treewide: use optionalAttrs instead of 'else {}'

Changed files
+51 -66
nixos
modules
tests
pkgs
build-support
bintools-wrapper
cc-wrapper
emacs
pkg-config-wrapper
release
rust
build-rust-crate
data
icons
apple-cursor
desktops
gnustep
development
compilers
cudatoolkit
redist
coq-modules
zorns-lemma
interpreters
lua-5
luajit
python
cpython
libraries
hspell
lisp-modules
lisp-modules-new-obsolete
ocaml-modules
tools
build-managers
bazel
bazel_4
bazel_5
bazel_6
+2 -3
nixos/modules/services/audio/roon-bridge.nix
···
users.groups.${cfg.group} = {};
users.users.${cfg.user} =
-
if cfg.user == "roon-bridge" then {
isSystemUser = true;
description = "Roon Bridge user";
group = cfg.group;
extraGroups = [ "audio" ];
-
}
-
else {};
};
}
···
users.groups.${cfg.group} = {};
users.users.${cfg.user} =
+
optionalAttrs (cfg.user == "roon-bridge") {
isSystemUser = true;
description = "Roon Bridge user";
group = cfg.group;
extraGroups = [ "audio" ];
+
};
};
}
+2 -3
nixos/modules/services/audio/roon-server.nix
···
users.groups.${cfg.group} = {};
users.users.${cfg.user} =
-
if cfg.user == "roon-server" then {
isSystemUser = true;
description = "Roon Server user";
group = cfg.group;
extraGroups = [ "audio" ];
-
}
-
else {};
};
}
···
users.groups.${cfg.group} = {};
users.users.${cfg.user} =
+
optionalAttrs (cfg.user == "roon-server") {
isSystemUser = true;
description = "Roon Server user";
group = cfg.group;
extraGroups = [ "audio" ];
+
};
};
}
+1 -1
nixos/modules/services/hardware/fwupd.nix
···
# to install it because it would create a cyclic dependency between
# the outputs. We also need to enable the remote,
# which should not be done by default.
-
if cfg.enableTestRemote then (enableRemote cfg.package.installedTests "fwupd-tests") else {}
);
in {
···
# to install it because it would create a cyclic dependency between
# the outputs. We also need to enable the remote,
# which should not be done by default.
+
lib.optionalAttrs cfg.enableTestRemote (enableRemote cfg.package.installedTests "fwupd-tests")
);
in {
+2 -2
nixos/modules/services/misc/disnix.nix
···
environment = {
HOME = "/root";
}
-
// (if config.environment.variables ? DYSNOMIA_CONTAINERS_PATH then { inherit (config.environment.variables) DYSNOMIA_CONTAINERS_PATH; } else {})
-
// (if config.environment.variables ? DYSNOMIA_MODULES_PATH then { inherit (config.environment.variables) DYSNOMIA_MODULES_PATH; } else {});
serviceConfig.ExecStart = "${cfg.package}/bin/disnix-service";
};
···
environment = {
HOME = "/root";
}
+
// (optionalAttrs (config.environment.variables ? DYSNOMIA_CONTAINERS_PATH) { inherit (config.environment.variables) DYSNOMIA_CONTAINERS_PATH; })
+
// (optionalAttrs (config.environment.variables ? DYSNOMIA_MODULES_PATH) { inherit (config.environment.variables) DYSNOMIA_MODULES_PATH; });
serviceConfig.ExecStart = "${cfg.package}/bin/disnix-service";
};
+3 -7
nixos/modules/services/misc/docker-registry.nix
···
storage = {
cache.blobdescriptor = blobCache;
delete.enabled = cfg.enableDelete;
-
} // (if cfg.storagePath != null
-
then { filesystem.rootdirectory = cfg.storagePath; }
-
else {});
http = {
addr = "${cfg.listenAddress}:${builtins.toString cfg.port}";
headers.X-Content-Type-Options = ["nosniff"];
···
};
users.users.docker-registry =
-
(if cfg.storagePath != null
-
then {
createHome = true;
home = cfg.storagePath;
-
}
-
else {}) // {
group = "docker-registry";
isSystemUser = true;
};
···
storage = {
cache.blobdescriptor = blobCache;
delete.enabled = cfg.enableDelete;
+
} // (optionalAttrs (cfg.storagePath != null) { filesystem.rootdirectory = cfg.storagePath; });
http = {
addr = "${cfg.listenAddress}:${builtins.toString cfg.port}";
headers.X-Content-Type-Options = ["nosniff"];
···
};
users.users.docker-registry =
+
(optionalAttrs (cfg.storagePath != null) {
createHome = true;
home = cfg.storagePath;
+
}) // {
group = "docker-registry";
isSystemUser = true;
};
+2 -3
nixos/modules/services/networking/zerobin.nix
···
config = mkIf (cfg.enable) {
users.users.${cfg.user} =
-
if cfg.user == "zerobin" then {
isSystemUser = true;
group = cfg.group;
home = cfg.dataDir;
createHome = true;
-
}
-
else {};
users.groups.${cfg.group} = {};
systemd.services.zerobin = {
···
config = mkIf (cfg.enable) {
users.users.${cfg.user} =
+
optionalAttrs (cfg.user == "zerobin") {
isSystemUser = true;
group = cfg.group;
home = cfg.dataDir;
createHome = true;
+
};
users.groups.${cfg.group} = {};
systemd.services.zerobin = {
+4 -4
nixos/modules/virtualisation/nixos-containers.nix
···
# declarative containers
++ (mapAttrsToList (name: cfg: nameValuePair "container@${name}" (let
containerConfig = cfg // (
-
if cfg.enableTun then
{
allowedDevices = cfg.allowedDevices
++ [ { node = "/dev/net/tun"; modifier = "rw"; } ];
additionalCapabilities = cfg.additionalCapabilities
++ [ "CAP_NET_ADMIN" ];
}
-
else {});
in
recursiveUpdate unit {
preStart = preStartScript containerConfig;
···
unitConfig.RequiresMountsFor = lib.optional (!containerConfig.ephemeral) "${stateDirectory}/%i";
environment.root = if containerConfig.ephemeral then "/run/nixos-containers/%i" else "${stateDirectory}/%i";
} // (
-
if containerConfig.autoStart then
{
wantedBy = [ "machines.target" ];
wants = [ "network.target" ];
···
];
restartIfChanged = true;
}
-
else {})
)) config.containers)
));
···
# declarative containers
++ (mapAttrsToList (name: cfg: nameValuePair "container@${name}" (let
containerConfig = cfg // (
+
optionalAttrs cfg.enableTun
{
allowedDevices = cfg.allowedDevices
++ [ { node = "/dev/net/tun"; modifier = "rw"; } ];
additionalCapabilities = cfg.additionalCapabilities
++ [ "CAP_NET_ADMIN" ];
}
+
);
in
recursiveUpdate unit {
preStart = preStartScript containerConfig;
···
unitConfig.RequiresMountsFor = lib.optional (!containerConfig.ephemeral) "${stateDirectory}/%i";
environment.root = if containerConfig.ephemeral then "/run/nixos-containers/%i" else "${stateDirectory}/%i";
} // (
+
optionalAttrs containerConfig.autoStart
{
wantedBy = [ "machines.target" ];
wants = [ "network.target" ];
···
];
restartIfChanged = true;
}
+
)
)) config.containers)
));
+1 -1
nixos/tests/virtualbox.nix
···
destroy_vm_test1()
destroy_vm_test2()
'';
-
} // (if enableUnfree then unfreeTests else {})
···
destroy_vm_test1()
destroy_vm_test2()
'';
+
} // (lib.optionalAttrs enableUnfree unfreeTests)
+2 -2
pkgs/build-support/bintools-wrapper/default.nix
···
};
meta =
-
let bintools_ = if bintools != null then bintools else {}; in
-
(if bintools_ ? meta then removeAttrs bintools.meta ["priority"] else {}) //
{ description =
lib.attrByPath ["meta" "description"] "System binary utilities" bintools_
+ " (wrapper script)";
···
};
meta =
+
let bintools_ = lib.optionalAttrs (bintools != null) bintools; in
+
(lib.optionalAttrs (bintools_ ? meta) (removeAttrs bintools.meta ["priority"])) //
{ description =
lib.attrByPath ["meta" "description"] "System binary utilities" bintools_
+ " (wrapper script)";
+2 -2
pkgs/build-support/cc-wrapper/default.nix
···
};
meta =
-
let cc_ = if cc != null then cc else {}; in
-
(if cc_ ? meta then removeAttrs cc.meta ["priority"] else {}) //
{ description =
lib.attrByPath ["meta" "description"] "System C compiler" cc_
+ " (wrapper script)";
···
};
meta =
+
let cc_ = lib.optionalAttrs (cc != null) cc; in
+
(lib.optionalAttrs (cc_ ? meta) (removeAttrs cc.meta ["priority"])) //
{ description =
lib.attrByPath ["meta" "description"] "System C compiler" cc_
+ " (wrapper script)";
+1 -3
pkgs/build-support/emacs/buffer.nix
···
haskell-package-env =
builtins.head haskell-package.env.nativeBuildInputs;
in
-
if is-haskell-package
-
then withPackages [ haskell-package-env ]
-
else {};
}
···
haskell-package-env =
builtins.head haskell-package.env.nativeBuildInputs;
in
+
lib.optionalAttrs is-haskell-package (withPackages [ haskell-package-env ]);
}
+2 -2
pkgs/build-support/pkg-config-wrapper/default.nix
···
};
meta =
-
let pkg-config_ = if pkg-config != null then pkg-config else {}; in
-
(if pkg-config_ ? meta then removeAttrs pkg-config.meta ["priority"] else {}) //
{ description =
lib.attrByPath ["meta" "description"] "pkg-config" pkg-config_
+ " (wrapper script)";
···
};
meta =
+
let pkg-config_ = lib.optionalAttrs (pkg-config != null) pkg-config; in
+
(lib.optionalAttrs (pkg-config_ ? meta) (removeAttrs pkg-config.meta ["priority"])) //
{ description =
lib.attrByPath ["meta" "description"] "pkg-config" pkg-config_
+ " (wrapper script)";
+1 -1
pkgs/build-support/release/binary-tarball.nix
···
test -n "$releaseName" && (echo "$releaseName" >> $out/nix-support/hydra-release-name)
'';
-
meta = (if args ? meta then args.meta else {}) // {
description = "Build of a generic binary distribution";
};
···
test -n "$releaseName" && (echo "$releaseName" >> $out/nix-support/hydra-release-name)
'';
+
meta = (lib.optionalAttrs (args ? meta) args.meta) // {
description = "Build of a generic binary distribution";
};
+1 -1
pkgs/build-support/release/debian-build.nix
···
eval "$postInstall"
'';
-
meta = (if args ? meta then args.meta else {}) // {
description = "Deb package for ${diskImage.fullName}";
};
}
···
eval "$postInstall"
'';
+
meta = (lib.optionalAttrs (args ? meta) args.meta) // {
description = "Deb package for ${diskImage.fullName}";
};
}
+1 -1
pkgs/build-support/release/nix-build.nix
···
postPhases = postPhases ++ ["finalPhase"];
-
meta = (if args ? meta then args.meta else {}) // {
description = if doCoverageAnalysis then "Coverage analysis" else "Nix package for ${stdenv.hostPlatform.system}";
};
···
postPhases = postPhases ++ ["finalPhase"];
+
meta = (lib.optionalAttrs (args ? meta) args.meta) // {
description = if doCoverageAnalysis then "Coverage analysis" else "Nix package for ${stdenv.hostPlatform.system}";
};
+1 -1
pkgs/build-support/release/rpm-build.nix
···
done
'';
-
meta = (if args ? meta then args.meta else {}) // {
description = "RPM package for ${diskImage.fullName}";
};
}
···
done
'';
+
meta = (lib.optionalAttrs (args ? meta) args.meta) // {
description = "RPM package for ${diskImage.fullName}";
};
}
+1 -3
pkgs/build-support/rust/build-rust-crate/test/rcgen-crates.nix
···
, release ? true
# Additional crate2nix configuration if it exists.
, crateConfig
-
? if builtins.pathExists ./crate-config.nix
-
then pkgs.callPackage ./crate-config.nix {}
-
else {}
}:
rec {
···
, release ? true
# Additional crate2nix configuration if it exists.
, crateConfig
+
? lib.optionalAttrs (builtins.pathExists ./crate-config.nix) (pkgs.callPackage ./crate-config.nix {})
}:
rec {
+1 -1
pkgs/data/icons/apple-cursor/default.nix
···
name = variant;
url = "https://github.com/ful1e5/apple_cursor/releases/download/v${version}/${variant}.${suffix}";
hash = hash;
-
} // (if suffix == "zip" then { stripRoot = false; } else {}));
version = "2.0.0";
srcs = [
···
name = variant;
url = "https://github.com/ful1e5/apple_cursor/releases/download/v${version}/${variant}.${suffix}";
hash = hash;
+
} // (lib.optionalAttrs (suffix == "zip") { stripRoot = false; }));
version = "2.0.0";
srcs = [
+1 -1
pkgs/desktops/gnustep/make/gsmakeDerivation.nix
···
maintainers = with lib.maintainers; [ ashalkhakov matthewbauer ];
platforms = lib.platforms.linux;
-
} // (if builtins.hasAttr "meta" args then args.meta else {});
})
···
maintainers = with lib.maintainers; [ ashalkhakov matthewbauer ];
platforms = lib.platforms.linux;
+
} // (lib.optionalAttrs (builtins.hasAttr "meta" args) args.meta);
})
+2 -4
pkgs/development/compilers/cudatoolkit/redist/extension.nix
···
in lib.mapAttrs buildCudaToolkitRedistPackage attrs;
# All cudatoolkit redist packages for the current cuda version
-
cudaToolkitRedistPackages = if
-
lib.hasAttr cudaVersion cudaToolkitRedistManifests
-
then buildCudaToolkitRedistPackages { version = cudaVersion; manifest = cudaToolkitRedistManifests.${cudaVersion}; }
-
else {};
in cudaToolkitRedistPackages
···
in lib.mapAttrs buildCudaToolkitRedistPackage attrs;
# All cudatoolkit redist packages for the current cuda version
+
cudaToolkitRedistPackages = lib.optionalAttrs (lib.hasAttr cudaVersion cudaToolkitRedistManifests)
+
(buildCudaToolkitRedistPackages { version = cudaVersion; manifest = cudaToolkitRedistManifests.${cudaVersion}; });
in cudaToolkitRedistPackages
+1 -1
pkgs/development/coq-modules/zorns-lemma/default.nix
···
maintainers = with maintainers; [ siraben ];
license = licenses.lgpl21Plus;
};
-
}).overrideAttrs({version, ...}: if lib.versions.isGe "9.0" version then { repo = "topology"; } else {})
···
maintainers = with maintainers; [ siraben ];
license = licenses.lgpl21Plus;
};
+
}).overrideAttrs({version, ...}: lib.optionalAttrs (lib.versions.isGe "9.0" version) { repo = "topology"; })
+1 -1
pkgs/development/interpreters/lua-5/interpreter.nix
···
luaOnBuildForHost = override pkgsBuildHost.${luaAttr};
luaOnBuildForTarget = override pkgsBuildTarget.${luaAttr};
luaOnHostForHost = override pkgsHostHost.${luaAttr};
-
luaOnTargetForTarget = if lib.hasAttr luaAttr pkgsTargetTarget then (override pkgsTargetTarget.${luaAttr}) else {};
};
meta = {
···
luaOnBuildForHost = override pkgsBuildHost.${luaAttr};
luaOnBuildForTarget = override pkgsBuildTarget.${luaAttr};
luaOnHostForHost = override pkgsHostHost.${luaAttr};
+
luaOnTargetForTarget = lib.optionalAttrs (lib.hasAttr luaAttr pkgsTargetTarget) (override pkgsTargetTarget.${luaAttr});
};
meta = {
+1 -1
pkgs/development/interpreters/luajit/default.nix
···
luaOnBuildForHost = override pkgsBuildHost.${luaAttr};
luaOnBuildForTarget = override pkgsBuildTarget.${luaAttr};
luaOnHostForHost = override pkgsHostHost.${luaAttr};
-
luaOnTargetForTarget = if lib.hasAttr luaAttr pkgsTargetTarget then (override pkgsTargetTarget.${luaAttr}) else {};
};
meta = with lib; {
···
luaOnBuildForHost = override pkgsBuildHost.${luaAttr};
luaOnBuildForTarget = override pkgsBuildTarget.${luaAttr};
luaOnHostForHost = override pkgsHostHost.${luaAttr};
+
luaOnTargetForTarget = lib.optionalAttrs (lib.hasAttr luaAttr pkgsTargetTarget) (override pkgsTargetTarget.${luaAttr});
};
meta = with lib; {
+1 -1
pkgs/development/interpreters/python/cpython/default.nix
···
pythonOnBuildForHost = override pkgsBuildHost.${pythonAttr};
pythonOnBuildForTarget = override pkgsBuildTarget.${pythonAttr};
pythonOnHostForHost = override pkgsHostHost.${pythonAttr};
-
pythonOnTargetForTarget = if lib.hasAttr pythonAttr pkgsTargetTarget then (override pkgsTargetTarget.${pythonAttr}) else {};
};
version = with sourceVersion; "${major}.${minor}.${patch}${suffix}";
···
pythonOnBuildForHost = override pkgsBuildHost.${pythonAttr};
pythonOnBuildForTarget = override pkgsBuildTarget.${pythonAttr};
pythonOnHostForHost = override pkgsHostHost.${pythonAttr};
+
pythonOnTargetForTarget = lib.optionalAttrs (lib.hasAttr pythonAttr pkgsTargetTarget) (override pkgsTargetTarget.${pythonAttr});
};
version = with sourceVersion; "${major}.${minor}.${patch}${suffix}";
+2 -2
pkgs/development/libraries/hspell/dicts.nix
···
-
{ stdenv, hspell }:
let
dict = variant: a: stdenv.mkDerivation ({
···
meta = hspell.meta // {
broken = true;
description = "${variant} Hebrew dictionary";
-
} // (if a ? meta then a.meta else {});
} // (removeAttrs a ["meta"]));
in
{
···
+
{ lib, stdenv, hspell }:
let
dict = variant: a: stdenv.mkDerivation ({
···
meta = hspell.meta // {
broken = true;
description = "${variant} Hebrew dictionary";
+
} // (lib.optionalAttrs (a ? meta) a.meta);
} // (removeAttrs a ["meta"]));
in
{
+2 -3
pkgs/development/lisp-modules-new-obsolete/ql.nix
···
};
qlpkgs =
-
if builtins.pathExists ./imported.nix
-
then import ./imported.nix { inherit (pkgs) runCommand fetchzip; pkgs = builtQlpkgs; }
-
else {};
builtQlpkgs = mapAttrs (n: v: build v) qlpkgs;
···
};
qlpkgs =
+
lib.optionalAttrs (builtins.pathExists ./imported.nix)
+
(import ./imported.nix { inherit (pkgs) runCommand fetchzip; pkgs = builtQlpkgs; });
builtQlpkgs = mapAttrs (n: v: build v) qlpkgs;
+2 -3
pkgs/development/lisp-modules/ql.nix
···
});
qlpkgs =
-
if builtins.pathExists ./imported.nix
-
then pkgs.callPackage ./imported.nix { inherit build-asdf-system; }
-
else {};
in qlpkgs.overrideScope' overrides
···
});
qlpkgs =
+
lib.optionalAttrs (builtins.pathExists ./imported.nix)
+
(pkgs.callPackage ./imported.nix { inherit build-asdf-system; });
in qlpkgs.overrideScope' overrides
+2 -2
pkgs/development/ocaml-modules/num/default.nix
···
inherit (ocaml.meta) platforms;
inherit (src.meta) homepage;
};
-
} // (if lib.versions.majorMinor ocaml.version == "4.06" then {
env.NIX_CFLAGS_COMPILE = "-fcommon";
-
} else {})
)
···
inherit (ocaml.meta) platforms;
inherit (src.meta) homepage;
};
+
} // (lib.optionalAttrs (lib.versions.majorMinor ocaml.version == "4.06") {
env.NIX_CFLAGS_COMPILE = "-fcommon";
+
})
)
+2 -2
pkgs/development/tools/build-managers/bazel/bazel_4/default.nix
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
-
in (if !stdenv.hostPlatform.isDarwin then {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self; };
-
} else {}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self; };
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self; };
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self; };
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
+
in (lib.optionalAttrs (!stdenv.hostPlatform.isDarwin) {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self; };
+
}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self; };
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self; };
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self; };
+2 -2
pkgs/development/tools/build-managers/bazel/bazel_5/default.nix
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
-
in (if !stdenv.hostPlatform.isDarwin then {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self;};
-
} else {}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self;};
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
+
in (lib.optionalSttrs (!stdenv.hostPlatform.isDarwin) {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self;};
+
}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self;};
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
+2 -2
pkgs/development/tools/build-managers/bazel/bazel_6/default.nix
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
-
in (if !stdenv.hostPlatform.isDarwin then {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self;};
-
} else {}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self;};
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
···
sha256 = "1mm4awx6sa0myiz9j4hwp71rpr7yh8vihf3zm15n2ii6xb82r31k";
};
+
in (lib.optionalAttrs (!stdenv.hostPlatform.isDarwin) {
# `extracted` doesn’t work on darwin
shebang = callPackage ../shebang-test.nix { inherit runLocal extracted bazelTest distDir; bazel = bazel_self;};
+
}) // {
bashTools = callPackage ../bash-tools-test.nix { inherit runLocal bazelTest distDir; bazel = bazel_self;};
cpp = callPackage ../cpp-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};
java = callPackage ../java-test.nix { inherit runLocal bazelTest bazel-examples distDir; bazel = bazel_self;};