaryIPAddress ]; diff --git a/nixos/tests/ammonite.nix b/nixos/tests/ammonite.nix index e1dee71fddf23..fedfde233e8de 100644 --- a/nixos/tests/ammonite.nix +++ b/nixos/tests/ammonite.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { amm = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.ammonite ]; }; diff --git a/nixos/tests/atd.nix b/nixos/tests/atd.nix index ef848c2a374f2..9f367d4c1d2a6 100644 --- a/nixos/tests/atd.nix +++ b/nixos/tests/atd.nix @@ -1,4 +1,4 @@ -import ./make-test.nix ({ pkgs, lib, ... }: +import ./make-test.nix ({ pkgs, ... }: { name = "atd"; @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, lib, ... }: }; machine = - { config, pkgs, ... }: + { ... }: { services.atd.enable = true; users.users.alice = { isNormalUser = true; }; }; diff --git a/nixos/tests/avahi.nix b/nixos/tests/avahi.nix index 976a770e887c2..dfb60998941b1 100644 --- a/nixos/tests/avahi.nix +++ b/nixos/tests/avahi.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ... } : { }; nodes = let - cfg = { config, pkgs, ... }: { + cfg = { ... }: { services.avahi = { enable = true; nssmdns = true; diff --git a/nixos/tests/beegfs.nix b/nixos/tests/beegfs.nix index 433910feafe30..9c241fd2301a4 100644 --- a/nixos/tests/beegfs.nix +++ b/nixos/tests/beegfs.nix @@ -1,9 +1,9 @@ -import ./make-test.nix ({ pkgs, ... } : +import ./make-test.nix ({ ... } : let connAuthFile="beegfs/auth-def.key"; - client = { config, pkgs, lib, ... } : { + client = { pkgs, ... } : { networking.firewall.enable = false; services.beegfsEnable = true; services.beegfs.default = { @@ -31,7 +31,7 @@ let }; - server = service : { config, pkgs, lib, ... } : { + server = service : { pkgs, ... } : { networking.firewall.enable = false; boot.initrd.postDeviceCommands = '' ${pkgs.e2fsprogs}/bin/mkfs.ext4 -L data /dev/vdb diff --git a/nixos/tests/bittorrent.nix b/nixos/tests/bittorrent.nix index 50c98664660a9..609b1ff7a83a2 100644 --- a/nixos/tests/bittorrent.nix +++ b/nixos/tests/bittorrent.nix @@ -30,7 +30,7 @@ in nodes = { tracker = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.transmission pkgs.opentracker ]; # We need Apache on the tracker to serve the torrents. @@ -42,7 +42,7 @@ in }; router = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.miniupnpd ]; virtualisation.vlans = [ 1 2 ]; networking.nat.enable = true; @@ -52,7 +52,7 @@ in }; client1 = - { config, pkgs, nodes, ... }: + { pkgs, nodes, ... }: { environment.systemPackages = [ pkgs.transmission ]; virtualisation.vlans = [ 2 ]; networking.defaultGateway = @@ -61,7 +61,7 @@ in }; client2 = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.transmission ]; networking.firewall.enable = false; }; diff --git a/nixos/tests/borgbackup.nix b/nixos/tests/borgbackup.nix index 36731773de27e..9b39abdfa8edf 100644 --- a/nixos/tests/borgbackup.nix +++ b/nixos/tests/borgbackup.nix @@ -41,7 +41,7 @@ in { }; nodes = { - client = { config, pkgs, ... }: { + client = { ... }: { services.borgbackup.jobs = { local = rec { @@ -84,7 +84,7 @@ in { }; }; - server = { config, pkgs, ... }: { + server = { ... }: { services.openssh = { enable = true; passwordAuthentication = false; diff --git a/nixos/tests/buildbot.nix b/nixos/tests/buildbot.nix index 828846f17c899..cf408dc7fec92 100644 --- a/nixos/tests/buildbot.nix +++ b/nixos/tests/buildbot.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ... } : { name = "buildbot"; nodes = { - bbmaster = { config, pkgs, ... }: { + bbmaster = { pkgs, ... }: { services.buildbot-master = { enable = true; package = pkgs.buildbot-full; @@ -22,7 +22,7 @@ import ./make-test.nix ({ pkgs, ... } : { environment.systemPackages = with pkgs; [ git buildbot-full ]; }; - bbworker = { config, pkgs, ... }: { + bbworker = { pkgs, ... }: { services.buildbot-worker = { enable = true; masterUrl = "bbmaster:9989"; @@ -30,7 +30,7 @@ import ./make-test.nix ({ pkgs, ... } : { environment.systemPackages = with pkgs; [ git buildbot-worker ]; }; - gitrepo = { config, pkgs, ... }: { + gitrepo = { pkgs, ... }: { services.openssh.enable = true; networking.firewall.allowedTCPPorts = [ 22 9418 ]; environment.systemPackages = with pkgs; [ git ]; diff --git a/nixos/tests/cadvisor.nix b/nixos/tests/cadvisor.nix index f0083ab18e45e..e60bae4b70033 100644 --- a/nixos/tests/cadvisor.nix +++ b/nixos/tests/cadvisor.nix @@ -5,11 +5,11 @@ import ./make-test.nix ({ pkgs, ... } : { }; nodes = { - machine = { config, pkgs, ... }: { + machine = { ... }: { services.cadvisor.enable = true; }; - influxdb = { config, pkgs, lib, ... }: with lib; { + influxdb = { lib, ... }: with lib; { services.cadvisor.enable = true; services.cadvisor.storageDriver = "influxdb"; services.influxdb.enable = true; diff --git a/nixos/tests/cassandra.nix b/nixos/tests/cassandra.nix index b729e6b158bcb..ca8f35ef3bff3 100644 --- a/nixos/tests/cassandra.nix +++ b/nixos/tests/cassandra.nix @@ -24,9 +24,9 @@ in name = "cassandra-ci"; nodes = { - cass0 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.1" {}; - cass1 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.2" {}; - cass2 = {pkgs, config, nodes, ...}: nodeCfg nodes "192.168.1.3" { + cass0 = { nodes, ... }: nodeCfg nodes "192.168.1.1" {}; + cass1 = { nodes, ... }: nodeCfg nodes "192.168.1.2" {}; + cass2 = { nodes, ... }: nodeCfg nodes "192.168.1.3" { extraParams = [ ''JVM_OPTS="$JVM_OPTS -Dcassandra.replace_address=192.168.1.2"'' ]; diff --git a/nixos/tests/ceph.nix b/nixos/tests/ceph.nix index b9993062c079a..dd45f0157b01a 100644 --- a/nixos/tests/ceph.nix +++ b/nixos/tests/ceph.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({pkgs, ...}: rec { }; nodes = { - aio = { config, pkgs, ... }: { + aio = { pkgs, ... }: { virtualisation = { emptyDiskImages = [ 20480 20480 ]; vlans = [ 1 ]; @@ -55,7 +55,7 @@ import ./make-test.nix ({pkgs, ...}: rec { }; }; - testScript = { nodes, ... }: '' + testScript = { ... }: '' startAll; $aio->waitForUnit("network.target"); diff --git a/nixos/tests/cjdns.nix b/nixos/tests/cjdns.nix index db89c496944e5..ab5f8e0bcf3e5 100644 --- a/nixos/tests/cjdns.nix +++ b/nixos/tests/cjdns.nix @@ -4,7 +4,7 @@ let carolPassword = "678287829ce4c67bc8b227e56d94422ee1b85fa11618157b2f591de6c6322b52"; basicConfig = - { config, pkgs, ... }: + { ... }: { services.cjdns.enable = true; # Turning off DHCP isn't very realistic but makes @@ -29,7 +29,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = rec { # Alice finds peers over over ETHInterface. alice = - { config, ... }: + { ... }: { imports = [ basicConfig ]; services.cjdns.ETHInterface.bind = "eth1"; @@ -41,7 +41,7 @@ import ./make-test.nix ({ pkgs, ...} : { # Bob explicitly connects to Carol over UDPInterface. bob = - { config, lib, nodes, ... }: + { ... }: { imports = [ basicConfig ]; @@ -63,7 +63,7 @@ import ./make-test.nix ({ pkgs, ...} : { # Carol listens on ETHInterface and UDPInterface, # but knows neither Alice or Bob. carol = - { config, lib, nodes, ... }: + { ... }: { imports = [ basicConfig ]; environment.etc."cjdns.keys".text = '' diff --git a/nixos/tests/cloud-init.nix b/nixos/tests/cloud-init.nix index 2a258e4bff542..303e74086460f 100644 --- a/nixos/tests/cloud-init.nix +++ b/nixos/tests/cloud-init.nix @@ -31,7 +31,7 @@ in makeTest { maintainers = [ lewo ]; }; machine = - { config, pkgs, ... }: + { ... }: { virtualisation.qemu.options = [ "-cdrom" "${metadataDrive}/metadata.iso" ]; services.cloud-init.enable = true; diff --git a/nixos/tests/common/user-account.nix b/nixos/tests/common/user-account.nix index dc50e14750b01..9cd531a1f96c8 100644 --- a/nixos/tests/common/user-account.nix +++ b/nixos/tests/common/user-account.nix @@ -1,4 +1,4 @@ -{ lib, ... }: +{ ... }: { users.users.alice = { isNormalUser = true; diff --git a/nixos/tests/containers-bridge.nix b/nixos/tests/containers-bridge.nix index dfef46a2ada49..bd8bd5dee9c88 100644 --- a/nixos/tests/containers-bridge.nix +++ b/nixos/tests/containers-bridge.nix @@ -14,7 +14,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/containers-extra_veth.nix b/nixos/tests/containers-extra_veth.nix index df3f3354b2d99..8f874b3585dc4 100644 --- a/nixos/tests/containers-extra_veth.nix +++ b/nixos/tests/containers-extra_veth.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/containers-hosts.nix b/nixos/tests/containers-hosts.nix index df1ef6d149364..8cf298c622583 100644 --- a/nixos/tests/containers-hosts.nix +++ b/nixos/tests/containers-hosts.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, lib, ... }: + { lib, ... }: { virtualisation.memorySize = 256; virtualisation.vlans = []; diff --git a/nixos/tests/containers-ipv4.nix b/nixos/tests/containers-ipv4.nix index 821ce1cd07d2b..c4d954592ef02 100644 --- a/nixos/tests/containers-ipv4.nix +++ b/nixos/tests/containers-ipv4.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/containers-ipv6.nix b/nixos/tests/containers-ipv6.nix index f676ed122bb3a..7db389a18e726 100644 --- a/nixos/tests/containers-ipv6.nix +++ b/nixos/tests/containers-ipv6.nix @@ -12,7 +12,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/containers-macvlans.nix b/nixos/tests/containers-macvlans.nix index 390dc4ad2c29c..2bdb926a8e2b7 100644 --- a/nixos/tests/containers-macvlans.nix +++ b/nixos/tests/containers-macvlans.nix @@ -15,7 +15,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { machine1 = - { config, pkgs, lib, ... }: + { lib, ... }: { virtualisation.memorySize = 256; virtualisation.vlans = [ 1 ]; @@ -55,7 +55,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine2 = - { config, pkgs, ... }: + { ... }: { virtualisation.memorySize = 256; virtualisation.vlans = [ 1 ]; diff --git a/nixos/tests/containers-physical_interfaces.nix b/nixos/tests/containers-physical_interfaces.nix index bde8e175f9532..1e312f59f437e 100644 --- a/nixos/tests/containers-physical_interfaces.nix +++ b/nixos/tests/containers-physical_interfaces.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - server = { config, pkgs, ... }: + server = { ... }: { virtualisation.memorySize = 256; virtualisation.vlans = [ 1 ]; @@ -23,7 +23,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; }; - bridged = { config, pkgs, ... }: { + bridged = { ... }: { virtualisation.memorySize = 128; virtualisation.vlans = [ 1 ]; @@ -41,7 +41,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; - bonded = { config, pkgs, ... }: { + bonded = { ... }: { virtualisation.memorySize = 128; virtualisation.vlans = [ 1 ]; @@ -62,7 +62,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; - bridgedbond = { config, pkgs, ... }: { + bridgedbond = { ... }: { virtualisation.memorySize = 128; virtualisation.vlans = [ 1 ]; diff --git a/nixos/tests/containers-portforward.nix b/nixos/tests/containers-portforward.nix index 78cc445c2dd06..be83f82445edc 100644 --- a/nixos/tests/containers-portforward.nix +++ b/nixos/tests/containers-portforward.nix @@ -14,7 +14,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/containers-reloadable.nix b/nixos/tests/containers-reloadable.nix index 15862ac64c126..9726ca0cb0e76 100644 --- a/nixos/tests/containers-reloadable.nix +++ b/nixos/tests/containers-reloadable.nix @@ -21,11 +21,11 @@ in { }; nodes = { - client = { lib, pkgs, ... }: { + client = { ... }: { imports = [ client_base ]; }; - client_c1 = { lib, pkgs, ... }: { + client_c1 = { lib, ... }: { imports = [ client_base ]; containers.test1.config = { @@ -34,7 +34,7 @@ in { services.httpd.adminAddr = "nixos@example.com"; }; }; - client_c2 = { lib, pkgs, ... }: { + client_c2 = { lib, ... }: { imports = [ client_base ]; containers.test1.config = { diff --git a/nixos/tests/containers-restart_networking.nix b/nixos/tests/containers-restart_networking.nix index f68c9b07759b2..aeb0a6e68e216 100644 --- a/nixos/tests/containers-restart_networking.nix +++ b/nixos/tests/containers-restart_networking.nix @@ -17,7 +17,7 @@ let }; }; }; -in import ./make-test.nix ({ pkgs, lib, ...} : +in import ./make-test.nix ({ pkgs, ...} : { name = "containers-restart_networking"; meta = with pkgs.stdenv.lib.maintainers; { @@ -25,7 +25,7 @@ in import ./make-test.nix ({ pkgs, lib, ...} : }; nodes = { - client = { lib, pkgs, ... }: client_base // { + client = { lib, ... }: client_base // { virtualisation.vlans = [ 1 ]; networking.bridges.br0 = { @@ -38,7 +38,7 @@ in import ./make-test.nix ({ pkgs, lib, ...} : }; }; - client_eth1 = { lib, pkgs, ... }: client_base // { + client_eth1 = { lib, ... }: client_base // { networking.bridges.br0 = { interfaces = [ "eth1" ]; rstp = false; @@ -48,7 +48,7 @@ in import ./make-test.nix ({ pkgs, lib, ...} : br0.ipv4.addresses = [ { address = "192.168.1.2"; prefixLength = 24; } ]; }; }; - client_eth1_rstp = { lib, pkgs, ... }: client_base // { + client_eth1_rstp = { lib, ... }: client_base // { networking.bridges.br0 = { interfaces = [ "eth1" ]; rstp = true; diff --git a/nixos/tests/containers-tmpfs.nix b/nixos/tests/containers-tmpfs.nix index 873dd364369fb..05c21f4907bf5 100644 --- a/nixos/tests/containers-tmpfs.nix +++ b/nixos/tests/containers-tmpfs.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/installer/cd-dvd/channel.nix ]; virtualisation.writableStore = true; virtualisation.memorySize = 768; diff --git a/nixos/tests/couchdb.nix b/nixos/tests/couchdb.nix index a3f675236bc6f..48ea48eebbb31 100644 --- a/nixos/tests/couchdb.nix +++ b/nixos/tests/couchdb.nix @@ -10,14 +10,14 @@ with lib; nodes = { couchdb1 = - { pkgs, config, ... }: + { pkgs, ... }: { environment.systemPackages = with pkgs; [ jq ]; services.couchdb.enable = true; }; couchdb2 = - { pkgs, config, ... }: + { pkgs, ... }: { environment.systemPackages = with pkgs; [ jq ]; services.couchdb.enable = true; diff --git a/nixos/tests/deluge.nix b/nixos/tests/deluge.nix index 6119fd58447c1..b4be5e465cc03 100644 --- a/nixos/tests/deluge.nix +++ b/nixos/tests/deluge.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { server = - { pkgs, config, ... }: + { ... }: { services.deluge = { enable = true; diff --git a/nixos/tests/dnscrypt-proxy.nix b/nixos/tests/dnscrypt-proxy.nix index 1fcf3903b13e9..13bc9d3d9168d 100644 --- a/nixos/tests/dnscrypt-proxy.nix +++ b/nixos/tests/dnscrypt-proxy.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: { # A client running the recommended setup: DNSCrypt proxy as a forwarder # for a caching DNS client. client = - { config, pkgs, ... }: + { ... }: let localProxyPort = 43; in { security.apparmor.enable = true; diff --git a/nixos/tests/docker-edge.nix b/nixos/tests/docker-edge.nix index 38d25daff194c..b306c149be91a 100644 --- a/nixos/tests/docker-edge.nix +++ b/nixos/tests/docker-edge.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { docker = - { config, pkgs, ... }: + { pkgs, ... }: { virtualisation.docker.enable = true; virtualisation.docker.package = pkgs.docker-edge; diff --git a/nixos/tests/docker-registry.nix b/nixos/tests/docker-registry.nix index 1fbd199c7bc4f..8936421072a99 100644 --- a/nixos/tests/docker-registry.nix +++ b/nixos/tests/docker-registry.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - registry = { config, pkgs, ... }: { + registry = { ... }: { services.dockerRegistry.enable = true; services.dockerRegistry.enableDelete = true; services.dockerRegistry.port = 8080; @@ -16,12 +16,12 @@ import ./make-test.nix ({ pkgs, ...} : { networking.firewall.allowedTCPPorts = [ 8080 ]; }; - client1 = { config, pkgs, ...}: { + client1 = { ... }: { virtualisation.docker.enable = true; virtualisation.docker.extraOptions = "--insecure-registry registry:8080"; }; - client2 = { config, pkgs, ...}: { + client2 = { ... }: { virtualisation.docker.enable = true; virtualisation.docker.extraOptions = "--insecure-registry registry:8080"; }; diff --git a/nixos/tests/docker-tools-overlay.nix b/nixos/tests/docker-tools-overlay.nix index 9d7fa3e7a8c52..637957bd3e8b3 100644 --- a/nixos/tests/docker-tools-overlay.nix +++ b/nixos/tests/docker-tools-overlay.nix @@ -9,7 +9,7 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { docker = - { config, pkgs, ... }: + { ... }: { virtualisation.docker.enable = true; virtualisation.docker.storageDriver = "overlay"; # defaults to overlay2 diff --git a/nixos/tests/docker-tools.nix b/nixos/tests/docker-tools.nix index e2bcfbbd1f962..db4eacc37287f 100644 --- a/nixos/tests/docker-tools.nix +++ b/nixos/tests/docker-tools.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: { nodes = { docker = - { config, pkgs, ... }: { + { ... }: { virtualisation = { diskSize = 2048; docker.enable = true; diff --git a/nixos/tests/docker.nix b/nixos/tests/docker.nix index c6c8f4cdb5fb9..d67b2f8743d80 100644 --- a/nixos/tests/docker.nix +++ b/nixos/tests/docker.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { docker = - { config, pkgs, ... }: + { pkgs, ... }: { virtualisation.docker.enable = true; virtualisation.docker.package = pkgs.docker; diff --git a/nixos/tests/ecryptfs.nix b/nixos/tests/ecryptfs.nix index 041be0f5a6246..3f02cecb8662d 100644 --- a/nixos/tests/ecryptfs.nix +++ b/nixos/tests/ecryptfs.nix @@ -1,8 +1,8 @@ -import ./make-test.nix ({ pkgs, ... }: +import ./make-test.nix ({ ... }: { name = "ecryptfs"; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { imports = [ ./common/user-account.nix ]; boot.kernelModules = [ "ecryptfs" ]; security.pam.enableEcryptfs = true; diff --git a/nixos/tests/elk.nix b/nixos/tests/elk.nix index ed656b3628b9e..8dba7a905fa63 100644 --- a/nixos/tests/elk.nix +++ b/nixos/tests/elk.nix @@ -11,7 +11,7 @@ let }; nodes = { one = - { config, pkgs, ... }: { + { pkgs, ... }: { # Not giving the machine at least 2060MB results in elasticsearch failing with the following error: # # OpenJDK 64-Bit Server VM warning: diff --git a/nixos/tests/emacs-daemon.nix b/nixos/tests/emacs-daemon.nix index 466e772a881f3..3594e35e343c5 100644 --- a/nixos/tests/emacs-daemon.nix +++ b/nixos/tests/emacs-daemon.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { enableOCR = true; machine = - { config, pkgs, ... }: + { ... }: { imports = [ ./common/x11.nix ]; services.emacs = { diff --git a/nixos/tests/env.nix b/nixos/tests/env.nix index c6b0424e97b93..064c498204aec 100644 --- a/nixos/tests/env.nix +++ b/nixos/tests/env.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ nequissimus ]; }; - machine = { config, lib, pkgs, ... }: + machine = { pkgs, ... }: { boot.kernelPackages = pkgs.linuxPackages; environment.etc."plainFile".text = '' diff --git a/nixos/tests/etcd-cluster.nix b/nixos/tests/etcd-cluster.nix index 3971997a9bf79..3c4de5950a79f 100644 --- a/nixos/tests/etcd-cluster.nix +++ b/nixos/tests/etcd-cluster.nix @@ -102,7 +102,7 @@ in { }; nodes = { - node1 = { config, pkgs, nodes, ... }: { + node1 = { ... }: { require = [nodeConfig]; services.etcd = { initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"]; @@ -110,7 +110,7 @@ in { }; }; - node2 = { config, pkgs, ... }: { + node2 = { ... }: { require = [nodeConfig]; services.etcd = { initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380"]; @@ -118,7 +118,7 @@ in { }; }; - node3 = { config, pkgs, ... }: { + node3 = { ... }: { require = [nodeConfig]; services.etcd = { initialCluster = ["node1=https://node1:2380" "node2=https://node2:2380" "node3=https://node3:2380"]; diff --git a/nixos/tests/etcd.nix b/nixos/tests/etcd.nix index f8a6791a834f7..6c23b31779bc5 100644 --- a/nixos/tests/etcd.nix +++ b/nixos/tests/etcd.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... } : { }; nodes = { - node = { config, pkgs, nodes, ... }: { + node = { ... }: { services.etcd.enable = true; }; }; diff --git a/nixos/tests/ferm.nix b/nixos/tests/ferm.nix index bb7daae118c08..24b74df85ad1d 100644 --- a/nixos/tests/ferm.nix +++ b/nixos/tests/ferm.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { client = - { config, pkgs, ... }: + { pkgs, ... }: with pkgs.lib; { networking = { @@ -16,7 +16,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; server = - { config, pkgs, ... }: + { pkgs, ... }: with pkgs.lib; { networking = { diff --git a/nixos/tests/firefox.nix b/nixos/tests/firefox.nix index e1b628c914456..58a80243ea9c7 100644 --- a/nixos/tests/firefox.nix +++ b/nixos/tests/firefox.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ./common/x11.nix ]; environment.systemPackages = [ pkgs.firefox pkgs.xdotool ]; diff --git a/nixos/tests/firewall.nix b/nixos/tests/firewall.nix index 1119a5312eb5b..7207a880d8e2f 100644 --- a/nixos/tests/firewall.nix +++ b/nixos/tests/firewall.nix @@ -8,7 +8,7 @@ import ./make-test.nix ( { pkgs, ... } : { nodes = { walled = - { config, pkgs, nodes, ... }: + { ... }: { networking.firewall.enable = true; networking.firewall.logRefusedPackets = true; services.httpd.enable = true; @@ -20,13 +20,13 @@ import ./make-test.nix ( { pkgs, ... } : { # original walled configuration so that there is a change in the service # file. walled2 = - { config, pkgs, nodes, ... }: + { ... }: { networking.firewall.enable = true; networking.firewall.rejectPackets = true; }; attacker = - { config, pkgs, ... }: + { ... }: { services.httpd.enable = true; services.httpd.adminAddr = "foo@example.org"; networking.firewall.enable = false; diff --git a/nixos/tests/flannel.nix b/nixos/tests/flannel.nix index 7f27903a3026c..fb66fe282090e 100644 --- a/nixos/tests/flannel.nix +++ b/nixos/tests/flannel.nix @@ -17,7 +17,7 @@ import ./make-test.nix ({ pkgs, ...} : rec { networking.firewall.allowedUDPPorts = [ 8472 ]; }; in { - etcd = { config, pkgs, ... }: { + etcd = { ... }: { services = { etcd = { enable = true; @@ -31,11 +31,11 @@ import ./make-test.nix ({ pkgs, ...} : rec { networking.firewall.allowedTCPPorts = [ 2379 ]; }; - node1 = { config, ... }: { + node1 = { ... }: { require = [flannelConfig]; }; - node2 = { config, ... }: { + node2 = { ... }: { require = [flannelConfig]; }; }; diff --git a/nixos/tests/flatpak.nix b/nixos/tests/flatpak.nix index 9a5bdf0702173..096b37e6e2cb7 100644 --- a/nixos/tests/flatpak.nix +++ b/nixos/tests/flatpak.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ... }: maintainers = pkgs.flatpak.meta.maintainers; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { imports = [ ./common/x11.nix ]; services.xserver.desktopManager.gnome3.enable = true; # TODO: figure out minimal environment where the tests work environment.gnome3.excludePackages = pkgs.gnome3.optionalPackages; diff --git a/nixos/tests/fwupd.nix b/nixos/tests/fwupd.nix index bf4ef25130b3d..2e64149b2db3a 100644 --- a/nixos/tests/fwupd.nix +++ b/nixos/tests/fwupd.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ... }: { maintainers = pkgs.fwupd.meta.maintainers; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { services.fwupd.enable = true; environment.systemPackages = with pkgs; [ gnome-desktop-testing ]; environment.variables.XDG_DATA_DIRS = [ "${pkgs.fwupd.installedTests}/share" ]; diff --git a/nixos/tests/gitlab.nix b/nixos/tests/gitlab.nix index 7268636b62ad0..3af2cbcd09885 100644 --- a/nixos/tests/gitlab.nix +++ b/nixos/tests/gitlab.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - gitlab = { config, pkgs, ... }: { + gitlab = { ... }: { virtualisation.memorySize = 768; services.nginx = { diff --git a/nixos/tests/gitolite.nix b/nixos/tests/gitolite.nix index d4028efad1d89..690e456ed7c86 100644 --- a/nixos/tests/gitolite.nix +++ b/nixos/tests/gitolite.nix @@ -58,7 +58,7 @@ in nodes = { server = - { config, pkgs, lib, ... }: + { ... }: { services.gitolite = { enable = true; @@ -68,7 +68,7 @@ in }; client = - { config, pkgs, lib, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.git ]; programs.ssh.extraConfig = '' diff --git a/nixos/tests/gnome3-gdm.nix b/nixos/tests/gnome3-gdm.nix index 71ae1709d5264..1f590f337fd90 100644 --- a/nixos/tests/gnome3-gdm.nix +++ b/nixos/tests/gnome3-gdm.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { ... }: { imports = [ ./common/user-account.nix ]; diff --git a/nixos/tests/gnome3.nix b/nixos/tests/gnome3.nix index 591ed8600685f..3f51d04163a4f 100644 --- a/nixos/tests/gnome3.nix +++ b/nixos/tests/gnome3.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { ... }: { imports = [ ./common/user-account.nix ]; diff --git a/nixos/tests/gocd-agent.nix b/nixos/tests/gocd-agent.nix index 5cadff0899504..50470379576b1 100644 --- a/nixos/tests/gocd-agent.nix +++ b/nixos/tests/gocd-agent.nix @@ -17,7 +17,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { gocd_agent = - { config, pkgs, ... }: + { ... }: { virtualisation.memorySize = 2046; services.gocd-agent = { diff --git a/nixos/tests/gocd-server.nix b/nixos/tests/gocd-server.nix index b473d4ad61c79..80cf04ed64049 100644 --- a/nixos/tests/gocd-server.nix +++ b/nixos/tests/gocd-server.nix @@ -12,7 +12,7 @@ import ./make-test.nix ({ pkgs, ...} : nodes = { gocd_server = - { config, pkgs, ... }: + { ... }: { virtualisation.memorySize = 2046; services.gocd-server.enable = true; diff --git a/nixos/tests/grafana.nix b/nixos/tests/grafana.nix index d45776c3ee293..9dc765a879bcf 100644 --- a/nixos/tests/grafana.nix +++ b/nixos/tests/grafana.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ lib, ... }: maintainers = [ willibutz ]; }; - machine = { config, pkgs, ... }: { + machine = { ... }: { services.grafana = { enable = true; addr = "localhost"; diff --git a/nixos/tests/graphite.nix b/nixos/tests/graphite.nix index 5a1f50bd29b18..1fe4357191e3f 100644 --- a/nixos/tests/graphite.nix +++ b/nixos/tests/graphite.nix @@ -1,9 +1,9 @@ -import ./make-test.nix ({ pkgs, ...} : +import ./make-test.nix ({ ... } : { name = "graphite"; nodes = { one = - { config, pkgs, ... }: { + { ... }: { virtualisation.memorySize = 1024; time.timeZone = "UTC"; services.graphite = { diff --git a/nixos/tests/hadoop/hdfs.nix b/nixos/tests/hadoop/hdfs.nix index 4206c940c1afa..e7d72a56e1e7b 100644 --- a/nixos/tests/hadoop/hdfs.nix +++ b/nixos/tests/hadoop/hdfs.nix @@ -1,6 +1,6 @@ -import ../make-test.nix ({pkgs, ...}: { +import ../make-test.nix ({...}: { nodes = { - namenode = {pkgs, config, ...}: { + namenode = {pkgs, ...}: { services.hadoop = { package = pkgs.hadoop_3_1; hdfs.namenode.enabled = true; @@ -18,7 +18,7 @@ import ../make-test.nix ({pkgs, ...}: { 8020 # namenode.rpc-address ]; }; - datanode = {pkgs, config, ...}: { + datanode = {pkgs, ...}: { services.hadoop = { package = pkgs.hadoop_3_1; hdfs.datanode.enabled = true; diff --git a/nixos/tests/hadoop/yarn.nix b/nixos/tests/hadoop/yarn.nix index e97cc1acc902e..031592301f172 100644 --- a/nixos/tests/hadoop/yarn.nix +++ b/nixos/tests/hadoop/yarn.nix @@ -1,6 +1,6 @@ -import ../make-test.nix ({pkgs, ...}: { +import ../make-test.nix ({...}: { nodes = { - resourcemanager = {pkgs, config, ...}: { + resourcemanager = {pkgs, ...}: { services.hadoop.package = pkgs.hadoop_3_1; services.hadoop.yarn.resourcemanager.enabled = true; services.hadoop.yarnSite = { @@ -11,7 +11,7 @@ import ../make-test.nix ({pkgs, ...}: { 8031 # resourcemanager.resource-tracker.address ]; }; - nodemanager = {pkgs, config, ...}: { + nodemanager = {pkgs, ...}: { services.hadoop.package = pkgs.hadoop_3_1; services.hadoop.yarn.nodemanager.enabled = true; services.hadoop.yarnSite = { diff --git a/nixos/tests/haka.nix b/nixos/tests/haka.nix index 40548f34690f6..6277ebb4933fd 100644 --- a/nixos/tests/haka.nix +++ b/nixos/tests/haka.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { haka = - { config, pkgs, ... }: + { ... }: { services.haka.enable = true; }; diff --git a/nixos/tests/haproxy.nix b/nixos/tests/haproxy.nix index ce4094237db23..22a83e9d1eabf 100644 --- a/nixos/tests/haproxy.nix +++ b/nixos/tests/haproxy.nix @@ -1,7 +1,7 @@ import ./make-test.nix ({ pkgs, ...}: { name = "haproxy"; nodes = { - machine = { config, ...}: { + machine = { ... }: { imports = [ ../modules/profiles/minimal.nix ]; services.haproxy = { enable = true; diff --git a/nixos/tests/hardened.nix b/nixos/tests/hardened.nix index 0a0639d62796d..2700b8e5935a9 100644 --- a/nixos/tests/hardened.nix +++ b/nixos/tests/hardened.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, lib, pkgs, ... }: + { lib, pkgs, ... }: with lib; { users.users.alice = { isNormalUser = true; extraGroups = [ "proc" ]; }; users.users.sybil = { isNormalUser = true; group = "wheel"; }; diff --git a/nixos/tests/hibernate.nix b/nixos/tests/hibernate.nix index 3ae2bdffed90a..1f98bb739f210 100644 --- a/nixos/tests/hibernate.nix +++ b/nixos/tests/hibernate.nix @@ -16,7 +16,7 @@ import ./make-test.nix (pkgs: { systemd.services.listener.serviceConfig.ExecStart = "${pkgs.netcat}/bin/nc -l 4444 -k"; }; - probe = { config, lib, pkgs, ...}: { + probe = { pkgs, ...}: { environment.systemPackages = [ pkgs.netcat ]; }; }; diff --git a/nixos/tests/hitch/default.nix b/nixos/tests/hitch/default.nix index b024306cde56b..cb24c4dcffc24 100644 --- a/nixos/tests/hitch/default.nix +++ b/nixos/tests/hitch/default.nix @@ -4,7 +4,7 @@ import ../make-test.nix ({ pkgs, ... }: meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ jflanglois ]; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { environment.systemPackages = [ pkgs.curl ]; services.hitch = { enable = true; diff --git a/nixos/tests/hocker-fetchdocker/machine.nix b/nixos/tests/hocker-fetchdocker/machine.nix index 12c58a0122432..78343f0e02f0f 100644 --- a/nixos/tests/hocker-fetchdocker/machine.nix +++ b/nixos/tests/hocker-fetchdocker/machine.nix @@ -1,4 +1,4 @@ -{ config, pkgs, ... }: +{ pkgs, ... }: { nixpkgs.config.packageOverrides = pkgs': { hello-world-container = pkgs'.callPackage ./hello-world-container.nix { }; }; diff --git a/nixos/tests/home-assistant.nix b/nixos/tests/home-assistant.nix index 797706a062cae..0c027eaca6190 100644 --- a/nixos/tests/home-assistant.nix +++ b/nixos/tests/home-assistant.nix @@ -12,7 +12,7 @@ in { nodes = { hass = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = with pkgs; [ mosquitto diff --git a/nixos/tests/hound.nix b/nixos/tests/hound.nix index 82fd44e8e36fb..f21c0ad58a850 100644 --- a/nixos/tests/hound.nix +++ b/nixos/tests/hound.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ... } : { meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ grahamc ]; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { services.hound = { enable = true; config = '' diff --git a/nixos/tests/hydra/default.nix b/nixos/tests/hydra/default.nix index 74919444c16d6..98d99811f3c01 100644 --- a/nixos/tests/hydra/default.nix +++ b/nixos/tests/hydra/default.nix @@ -31,7 +31,7 @@ in { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { virtualisation.memorySize = 1024; diff --git a/nixos/tests/i3wm.nix b/nixos/tests/i3wm.nix index 4685992d7a053..245c17eedf7e2 100644 --- a/nixos/tests/i3wm.nix +++ b/nixos/tests/i3wm.nix @@ -4,14 +4,14 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ aszlig ]; }; - machine = { lib, pkgs, ... }: { + machine = { lib, ... }: { imports = [ ./common/x11.nix ./common/user-account.nix ]; services.xserver.displayManager.auto.user = "alice"; services.xserver.windowManager.default = lib.mkForce "i3"; services.xserver.windowManager.i3.enable = true; }; - testScript = { nodes, ... }: '' + testScript = { ... }: '' $machine->waitForX; $machine->waitForFile("/home/alice/.Xauthority"); $machine->succeed("xauth merge ~alice/.Xauthority"); diff --git a/nixos/tests/influxdb.nix b/nixos/tests/influxdb.nix index ee126091667a9..440049d951117 100644 --- a/nixos/tests/influxdb.nix +++ b/nixos/tests/influxdb.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - one = { config, pkgs, ... }: { + one = { ... }: { services.influxdb.enable = true; }; }; diff --git a/nixos/tests/initrd-network-ssh/default.nix b/nixos/tests/initrd-network-ssh/default.nix index b1f3d147e8626..b2209f297a4f8 100644 --- a/nixos/tests/initrd-network-ssh/default.nix +++ b/nixos/tests/initrd-network-ssh/default.nix @@ -1,4 +1,4 @@ -import ../make-test.nix ({ pkgs, lib, ... }: +import ../make-test.nix ({ lib, ... }: { name = "initrd-network-ssh"; @@ -8,7 +8,7 @@ import ../make-test.nix ({ pkgs, lib, ... }: nodes = with lib; rec { server = - { config, pkgs, ... }: + { config, ... }: { boot.kernelParams = [ "ip=${config.networking.primaryIPAddress}:::255.255.255.0::eth1:none" @@ -33,7 +33,7 @@ import ../make-test.nix ({ pkgs, lib, ... }: }; client = - { config, pkgs, ... }: + { config, ... }: { environment.etc.knownHosts = { text = concatStrings [ diff --git a/nixos/tests/initrd-network.nix b/nixos/tests/initrd-network.nix index db9f572d3c2f6..ed9b82e2da773 100644 --- a/nixos/tests/initrd-network.nix +++ b/nixos/tests/initrd-network.nix @@ -3,7 +3,7 @@ import ./make-test.nix ({ pkgs, ...} : { meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ]; - machine = { config, pkgs, ... }: { + machine = { ... }: { imports = [ ../modules/profiles/minimal.nix ]; boot.initrd.network.enable = true; boot.initrd.network.postCommands = diff --git a/nixos/tests/installer.nix b/nixos/tests/installer.nix index 96230940e8731..2455b9152bd9e 100644 --- a/nixos/tests/installer.nix +++ b/nixos/tests/installer.nix @@ -203,7 +203,7 @@ let # The configuration of the machine used to run "nixos-install". machine = - { config, lib, pkgs, ... }: + { pkgs, ... }: { imports = [ ../modules/profiles/installation-device.nix diff --git a/nixos/tests/ipfs.nix b/nixos/tests/ipfs.nix index c6bc61545245c..3cff7e99ff887 100644 --- a/nixos/tests/ipfs.nix +++ b/nixos/tests/ipfs.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { adder = - { config, pkgs, ... }: + { ... }: { services.ipfs = { enable = true; @@ -18,7 +18,7 @@ import ./make-test.nix ({ pkgs, ...} : { networking.firewall.allowedTCPPorts = [ 4001 ]; }; getter = - { config, pkgs, ... }: + { ... }: { services.ipfs = { enable = true; diff --git a/nixos/tests/ipv6.nix b/nixos/tests/ipv6.nix index 7a98fd85cfda9..97f348a9beebe 100644 --- a/nixos/tests/ipv6.nix +++ b/nixos/tests/ipv6.nix @@ -8,17 +8,17 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = - { client = { config, pkgs, ... }: { }; + { client = { ... }: { }; server = - { config, pkgs, ... }: + { ... }: { services.httpd.enable = true; services.httpd.adminAddr = "foo@example.org"; networking.firewall.allowedTCPPorts = [ 80 ]; }; router = - { config, pkgs, ... }: + { ... }: { services.radvd.enable = true; services.radvd.config = '' diff --git a/nixos/tests/jenkins.nix b/nixos/tests/jenkins.nix index 25629efbfa490..4f2d2085cd1a9 100644 --- a/nixos/tests/jenkins.nix +++ b/nixos/tests/jenkins.nix @@ -12,7 +12,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { master = - { config, pkgs, ... }: + { ... }: { services.jenkins.enable = true; # should have no effect @@ -24,7 +24,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; slave = - { config, pkgs, ... }: + { ... }: { services.jenkinsSlave.enable = true; users.users.jenkins.extraGroups = [ "users" ]; diff --git a/nixos/tests/kafka.nix b/nixos/tests/kafka.nix index e48b25d67df39..c9fd74620efb1 100644 --- a/nixos/tests/kafka.nix +++ b/nixos/tests/kafka.nix @@ -10,7 +10,7 @@ let }; nodes = { - zookeeper1 = { config, ... }: { + zookeeper1 = { ... }: { services.zookeeper = { enable = true; }; @@ -18,7 +18,7 @@ let networking.firewall.allowedTCPPorts = [ 2181 ]; virtualisation.memorySize = 1024; }; - kafka = { config, ... }: { + kafka = { ... }: { services.apache-kafka = { enable = true; extraProperties = '' diff --git a/nixos/tests/kernel-copperhead.nix b/nixos/tests/kernel-copperhead.nix index aa133c9b0aa7a..652fbf055373e 100644 --- a/nixos/tests/kernel-copperhead.nix +++ b/nixos/tests/kernel-copperhead.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ nequissimus ]; }; - machine = { config, lib, pkgs, ... }: + machine = { pkgs, ... }: { boot.kernelPackages = pkgs.linuxPackages_copperhead_lts; }; diff --git a/nixos/tests/kernel-latest.nix b/nixos/tests/kernel-latest.nix index 1350426654d70..f30bd2e2e7605 100644 --- a/nixos/tests/kernel-latest.nix +++ b/nixos/tests/kernel-latest.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ nequissimus ]; }; - machine = { config, lib, pkgs, ... }: + machine = { pkgs, ... }: { boot.kernelPackages = pkgs.linuxPackages_latest; }; diff --git a/nixos/tests/kernel-lts.nix b/nixos/tests/kernel-lts.nix index 2aab4ce0b49e1..28717fa6a8448 100644 --- a/nixos/tests/kernel-lts.nix +++ b/nixos/tests/kernel-lts.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ nequissimus ]; }; - machine = { config, lib, pkgs, ... }: + machine = { pkgs, ... }: { boot.kernelPackages = pkgs.linuxPackages; }; diff --git a/nixos/tests/kexec.nix b/nixos/tests/kexec.nix index 0f5ddef7b1aae..db596189d46d0 100644 --- a/nixos/tests/kexec.nix +++ b/nixos/tests/kexec.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ eelco chaoflow ]; }; - machine = { config, pkgs, ... }: + machine = { ... }: { virtualisation.vlans = [ ]; }; testScript = diff --git a/nixos/tests/krb5/deprecated-config.nix b/nixos/tests/krb5/deprecated-config.nix index 980b3e762dc6c..7d7926309c95b 100644 --- a/nixos/tests/krb5/deprecated-config.nix +++ b/nixos/tests/krb5/deprecated-config.nix @@ -8,7 +8,7 @@ import ../make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: { + { ... }: { krb5 = { enable = true; defaultRealm = "ATHENA.MIT.EDU"; diff --git a/nixos/tests/krb5/example-config.nix b/nixos/tests/krb5/example-config.nix index d5328720931e8..f01cf6988eef7 100644 --- a/nixos/tests/krb5/example-config.nix +++ b/nixos/tests/krb5/example-config.nix @@ -8,7 +8,7 @@ import ../make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: { + { pkgs, ... }: { krb5 = { enable = true; kerberos = pkgs.krb5Full; diff --git a/nixos/tests/kubernetes/certs.nix b/nixos/tests/kubernetes/certs.nix index 520c728b65ee2..85e92f6330c90 100644 --- a/nixos/tests/kubernetes/certs.nix +++ b/nixos/tests/kubernetes/certs.nix @@ -1,9 +1,9 @@ { pkgs ? import <nixpkgs> {}, - internalDomain ? "cloud.yourdomain.net", externalDomain ? "myawesomecluster.cluster.yourdomain.net", serviceClusterIp ? "10.0.0.1", - kubelets + kubelets, + ... }: let runWithCFSSL = name: cmd: diff --git a/nixos/tests/kubernetes/dns.nix b/nixos/tests/kubernetes/dns.nix index 8c488d271bcd2..30e1acd255a08 100644 --- a/nixos/tests/kubernetes/dns.nix +++ b/nixos/tests/kubernetes/dns.nix @@ -60,7 +60,7 @@ let config.Entrypoint = "/bin/tail"; }; - extraConfiguration = { config, pkgs, lib, nodes, ... }: { + extraConfiguration = { config, pkgs, ... }: { environment.systemPackages = [ pkgs.bind.host ]; # virtualisation.docker.extraOptions = "--dns=${config.services.kubernetes.addons.dns.clusterIp}"; services.dnsmasq.enable = true; diff --git a/nixos/tests/ldap.nix b/nixos/tests/ldap.nix index b39f4124c958a..035a819241748 100644 --- a/nixos/tests/ldap.nix +++ b/nixos/tests/ldap.nix @@ -37,7 +37,7 @@ let memberUid: ${ldapUser} ''; mkClient = useDaemon: - { config, pkgs, lib, ... }: + { lib, ... }: { virtualisation.memorySize = 256; virtualisation.vlans = [ 1 ]; @@ -61,7 +61,7 @@ in nodes = { server = - { config, pkgs, lib, ... }: + { pkgs, ... }: { virtualisation.memorySize = 256; virtualisation.vlans = [ 1 ]; diff --git a/nixos/tests/lightdm.nix b/nixos/tests/lightdm.nix index d2b561fa67b4c..8a9a7408d2929 100644 --- a/nixos/tests/lightdm.nix +++ b/nixos/tests/lightdm.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ aszlig ]; }; - machine = { lib, ... }: { + machine = { ... }: { imports = [ ./common/user-account.nix ]; services.xserver.enable = true; services.xserver.displayManager.lightdm.enable = true; diff --git a/nixos/tests/login.nix b/nixos/tests/login.nix index a6a460fb0a7d7..3dbb494b68957 100644 --- a/nixos/tests/login.nix +++ b/nixos/tests/login.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, latestKernel ? false, ... }: }; machine = - { config, pkgs, lib, ... }: + { pkgs, lib, ... }: { boot.kernelPackages = lib.mkIf latestKernel pkgs.linuxPackages_latest; }; diff --git a/nixos/tests/mathics.nix b/nixos/tests/mathics.nix index 310b751b4d844..fcbeeb18a7271 100644 --- a/nixos/tests/mathics.nix +++ b/nixos/tests/mathics.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; nodes = { - machine = { config, pkgs, ... }: { + machine = { ... }: { services.mathics.enable = true; services.mathics.port = 8888; }; diff --git a/nixos/tests/memcached.nix b/nixos/tests/memcached.nix index f9ef3647bd1a3..b120599c51dd8 100644 --- a/nixos/tests/memcached.nix +++ b/nixos/tests/memcached.nix @@ -3,7 +3,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { machine = - { config, pkgs, ... }: + { ... }: { imports = [ ../modules/profiles/minimal.nix ]; services.memcached.enable = true; diff --git a/nixos/tests/mesos.nix b/nixos/tests/mesos.nix index 007d7ac216039..3ceb1d8125b20 100644 --- a/nixos/tests/mesos.nix +++ b/nixos/tests/mesos.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : rec { }; nodes = { - master = { config, pkgs, ... }: { + master = { ... }: { networking.firewall.enable = false; services.zookeeper.enable = true; services.mesos.master = { @@ -14,7 +14,7 @@ import ./make-test.nix ({ pkgs, ...} : rec { }; }; - slave = { config, pkgs, ... }: { + slave = { ... }: { networking.firewall.enable = false; networking.nat.enable = true; virtualisation.docker.enable = true; diff --git a/nixos/tests/minio.nix b/nixos/tests/minio.nix index 07a292a9baa57..40a599546650a 100644 --- a/nixos/tests/minio.nix +++ b/nixos/tests/minio.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { services.minio = { enable = true; accessKey = "BKIKJAA5BMMU2RHO6IBB"; diff --git a/nixos/tests/misc.nix b/nixos/tests/misc.nix index 179c95e764366..b0bc1d083b16d 100644 --- a/nixos/tests/misc.nix +++ b/nixos/tests/misc.nix @@ -9,7 +9,7 @@ import ./make-test.nix ({ pkgs, ...} : rec { foo = pkgs.writeText "foo" "Hello World"; machine = - { config, lib, pkgs, ... }: + { lib, ... }: with lib; { swapDevices = mkOverride 0 [ { device = "/root/swapfile"; size = 128; } ]; diff --git a/nixos/tests/mongodb.nix b/nixos/tests/mongodb.nix index 18535f51af9b3..2f380ff543e97 100644 --- a/nixos/tests/mongodb.nix +++ b/nixos/tests/mongodb.nix @@ -13,7 +13,7 @@ in { nodes = { one = - { config, pkgs, ... }: + { ... }: { services = { mongodb.enable = true; diff --git a/nixos/tests/morty.nix b/nixos/tests/morty.nix index 0a5324259ada9..eab123bd50f86 100644 --- a/nixos/tests/morty.nix +++ b/nixos/tests/morty.nix @@ -9,7 +9,7 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { mortyProxyWithKey = - { config, pkgs, ... }: + { ... }: { services.morty = { enable = true; key = "78a9cd0cfee20c672f78427efb2a2a96036027f0"; @@ -20,7 +20,7 @@ import ./make-test.nix ({ pkgs, ... }: }; testScript = - { nodes , ... }: + { ... }: '' $mortyProxyWithKey->waitForUnit("default.target"); diff --git a/nixos/tests/mpd.nix b/nixos/tests/mpd.nix index 2950a8d809d6e..ac2b810defe36 100644 --- a/nixos/tests/mpd.nix +++ b/nixos/tests/mpd.nix @@ -47,10 +47,10 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { client = - { config, pkgs, ... }: { }; + { ... }: { }; serverALSA = - { config, pkgs, ... }: (mkServer { + { ... }: (mkServer { mpd = defaultMpdCfg // { network.listenAddress = "any"; extraConfig = '' @@ -66,7 +66,7 @@ import ./make-test.nix ({ pkgs, ... }: }) // { networking.firewall.allowedTCPPorts = [ 6600 ]; }; serverPulseAudio = - { config, pkgs, ... }: (mkServer { + { ... }: (mkServer { mpd = defaultMpdCfg // { extraConfig = '' audio_output { diff --git a/nixos/tests/mumble.nix b/nixos/tests/mumble.nix index 7959b85a0cf00..8146453bfd551 100644 --- a/nixos/tests/mumble.nix +++ b/nixos/tests/mumble.nix @@ -1,7 +1,7 @@ import ./make-test.nix ({ pkgs, ...} : let - client = { config, pkgs, ... }: { + client = { pkgs, ... }: { imports = [ ./common/x11.nix ]; environment.systemPackages = [ pkgs.mumble ]; }; @@ -13,7 +13,7 @@ in }; nodes = { - server = { config, pkgs, ... }: { + server = { config, ... }: { services.murmur.enable = true; services.murmur.registerName = "NixOS tests"; networking.firewall.allowedTCPPorts = [ config.services.murmur.port ]; diff --git a/nixos/tests/munin.nix b/nixos/tests/munin.nix index 40fafc625146a..eb91d4d630bc8 100644 --- a/nixos/tests/munin.nix +++ b/nixos/tests/munin.nix @@ -9,7 +9,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { one = - { config, pkgs, ... }: + { config, ... }: { services = { munin-node.enable = true; diff --git a/nixos/tests/mutable-users.nix b/nixos/tests/mutable-users.nix index 4f11a4b836690..e590703ab2f48 100644 --- a/nixos/tests/mutable-users.nix +++ b/nixos/tests/mutable-users.nix @@ -7,10 +7,10 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - machine = { config, lib, pkgs, ... }: { + machine = { ... }: { users.mutableUsers = false; }; - mutable = { config, lib, pkgs, ... }: { + mutable = { ... }: { users.mutableUsers = true; }; }; diff --git a/nixos/tests/mysql-backup.nix b/nixos/tests/mysql-backup.nix index ff3650988836d..81482dfef7e56 100644 --- a/nixos/tests/mysql-backup.nix +++ b/nixos/tests/mysql-backup.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ... } : { }; nodes = { - master = { config, pkgs, ... }: { + master = { pkgs, ... }: { services.mysql = { enable = true; initialDatabases = [ { name = "testdb"; schema = ./testdb.sql; } ]; diff --git a/nixos/tests/mysql-replication.nix b/nixos/tests/mysql-replication.nix index ed09ac10b75d4..84d70cf352464 100644 --- a/nixos/tests/mysql-replication.nix +++ b/nixos/tests/mysql-replication.nix @@ -13,7 +13,7 @@ in nodes = { master = - { pkgs, config, ... }: + { pkgs, ... }: { services.mysql.enable = true; @@ -27,7 +27,7 @@ in }; slave1 = - { pkgs, config, nodes, ... }: + { pkgs, nodes, ... }: { services.mysql.enable = true; @@ -40,7 +40,7 @@ in }; slave2 = - { pkgs, config, nodes, ... }: + { pkgs, nodes, ... }: { services.mysql.enable = true; diff --git a/nixos/tests/mysql.nix b/nixos/tests/mysql.nix index c18fee6c74959..7251c4a86499f 100644 --- a/nixos/tests/mysql.nix +++ b/nixos/tests/mysql.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { master = - { pkgs, config, ... }: + { pkgs, ... }: { services.mysql.enable = true; diff --git a/nixos/tests/nat.nix b/nixos/tests/nat.nix index 7057158a829bb..9c280fe8b5b66 100644 --- a/nixos/tests/nat.nix +++ b/nixos/tests/nat.nix @@ -30,7 +30,7 @@ import ./make-test.nix ({ pkgs, lib, withFirewall, withConntrackHelpers ? false, nodes = { client = - { config, pkgs, nodes, ... }: + { pkgs, nodes, ... }: lib.mkMerge [ { virtualisation.vlans = [ 1 ]; networking.firewall.allowPing = true; @@ -44,19 +44,19 @@ import ./make-test.nix ({ pkgs, lib, withFirewall, withConntrackHelpers ? false, ]; router = - { config, pkgs, ... }: lib.mkMerge [ + { ... }: lib.mkMerge [ routerBase { networking.nat.enable = true; } ]; routerDummyNoNat = - { config, pkgs, ... }: lib.mkMerge [ + { ... }: lib.mkMerge [ routerBase { networking.nat.enable = false; } ]; server = - { config, pkgs, ... }: + { ... }: { virtualisation.vlans = [ 2 ]; networking.firewall.enable = false; services.httpd.enable = true; diff --git a/nixos/tests/netdata.nix b/nixos/tests/netdata.nix index 58733c1b3379b..c56506ba28744 100644 --- a/nixos/tests/netdata.nix +++ b/nixos/tests/netdata.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { netdata = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = with pkgs; [ curl jq ]; services.netdata.enable = true; diff --git a/nixos/tests/networking-proxy.nix b/nixos/tests/networking-proxy.nix index 4c57257314044..ab908c96e5eea 100644 --- a/nixos/tests/networking-proxy.nix +++ b/nixos/tests/networking-proxy.nix @@ -19,13 +19,13 @@ in import ./make-test.nix ({ pkgs, ...} : { nodes = { # no proxy machine = - { config, pkgs, ... }: + { ... }: default-config; # proxy default machine2 = - { config, pkgs, ... }: + { ... }: default-config // { networking.proxy.default = "http://user:pass@host:port"; @@ -33,7 +33,7 @@ in import ./make-test.nix ({ pkgs, ...} : { # specific proxy options machine3 = - { config, pkgs, ... }: + { ... }: default-config // { @@ -51,7 +51,7 @@ in import ./make-test.nix ({ pkgs, ...} : { # mix default + proxy options machine4 = - { config, pkgs, ... }: + { ... }: default-config // { networking.proxy = { diff --git a/nixos/tests/networking.nix b/nixos/tests/networking.nix index 5cb40af5799e4..cd5d537a3be74 100644 --- a/nixos/tests/networking.nix +++ b/nixos/tests/networking.nix @@ -81,7 +81,7 @@ let static = { name = "Static"; nodes.router = router; - nodes.client = { config, pkgs, ... }: with pkgs.lib; { + nodes.client = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 2 ]; networking = { useNetworkd = networkd; @@ -98,7 +98,7 @@ let ]; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -134,7 +134,7 @@ let dhcpSimple = { name = "SimpleDHCP"; nodes.router = router; - nodes.client = { config, pkgs, ... }: with pkgs.lib; { + nodes.client = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 2 ]; networking = { useNetworkd = networkd; @@ -150,7 +150,7 @@ let }; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -189,7 +189,7 @@ let dhcpOneIf = { name = "OneInterfaceDHCP"; nodes.router = router; - nodes.client = { config, pkgs, ... }: with pkgs.lib; { + nodes.client = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 2 ]; networking = { useNetworkd = networkd; @@ -202,7 +202,7 @@ let interfaces.eth2.ipv4.addresses = mkOverride 0 [ ]; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -229,7 +229,7 @@ let ''; }; bond = let - node = address: { config, pkgs, ... }: with pkgs.lib; { + node = address: { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 2 ]; networking = { useNetworkd = networkd; @@ -249,7 +249,7 @@ let name = "Bond"; nodes.client1 = node "192.168.1.1"; nodes.client2 = node "192.168.1.2"; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -266,7 +266,7 @@ let ''; }; bridge = let - node = { address, vlan }: { config, pkgs, ... }: with pkgs.lib; { + node = { address, vlan }: { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ vlan ]; networking = { useNetworkd = networkd; @@ -280,7 +280,7 @@ let name = "Bridge"; nodes.client1 = node { address = "192.168.1.2"; vlan = 1; }; nodes.client2 = node { address = "192.168.1.3"; vlan = 2; }; - nodes.router = { config, pkgs, ... }: with pkgs.lib; { + nodes.router = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 2 ]; networking = { useNetworkd = networkd; @@ -293,7 +293,7 @@ let [ { address = "192.168.1.1"; prefixLength = 24; } ]; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -319,7 +319,7 @@ let macvlan = { name = "MACVLAN"; nodes.router = router; - nodes.client = { config, pkgs, ... }: with pkgs.lib; { + nodes.client = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 ]; networking = { useNetworkd = networkd; @@ -329,7 +329,7 @@ let interfaces.eth1.ipv4.addresses = mkOverride 0 [ ]; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -356,7 +356,7 @@ let ''; }; sit = let - node = { address4, remote, address6 }: { config, pkgs, ... }: with pkgs.lib; { + node = { address4, remote, address6 }: { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 ]; networking = { useNetworkd = networkd; @@ -377,7 +377,7 @@ let name = "Sit"; nodes.client1 = node { address4 = "192.168.1.1"; remote = "192.168.1.2"; address6 = "fc00::1"; }; nodes.client2 = node { address4 = "192.168.1.2"; remote = "192.168.1.1"; address6 = "fc00::2"; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -398,7 +398,7 @@ let ''; }; vlan = let - node = address: { config, pkgs, ... }: with pkgs.lib; { + node = address: { pkgs, ... }: with pkgs.lib; { #virtualisation.vlans = [ 1 ]; networking = { useNetworkd = networkd; @@ -418,7 +418,7 @@ let name = "vlan"; nodes.client1 = node "192.168.1.1"; nodes.client2 = node "192.168.1.2"; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; @@ -476,7 +476,7 @@ let }; privacy = { name = "Privacy"; - nodes.router = { config, pkgs, ... }: { + nodes.router = { ... }: { virtualisation.vlans = [ 1 ]; boot.kernel.sysctl."net.ipv6.conf.all.forwarding" = true; networking = { @@ -502,7 +502,7 @@ let ''; }; }; - nodes.client = { config, pkgs, ... }: with pkgs.lib; { + nodes.client = { pkgs, ... }: with pkgs.lib; { virtualisation.vlans = [ 1 ]; networking = { useNetworkd = networkd; @@ -514,7 +514,7 @@ let }; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' startAll; diff --git a/nixos/tests/nexus.nix b/nixos/tests/nexus.nix index be8862018777b..bf49d2247bd86 100644 --- a/nixos/tests/nexus.nix +++ b/nixos/tests/nexus.nix @@ -12,7 +12,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { server = - { config, pkgs, ... }: + { ... }: { virtualisation.memorySize = 2047; # qemu-system-i386 has a 2047M limit virtualisation.diskSize = 2048; diff --git a/nixos/tests/nfs.nix b/nixos/tests/nfs.nix index 6ed1995f262a2..1992f240e7b00 100644 --- a/nixos/tests/nfs.nix +++ b/nixos/tests/nfs.nix @@ -3,7 +3,7 @@ import ./make-test.nix ({ pkgs, version ? 4, ... }: let client = - { config, pkgs, ... }: + { pkgs, ... }: { fileSystems = pkgs.lib.mkVMOverride [ { mountPoint = "/data"; device = "server:/data"; @@ -27,7 +27,7 @@ in client2 = client; server = - { config, pkgs, ... }: + { ... }: { services.nfs.server.enable = true; services.nfs.server.exports = '' diff --git a/nixos/tests/nginx.nix b/nixos/tests/nginx.nix index 7f7bc0f0b4fe1..32b113649237a 100644 --- a/nixos/tests/nginx.nix +++ b/nixos/tests/nginx.nix @@ -10,7 +10,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { webserver = - { config, pkgs, ... }: + { ... }: { services.nginx.enable = true; services.nginx.commonHttpConfig = '' log_format ceeformat '@cee: {"status":"$status",' diff --git a/nixos/tests/novacomd.nix b/nixos/tests/novacomd.nix index 21b86f6dae279..2b56aee0a2e7a 100644 --- a/nixos/tests/novacomd.nix +++ b/nixos/tests/novacomd.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ dtzWill ]; }; - machine = { config, pkgs, ... }: { + machine = { ... }: { services.novacomd.enable = true; }; diff --git a/nixos/tests/openssh.nix b/nixos/tests/openssh.nix index 230b452068472..c66b90b802d53 100644 --- a/nixos/tests/openssh.nix +++ b/nixos/tests/openssh.nix @@ -11,7 +11,7 @@ in { nodes = { server = - { config, pkgs, ... }: + { ... }: { services.openssh.enable = true; @@ -23,7 +23,7 @@ in { }; server_lazy = - { config, pkgs, ... }: + { ... }: { services.openssh = { enable = true; startWhenNeeded = true; }; @@ -35,7 +35,7 @@ in { }; client = - { config, pkgs, ... }: { }; + { ... }: { }; }; diff --git a/nixos/tests/owncloud.nix b/nixos/tests/owncloud.nix index 0dcdea40b0646..c968569f2008c 100644 --- a/nixos/tests/owncloud.nix +++ b/nixos/tests/owncloud.nix @@ -1,10 +1,10 @@ -import ./make-test.nix ({ pkgs, ... }: +import ./make-test.nix ({ ... }: { name = "owncloud"; nodes = { web = - { config, pkgs, ... }: + { ... }: { services.postgresql.enable = true; services.httpd = { diff --git a/nixos/tests/pam-oath-login.nix b/nixos/tests/pam-oath-login.nix index 9f40ecfe865f1..b9d489950e722 100644 --- a/nixos/tests/pam-oath-login.nix +++ b/nixos/tests/pam-oath-login.nix @@ -1,4 +1,4 @@ -import ./make-test.nix ({ pkgs, latestKernel ? false, ... }: +import ./make-test.nix ({ ... }: let oathSnakeoilSecret = "cdd4083ef8ff1fa9178c6d46bfb1a3"; @@ -22,7 +22,7 @@ in name = "pam-oath-login"; machine = - { config, pkgs, lib, ... }: + { ... }: { security.pam.oath = { enable = true; diff --git a/nixos/tests/partition.nix b/nixos/tests/partition.nix index 291d9b278d3b1..01a08995950f6 100644 --- a/nixos/tests/partition.nix +++ b/nixos/tests/partition.nix @@ -65,7 +65,7 @@ let in { name = "partitiion"; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { environment.systemPackages = [ pkgs.pythonPackages.nixpart0 pkgs.file pkgs.btrfs-progs pkgs.xfsprogs pkgs.lvm2 diff --git a/nixos/tests/peerflix.nix b/nixos/tests/peerflix.nix index eb729f22f913e..fae37fedaac78 100644 --- a/nixos/tests/peerflix.nix +++ b/nixos/tests/peerflix.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { peerflix = - { config, pkgs, ... }: + { ... }: { services.peerflix.enable = true; }; diff --git a/nixos/tests/pgjwt.nix b/nixos/tests/pgjwt.nix index d186c42a2a98e..a2d81288c8122 100644 --- a/nixos/tests/pgjwt.nix +++ b/nixos/tests/pgjwt.nix @@ -14,7 +14,7 @@ with pkgs; { }; nodes = { - master = { pkgs, config, ... }: + master = { ... }: { services.postgresql = { enable = true; diff --git a/nixos/tests/phabricator.nix b/nixos/tests/phabricator.nix index fdc39393faeaf..20b3b838aba83 100644 --- a/nixos/tests/phabricator.nix +++ b/nixos/tests/phabricator.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ... }: { nodes = { storage = - { config, pkgs, ... }: + { ... }: { services.nfs.server.enable = true; services.nfs.server.exports = '' /repos 192.168.1.0/255.255.255.0(rw,no_root_squash) @@ -15,7 +15,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; webserver = - { config, pkgs, ... }: + { pkgs, ... }: { fileSystems = pkgs.lib.mkVMOverride [ { mountPoint = "/repos"; device = "storage:/repos"; @@ -52,7 +52,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; client = - { config, pkgs, ... }: + { ... }: { imports = [ ./common/x11.nix ]; services.xserver.desktopManager.plasma5.enable = true; }; diff --git a/nixos/tests/php-pcre.nix b/nixos/tests/php-pcre.nix index f618a39a22931..19bde9babad5d 100644 --- a/nixos/tests/php-pcre.nix +++ b/nixos/tests/php-pcre.nix @@ -1,9 +1,9 @@ let testString = "can-use-subgroups"; in -import ./make-test.nix ({ pkgs, ...}: { +import ./make-test.nix ({ ...}: { name = "php-httpd-pcre-jit-test"; - machine = { config, lib, pkgs, ... }: { + machine = { lib, pkgs, ... }: { time.timeZone = "UTC"; services.httpd = { enable = true; @@ -34,7 +34,7 @@ import ./make-test.nix ({ pkgs, ...}: { }; }; }; - testScript = { nodes, ... }: + testScript = { ... }: '' $machine->waitForUnit('httpd.service'); # Ensure php evaluation by matching on the var_dump syntax diff --git a/nixos/tests/plasma5.nix b/nixos/tests/plasma5.nix index e479d3f1cb8f0..eb705536827e7 100644 --- a/nixos/tests/plasma5.nix +++ b/nixos/tests/plasma5.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : maintainers = [ ttuegel ]; }; - machine = { lib, ... }: + machine = { ... }: let sddm_theme = pkgs.stdenv.mkDerivation { name = "breeze-ocr-theme"; diff --git a/nixos/tests/plotinus.nix b/nixos/tests/plotinus.nix index 9058c59c92dee..609afe7b2145f 100644 --- a/nixos/tests/plotinus.nix +++ b/nixos/tests/plotinus.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ./common/x11.nix ]; programs.plotinus.enable = true; diff --git a/nixos/tests/postgis.nix b/nixos/tests/postgis.nix index 7fe905eb4254f..f8b63c5b6a27b 100644 --- a/nixos/tests/postgis.nix +++ b/nixos/tests/postgis.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { master = - { pkgs, config, ... }: + { pkgs, ... }: { services.postgresql = let mypg = pkgs.postgresql100; in { diff --git a/nixos/tests/postgresql.nix b/nixos/tests/postgresql.nix index 2381939552e23..f1f09277f342a 100644 --- a/nixos/tests/postgresql.nix +++ b/nixos/tests/postgresql.nix @@ -22,7 +22,7 @@ let maintainers = [ zagy ]; }; - machine = {pkgs, config, ...}: + machine = {...}: { services.postgresql.package=postgresql-package; services.postgresql.enable = true; diff --git a/nixos/tests/powerdns.nix b/nixos/tests/powerdns.nix index 0d5b0f715f52b..8addcc784012d 100644 --- a/nixos/tests/powerdns.nix +++ b/nixos/tests/powerdns.nix @@ -1,7 +1,7 @@ import ./make-test.nix ({ pkgs, ... }: { name = "powerdns"; - nodes.server = { config, pkgs, ... }: { + nodes.server = { ... }: { services.powerdns.enable = true; }; diff --git a/nixos/tests/predictable-interface-names.nix b/nixos/tests/predictable-interface-names.nix index 0b431034a7a92..0d73436c1c3f5 100644 --- a/nixos/tests/predictable-interface-names.nix +++ b/nixos/tests/predictable-interface-names.nix @@ -9,7 +9,7 @@ in pkgs.lib.listToAttrs (pkgs.lib.crossLists (predictable: withNetworkd: { name = "${if predictable then "" else "un"}predictableInterfaceNames${if withNetworkd then "-with-networkd" else ""}"; meta = {}; - machine = { config, lib, ... }: { + machine = { lib, ... }: { networking.usePredictableInterfaceNames = lib.mkForce predictable; networking.useNetworkd = withNetworkd; networking.dhcpcd.enable = !withNetworkd; diff --git a/nixos/tests/printing.nix b/nixos/tests/printing.nix index 9890088306136..d85abf3c105cc 100644 --- a/nixos/tests/printing.nix +++ b/nixos/tests/printing.nix @@ -9,7 +9,7 @@ import ./make-test.nix ({pkgs, ... }: { nodes = { server = - { config, pkgs, ... }: + { ... }: { services.printing.enable = true; services.printing.listenAddresses = [ "*:631" ]; services.printing.defaultShared = true; @@ -24,7 +24,7 @@ import ./make-test.nix ({pkgs, ... }: { }; client = - { config, pkgs, nodes, ... }: + { ... }: { services.printing.enable = true; }; diff --git a/nixos/tests/prometheus.nix b/nixos/tests/prometheus.nix index 374fb2d634b4b..87a6510f40fd8 100644 --- a/nixos/tests/prometheus.nix +++ b/nixos/tests/prometheus.nix @@ -2,7 +2,7 @@ import ./make-test.nix { name = "prometheus"; nodes = { - one = { config, pkgs, ... }: { + one = { ... }: { services.prometheus = { enable = true; scrapeConfigs = [{ diff --git a/nixos/tests/prosody.nix b/nixos/tests/prosody.nix index fcebfaf74e126..5d33aaf8d65de 100644 --- a/nixos/tests/prosody.nix +++ b/nixos/tests/prosody.nix @@ -1,7 +1,7 @@ import ./make-test.nix { name = "prosody"; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { services.prosody = { enable = true; # TODO: use a self-signed certificate diff --git a/nixos/tests/proxy.nix b/nixos/tests/proxy.nix index 3fee1d3253849..1819531202822 100644 --- a/nixos/tests/proxy.nix +++ b/nixos/tests/proxy.nix @@ -3,7 +3,7 @@ import ./make-test.nix ({ pkgs, ...} : let backend = - { config, pkgs, ... }: + { pkgs, ... }: { services.httpd.enable = true; services.httpd.adminAddr = "foo@example.org"; @@ -21,7 +21,7 @@ in nodes = { proxy = - { config, pkgs, nodes, ... }: + { nodes, ... }: { services.httpd.enable = true; services.httpd.adminAddr = "bar@example.org"; @@ -57,7 +57,7 @@ in backend1 = backend; backend2 = backend; - client = { config, pkgs, ... }: { }; + client = { ... }: { }; }; testScript = diff --git a/nixos/tests/quagga.nix b/nixos/tests/quagga.nix index 613180942c415..0ff14a21584a4 100644 --- a/nixos/tests/quagga.nix +++ b/nixos/tests/quagga.nix @@ -30,14 +30,14 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { client = - { config, pkgs, nodes, ... }: + { nodes, ... }: { virtualisation.vlans = [ 1 ]; networking.defaultGateway = ifAddr nodes.router1 "eth1"; }; router1 = - { config, pkgs, nodes, ... }: + { ... }: { virtualisation.vlans = [ 1 2 ]; boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; @@ -49,7 +49,7 @@ import ./make-test.nix ({ pkgs, ... }: }; router2 = - { config, pkgs, nodes, ... }: + { ... }: { virtualisation.vlans = [ 3 2 ]; boot.kernel.sysctl."net.ipv4.ip_forward" = "1"; @@ -61,7 +61,7 @@ import ./make-test.nix ({ pkgs, ... }: }; server = - { config, pkgs, nodes, ... }: + { nodes, ... }: { virtualisation.vlans = [ 3 ]; networking.defaultGateway = ifAddr nodes.router2 "eth1"; @@ -73,7 +73,7 @@ import ./make-test.nix ({ pkgs, ... }: }; testScript = - { nodes, ... }: + { ... }: '' startAll; diff --git a/nixos/tests/quake3.nix b/nixos/tests/quake3.nix index 22d71595cb488..75c82cca63f5f 100644 --- a/nixos/tests/quake3.nix +++ b/nixos/tests/quake3.nix @@ -29,7 +29,7 @@ rec { #makeCoverageReport = true; client = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ./common/x11.nix ]; hardware.opengl.driSupport = true; @@ -40,7 +40,7 @@ rec { nodes = { server = - { config, pkgs, ... }: + { pkgs, ... }: { systemd.services."quake3-server" = { wantedBy = [ "multi-user.target" ]; diff --git a/nixos/tests/rabbitmq.nix b/nixos/tests/rabbitmq.nix index 23a7e2ed538f2..34ab05787867a 100644 --- a/nixos/tests/rabbitmq.nix +++ b/nixos/tests/rabbitmq.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; nodes = { - one = { config, pkgs, ... }: { + one = { ... }: { services.rabbitmq.enable = true; }; }; diff --git a/nixos/tests/radicale.nix b/nixos/tests/radicale.nix index e384303854159..0a9c2d394a7a5 100644 --- a/nixos/tests/radicale.nix +++ b/nixos/tests/radicale.nix @@ -28,7 +28,7 @@ let in - import ./make-test.nix ({ pkgs, lib, ... }@args: { + import ./make-test.nix ({ lib, ... }@args: { name = "radicale"; meta.maintainers = with lib.maintainers; [ aneeshusa infinisil ]; diff --git a/nixos/tests/riak.nix b/nixos/tests/riak.nix index 18d028232ac24..68a9b7315b350 100644 --- a/nixos/tests/riak.nix +++ b/nixos/tests/riak.nix @@ -3,7 +3,7 @@ import ./make-test.nix { nodes = { master = - { pkgs, config, ... }: + { pkgs, ... }: { services.riak.enable = true; diff --git a/nixos/tests/run-in-machine.nix b/nixos/tests/run-in-machine.nix index a6dfece44a92e..bd90dc3080bd9 100644 --- a/nixos/tests/run-in-machine.nix +++ b/nixos/tests/run-in-machine.nix @@ -5,7 +5,7 @@ with import ../lib/testing.nix { inherit system; }; let output = runInMachine { drv = pkgs.hello; - machine = { config, pkgs, ... }: { /* services.sshd.enable = true; */ }; + machine = { ... }: { /* services.sshd.enable = true; */ }; }; in pkgs.runCommand "verify-output" { inherit output; } '' if [ ! -e "$output/bin/hello" ]; then diff --git a/nixos/tests/rxe.nix b/nixos/tests/rxe.nix index cfe64a75a6352..d0b53db8eeb61 100644 --- a/nixos/tests/rxe.nix +++ b/nixos/tests/rxe.nix @@ -1,7 +1,7 @@ -import ./make-test.nix ({ pkgs, ... } : +import ./make-test.nix ({ ... } : let - node = { config, pkgs, lib, ... } : { + node = { pkgs, ... } : { networking = { firewall = { allowedUDPPorts = [ 4791 ]; # open RoCE port diff --git a/nixos/tests/samba.nix b/nixos/tests/samba.nix index e446284fc0efd..2802e00a5b1a2 100644 --- a/nixos/tests/samba.nix +++ b/nixos/tests/samba.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { client = - { config, pkgs, ... }: + { pkgs, ... }: { fileSystems = pkgs.lib.mkVMOverride { "/public" = { fsType = "cifs"; @@ -18,7 +18,7 @@ import ./make-test.nix ({ pkgs, ... }: }; server = - { config, pkgs, ... }: + { ... }: { services.samba.enable = true; services.samba.shares.public = { path = "/public"; diff --git a/nixos/tests/sddm.nix b/nixos/tests/sddm.nix index ac91a89f66958..7b9fdc0b34415 100644 --- a/nixos/tests/sddm.nix +++ b/nixos/tests/sddm.nix @@ -9,7 +9,7 @@ let default = { name = "sddm"; - machine = { lib, ... }: { + machine = { ... }: { imports = [ ./common/user-account.nix ]; services.xserver.enable = true; services.xserver.displayManager.sddm.enable = true; @@ -39,7 +39,7 @@ let maintainers = [ ttuegel ]; }; - machine = { lib, ... }: { + machine = { ... }: { imports = [ ./common/user-account.nix ]; services.xserver.enable = true; services.xserver.displayManager.sddm = { @@ -54,7 +54,7 @@ let services.xserver.desktopManager.default = "none"; }; - testScript = { nodes, ... }: '' + testScript = { ... }: '' startAll; $machine->waitForFile("/home/alice/.Xauthority"); $machine->succeed("xauth merge ~alice/.Xauthority"); diff --git a/nixos/tests/simple.nix b/nixos/tests/simple.nix index 04d624adcfe97..84c5621d962fb 100644 --- a/nixos/tests/simple.nix +++ b/nixos/tests/simple.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ eelco ]; }; - machine = { config, pkgs, ... }: { + machine = { ... }: { imports = [ ../modules/profiles/minimal.nix ]; }; diff --git a/nixos/tests/slim.nix b/nixos/tests/slim.nix index 5c76c58cf3f32..42c87dfa039d2 100644 --- a/nixos/tests/slim.nix +++ b/nixos/tests/slim.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ aszlig ]; }; - machine = { pkgs, lib, ... }: { + machine = { pkgs, ... }: { imports = [ ./common/user-account.nix ]; services.xserver.enable = true; services.xserver.windowManager.default = "icewm"; diff --git a/nixos/tests/slurm.nix b/nixos/tests/slurm.nix index ec67ea092874b..60f44c3c8459c 100644 --- a/nixos/tests/slurm.nix +++ b/nixos/tests/slurm.nix @@ -1,4 +1,4 @@ -import ./make-test.nix ({ pkgs, ... }: +import ./make-test.nix ({ ... }: let mungekey = "mungeverryweakkeybuteasytointegratoinatest"; slurmconfig = { controlMachine = "control"; @@ -14,7 +14,7 @@ in { nodes = let computeNode = - { config, pkgs, ...}: + { ...}: { # TODO slrumd port and slurmctld port should be configurations and # automatically allowed by the firewall. @@ -26,7 +26,7 @@ in { in { control = - { config, pkgs, ...}: + { ...}: { networking.firewall.enable = false; services.slurm = { @@ -35,7 +35,7 @@ in { }; submit = - { config, pkgs, ...}: + { ...}: { networking.firewall.enable = false; services.slurm = { diff --git a/nixos/tests/smokeping.nix b/nixos/tests/smokeping.nix index 4c77e4b786130..07d2280511278 100644 --- a/nixos/tests/smokeping.nix +++ b/nixos/tests/smokeping.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { sm = - { pkgs, config, ... }: + { ... }: { services.smokeping = { enable = true; diff --git a/nixos/tests/strongswan-swanctl.nix b/nixos/tests/strongswan-swanctl.nix index 021743021b404..8bbebd4230032 100644 --- a/nixos/tests/strongswan-swanctl.nix +++ b/nixos/tests/strongswan-swanctl.nix @@ -34,7 +34,7 @@ in { meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ]; nodes = { - alice = { nodes, ... } : { + alice = { ... } : { virtualisation.vlans = [ 0 ]; networking = { dhcpcd.enable = false; @@ -42,7 +42,7 @@ in { }; }; - moon = {pkgs, config, nodes, ...} : + moon = { config, ...} : let strongswan = config.services.strongswan-swanctl.package; in { virtualisation.vlans = [ 0 1 ]; @@ -94,7 +94,7 @@ in { }; }; - carol = {pkgs, config, nodes, ...} : + carol = { config, ...} : let strongswan = config.services.strongswan-swanctl.package; in { virtualisation.vlans = [ 1 ]; diff --git a/nixos/tests/subversion.nix b/nixos/tests/subversion.nix index a8e33a6f7e59c..6175155cdfc9c 100644 --- a/nixos/tests/subversion.nix +++ b/nixos/tests/subversion.nix @@ -39,7 +39,7 @@ in nodes = { webserver = - { config, pkgs, ... }: + { ... }: { services.httpd.enable = true; @@ -55,7 +55,7 @@ in }; client = - { config, pkgs, ... }: + { pkgs, ... }: { environment.systemPackages = [ pkgs.subversion ]; diff --git a/nixos/tests/sudo.nix b/nixos/tests/sudo.nix index 5d6c8691230aa..fc16b99cc19ca 100644 --- a/nixos/tests/sudo.nix +++ b/nixos/tests/sudo.nix @@ -11,7 +11,7 @@ in }; machine = - { config, lib, pkgs, ... }: + { lib, ... }: with lib; { users.groups = { foobar = {}; barfoo = {}; baz = { gid = 1337; }; }; diff --git a/nixos/tests/switch-test.nix b/nixos/tests/switch-test.nix index 46f2563af8d99..32010838e67b4 100644 --- a/nixos/tests/switch-test.nix +++ b/nixos/tests/switch-test.nix @@ -7,10 +7,10 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - machine = { config, lib, pkgs, ... }: { + machine = { ... }: { users.mutableUsers = false; }; - other = { config, lib, pkgs, ... }: { + other = { ... }: { users.mutableUsers = true; }; }; diff --git a/nixos/tests/tomcat.nix b/nixos/tests/tomcat.nix index 475c947e72d98..af63c7ee8e029 100644 --- a/nixos/tests/tomcat.nix +++ b/nixos/tests/tomcat.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ...} : { nodes = { server = - { pkgs, config, ... }: + { ... }: { services.tomcat.enable = true; services.httpd.enable = true; diff --git a/nixos/tests/tor.nix b/nixos/tests/tor.nix index 24d46a03897e5..0cb44ddff2485 100644 --- a/nixos/tests/tor.nix +++ b/nixos/tests/tor.nix @@ -5,14 +5,14 @@ rec { meta.maintainers = with maintainers; [ joachifm ]; common = - { config, ... }: + { ... }: { boot.kernelParams = [ "audit=0" "apparmor=0" "quiet" ]; networking.firewall.enable = false; networking.useDHCP = false; }; nodes.client = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ common ]; environment.systemPackages = with pkgs; [ netcat ]; services.tor.enable = true; diff --git a/nixos/tests/trac.nix b/nixos/tests/trac.nix index 5da5717d7f865..4599885acde69 100644 --- a/nixos/tests/trac.nix +++ b/nixos/tests/trac.nix @@ -6,7 +6,7 @@ import ./make-test.nix ({ pkgs, ... }: { nodes = { storage = - { config, pkgs, ... }: + { ... }: { services.nfs.server.enable = true; services.nfs.server.exports = '' /repos 192.168.1.0/255.255.255.0(rw,no_root_squash) @@ -15,7 +15,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; postgresql = - { config, pkgs, ... }: + { pkgs, ... }: { services.postgresql.enable = true; services.postgresql.package = pkgs.postgresql; services.postgresql.enableTCPIP = true; @@ -29,7 +29,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; webserver = - { config, pkgs, ... }: + { pkgs, ... }: { fileSystems = pkgs.lib.mkVMOverride [ { mountPoint = "/repos"; device = "storage:/repos"; @@ -43,7 +43,7 @@ import ./make-test.nix ({ pkgs, ... }: { }; client = - { config, pkgs, ... }: + { ... }: { imports = [ ./common/x11.nix ]; services.xserver.desktopManager.plasma5.enable = true; }; diff --git a/nixos/tests/transmission.nix b/nixos/tests/transmission.nix index 34c49bd7f15b8..f1c238730ebb8 100644 --- a/nixos/tests/transmission.nix +++ b/nixos/tests/transmission.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ...} : { maintainers = [ coconnor ]; }; - machine = { config, pkgs, ... }: { + machine = { ... }: { imports = [ ../modules/profiles/minimal.nix ]; networking.firewall.allowedTCPPorts = [ 9091 ]; diff --git a/nixos/tests/udisks2.nix b/nixos/tests/udisks2.nix index 70a999267a54c..8bbbe286efcf8 100644 --- a/nixos/tests/udisks2.nix +++ b/nixos/tests/udisks2.nix @@ -16,7 +16,7 @@ in }; machine = - { config, pkgs, ... }: + { ... }: { services.udisks2.enable = true; imports = [ ./common/user-account.nix ]; diff --git a/nixos/tests/vault.nix b/nixos/tests/vault.nix index 515d5c8bac251..caf0cbb2abfe0 100644 --- a/nixos/tests/vault.nix +++ b/nixos/tests/vault.nix @@ -4,7 +4,7 @@ import ./make-test.nix ({ pkgs, ... }: meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ lnl7 ]; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { environment.systemPackages = [ pkgs.vault ]; environment.variables.VAULT_ADDR = "http://127.0.0.1:8200"; services.vault.enable = true; diff --git a/nixos/tests/wordpress.nix b/nixos/tests/wordpress.nix index c51306a8c7a04..2c0bbbfd71613 100644 --- a/nixos/tests/wordpress.nix +++ b/nixos/tests/wordpress.nix @@ -8,7 +8,7 @@ import ./make-test.nix ({ pkgs, ... }: nodes = { web = - { config, pkgs, ... }: + { pkgs, ... }: { services.mysql = { enable = true; @@ -41,7 +41,7 @@ import ./make-test.nix ({ pkgs, ... }: }; testScript = - { nodes, ... }: + { ... }: '' startAll; diff --git a/nixos/tests/xdg-desktop-portal.nix b/nixos/tests/xdg-desktop-portal.nix index d954b07f73d6f..79ebb83c49a59 100644 --- a/nixos/tests/xdg-desktop-portal.nix +++ b/nixos/tests/xdg-desktop-portal.nix @@ -7,7 +7,7 @@ import ./make-test.nix ({ pkgs, ... }: maintainers = pkgs.xdg-desktop-portal.meta.maintainers; }; - machine = { config, pkgs, ... }: { + machine = { pkgs, ... }: { environment.systemPackages = with pkgs; [ gnome-desktop-testing ]; }; diff --git a/nixos/tests/xfce.nix b/nixos/tests/xfce.nix index c8b18f1226580..47717e8cf7d91 100644 --- a/nixos/tests/xfce.nix +++ b/nixos/tests/xfce.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; machine = - { config, pkgs, ... }: + { pkgs, ... }: { imports = [ ./common/user-account.nix ]; diff --git a/nixos/tests/xmonad.nix b/nixos/tests/xmonad.nix index 3ea455c393c40..61fa7c1a67d34 100644 --- a/nixos/tests/xmonad.nix +++ b/nixos/tests/xmonad.nix @@ -15,7 +15,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; - testScript = { nodes, ... }: '' + testScript = { ... }: '' $machine->waitForX; $machine->waitForFile("/home/alice/.Xauthority"); $machine->succeed("xauth merge ~alice/.Xauthority"); diff --git a/nixos/tests/xrdp.nix b/nixos/tests/xrdp.nix index c997e36cc442c..0106aefe8318d 100644 --- a/nixos/tests/xrdp.nix +++ b/nixos/tests/xrdp.nix @@ -5,14 +5,14 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - server = { lib, pkgs, ... }: { + server = { pkgs, ... }: { imports = [ ./common/user-account.nix ]; services.xrdp.enable = true; services.xrdp.defaultWindowManager = "${pkgs.xterm}/bin/xterm"; networking.firewall.allowedTCPPorts = [ 3389 ]; }; - client = { lib, pkgs, ... }: { + client = { pkgs, ... }: { imports = [ ./common/x11.nix ./common/user-account.nix ]; services.xserver.displayManager.auto.user = "alice"; environment.systemPackages = [ pkgs.freerdp ]; @@ -21,7 +21,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; }; - testScript = { nodes, ... }: '' + testScript = { ... }: '' startAll; $client->waitForX; diff --git a/nixos/tests/zfs.nix b/nixos/tests/zfs.nix index a6908024de9bb..1434038e90c19 100644 --- a/nixos/tests/zfs.nix +++ b/nixos/tests/zfs.nix @@ -17,7 +17,7 @@ let maintainers = [ adisbladis ]; }; - machine = { config, lib, pkgs, ... }: + machine = { pkgs, ... }: { virtualisation.emptyDiskImages = [ 4096 ]; networking.hostId = "deadbeef"; diff --git a/nixos/tests/zookeeper.nix b/nixos/tests/zookeeper.nix index d247654adadef..f343ebd39e442 100644 --- a/nixos/tests/zookeeper.nix +++ b/nixos/tests/zookeeper.nix @@ -5,7 +5,7 @@ import ./make-test.nix ({ pkgs, ...} : { }; nodes = { - server = { pkgs, config, ... }: { + server = { ... }: { services.zookeeper = { enable = true; }; |