From 72a3a868a029e9814d8ef0860ac0e05449029c8a Mon Sep 17 00:00:00 2001 From: zowoq <59103226+zowoq@users.noreply.github.com> Date: Thu, 18 Aug 2022 09:53:45 +1000 Subject: [PATCH] nixos/{containers,podman}: nixpkgs-fmt --- nixos/modules/virtualisation/containers.nix | 18 +++++------ .../modules/virtualisation/podman/default.nix | 31 ++++++++++--------- .../podman/network-socket-ghostunnel.nix | 2 +- .../virtualisation/podman/network-socket.nix | 2 +- 4 files changed, 28 insertions(+), 25 deletions(-) diff --git a/nixos/modules/virtualisation/containers.nix b/nixos/modules/virtualisation/containers.nix index a9a2f3c1488a..956844352f9a 100644 --- a/nixos/modules/virtualisation/containers.nix +++ b/nixos/modules/virtualisation/containers.nix @@ -8,20 +8,20 @@ let in { meta = { - maintainers = [] ++ lib.teams.podman.members; + maintainers = [ ] ++ lib.teams.podman.members; }; imports = [ ( lib.mkRemovedOptionModule - [ "virtualisation" "containers" "users" ] - "All users with `isNormalUser = true` set now get appropriate subuid/subgid mappings." + [ "virtualisation" "containers" "users" ] + "All users with `isNormalUser = true` set now get appropriate subuid/subgid mappings." ) ( lib.mkRemovedOptionModule - [ "virtualisation" "containers" "containersConf" "extraConfig" ] - "Use virtualisation.containers.containersConf.settings instead." + [ "virtualisation" "containers" "containersConf" "extraConfig" ] + "Use virtualisation.containers.containersConf.settings instead." ) ]; @@ -87,7 +87,7 @@ in }; insecure = mkOption { - default = []; + default = [ ]; type = types.listOf types.str; description = lib.mdDoc '' List of insecure repositories. @@ -95,7 +95,7 @@ in }; block = mkOption { - default = []; + default = [ ]; type = types.listOf types.str; description = lib.mdDoc '' List of blocked repositories. @@ -104,7 +104,7 @@ in }; policy = mkOption { - default = {}; + default = { }; type = types.attrs; example = literalExpression '' { @@ -149,7 +149,7 @@ in }; environment.etc."containers/policy.json".source = - if cfg.policy != {} then pkgs.writeText "policy.json" (builtins.toJSON cfg.policy) + if cfg.policy != { } then pkgs.writeText "policy.json" (builtins.toJSON cfg.policy) else utils.copyFile "${pkgs.skopeo.src}/default-policy.json"; }; diff --git a/nixos/modules/virtualisation/podman/default.nix b/nixos/modules/virtualisation/podman/default.nix index 47d95d28faff..ccf30a0ff663 100644 --- a/nixos/modules/virtualisation/podman/default.nix +++ b/nixos/modules/virtualisation/podman/default.nix @@ -12,10 +12,11 @@ let }); # Provides a fake "docker" binary mapping to podman - dockerCompat = pkgs.runCommand "${podmanPackage.pname}-docker-compat-${podmanPackage.version}" { - outputs = [ "out" "man" ]; - inherit (podmanPackage) meta; - } '' + dockerCompat = pkgs.runCommand "${podmanPackage.pname}-docker-compat-${podmanPackage.version}" + { + outputs = [ "out" "man" ]; + inherit (podmanPackage) meta; + } '' mkdir -p $out/bin ln -s ${podmanPackage}/bin/podman $out/bin/docker @@ -26,13 +27,14 @@ let done ''; - net-conflist = pkgs.runCommand "87-podman-bridge.conflist" { - nativeBuildInputs = [ pkgs.jq ]; - extraPlugins = builtins.toJSON cfg.defaultNetwork.extraPlugins; - jqScript = '' - . + { "plugins": (.plugins + $extraPlugins) } - ''; - } '' + net-conflist = pkgs.runCommand "87-podman-bridge.conflist" + { + nativeBuildInputs = [ pkgs.jq ]; + extraPlugins = builtins.toJSON cfg.defaultNetwork.extraPlugins; + jqScript = '' + . + { "plugins": (.plugins + $extraPlugins) } + ''; + } '' jq <${cfg.package}/etc/cni/net.d/87-podman-bridge.conflist \ --argjson extraPlugins "$extraPlugins" \ "$jqScript" \ @@ -119,7 +121,7 @@ in defaultNetwork.extraPlugins = lib.mkOption { type = types.listOf json.type; - default = []; + default = [ ]; description = lib.mdDoc '' Extra CNI plugin configurations to add to podman's default network. ''; @@ -167,14 +169,15 @@ in grep -v 'D! /run/podman 0700 root root' \ <$package/lib/tmpfiles.d/podman.conf \ >$out/lib/tmpfiles.d/podman.conf - '') ]; + '') + ]; systemd.tmpfiles.rules = lib.optionals cfg.dockerSocket.enable [ "L! /run/docker.sock - - - - /run/podman/podman.sock" ]; - users.groups.podman = {}; + users.groups.podman = { }; assertions = [ { diff --git a/nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix b/nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix index a0e7e433164a..ade4926c94cd 100644 --- a/nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix +++ b/nixos/modules/virtualisation/podman/network-socket-ghostunnel.nix @@ -26,7 +26,7 @@ in allowAll = lib.mkDefault true; }; }; - systemd.services.ghostunnel-server-podman-socket.serviceConfig.SupplementaryGroups = ["podman"]; + systemd.services.ghostunnel-server-podman-socket.serviceConfig.SupplementaryGroups = [ "podman" ]; }; diff --git a/nixos/modules/virtualisation/podman/network-socket.nix b/nixos/modules/virtualisation/podman/network-socket.nix index 6e46b9c45563..523cbd00715b 100644 --- a/nixos/modules/virtualisation/podman/network-socket.nix +++ b/nixos/modules/virtualisation/podman/network-socket.nix @@ -31,7 +31,7 @@ in }; server = mkOption { - type = types.enum []; + type = types.enum [ ]; description = lib.mdDoc '' Choice of TLS proxy server. '';