Merge branch 'master' into staging-next

Changed files
+744 -413
doc
languages-frameworks
nixos
doc
manual
release-notes
modules
config
services
security
web-apps
ihatemoney
web-servers
system
boot
loader
raspberrypi
tests
dnscrypt-wrapper
git
google-oslogin
hitch
hocker-fetchdocker
hydra
krb5
mysql
nextcloud
nfs
web-servers
wireguard
xmpp
pkgs
applications
editors
emacs-modes
misc
dockbarx
raiseorlaunch
remarkable
remarkable-mouse
networking
flexget
science
logic
window-managers
desktops
pantheon
development
compilers
go-modules
generic
go-packages
generic
haskell-modules
interpreters
libraries
argtable
libgda
libjson-rpc-cpp
libmicrohttpd
python-modules
asyncio-dgram
clifford
commandparse
nixpkgs
python-engineio
shiboken2
tools
gotools
misc
ctags
texlab
poetry2nix
poetry2nix
games
servers
http
nginx
uwsgi
zigbee2mqtt
tools
misc
argtable
networking
urlwatch
security
badchars
ldeep
top-level
+1 -1
doc/languages-frameworks/emscripten.section.md
···
echo "================= /testing zlib using node ================="
'';
-
postPatch = pkgs.stdenv.lib.optionalString pkgs.stdenv.isDarwin ''
+
postPatch = pkgs.lib.optionalString pkgs.stdenv.isDarwin ''
substituteInPlace configure \
--replace '/usr/bin/libtool' 'ar' \
--replace 'AR="libtool"' 'AR="ar"' \
+30
nixos/doc/manual/release-notes/rl-2103.xml
···
</listitem>
<listitem>
<para>
+
The uWSGI server is now built with POSIX capabilities. As a consequence,
+
root is no longer required in emperor mode and the service defaults to
+
running as the unprivileged <literal>uwsgi</literal> user. Any additional
+
capability can be added via the new option
+
<xref linkend="opt-services.uwsgi.capabilities"/>.
+
The previous behaviour can be restored by setting:
+
<programlisting>
+
<xref linkend="opt-services.uwsgi.user"/> = "root";
+
<xref linkend="opt-services.uwsgi.group"/> = "root";
+
<xref linkend="opt-services.uwsgi.instance"/> =
+
{
+
uid = "uwsgi";
+
gid = "uwsgi";
+
};
+
</programlisting>
+
</para>
+
<para>
+
Another incompatibility from the previous release is that vassals running under a
+
different user or group need to use <literal>immediate-{uid,gid}</literal>
+
instead of the usual <literal>uid,gid</literal> options.
+
</para>
+
</listitem>
+
<listitem>
+
<para>
<package>btc1</package> has been abandoned upstream, and removed.
</para>
</listitem>
···
<para>
The GNOME desktop manager once again installs <package>gnome3.epiphany</package> by default.
</para>
+
</listitem>
+
<listitem>
+
<para>
+
NixOS now generates empty <literal>/etc/netgroup</literal>.
+
<literal>/etc/netgroup</literal> defines network-wide groups and may affect to setups using NIS.
+
</para>
</listitem>
</itemizedlist>
</section>
+4
nixos/modules/config/networking.nix
···
cat ${escapeShellArgs cfg.hostFiles} > $out
'';
+
# /etc/netgroup: Network-wide groups.
+
netgroup.text = mkDefault ''
+
'';
+
# /etc/host.conf: resolver configuration file
"host.conf".text = ''
multi on
+2 -2
nixos/modules/services/security/fprintd.nix
···
config = mkIf cfg.enable {
-
services.dbus.packages = [ pkgs.fprintd ];
+
services.dbus.packages = [ cfg.package ];
-
environment.systemPackages = [ pkgs.fprintd ];
+
environment.systemPackages = [ cfg.package ];
systemd.packages = [ cfg.package ];
+3 -6
nixos/modules/services/web-apps/ihatemoney/default.nix
···
in
{
options.services.ihatemoney = {
-
enable = mkEnableOption "ihatemoney webapp. Note that this will set uwsgi to emperor mode running as root";
+
enable = mkEnableOption "ihatemoney webapp. Note that this will set uwsgi to emperor mode";
backend = mkOption {
type = types.enum [ "sqlite" "postgresql" ];
default = "sqlite";
···
services.uwsgi = {
enable = true;
plugins = [ "python3" ];
-
# the vassal needs to be able to setuid
-
user = "root";
-
group = "root";
instance = {
type = "emperor";
vassals.ihatemoney = {
type = "normal";
strict = true;
-
uid = user;
-
gid = group;
+
immediate-uid = user;
+
immediate-gid = group;
# apparently flask uses threads: https://github.com/spiral-project/ihatemoney/commit/c7815e48781b6d3a457eaff1808d179402558f8c
enable-threads = true;
module = "wsgi:application";
+59 -12
nixos/modules/services/web-servers/uwsgi.nix
···
let
cfg = config.services.uwsgi;
+
isEmperor = cfg.instance.type == "emperor";
+
+
imperialPowers =
+
[
+
# spawn other user processes
+
"CAP_SETUID" "CAP_SETGID"
+
"CAP_SYS_CHROOT"
+
# transfer capabilities
+
"CAP_SETPCAP"
+
# create other user sockets
+
"CAP_CHOWN"
+
];
+
buildCfg = name: c:
let
plugins =
if any (n: !any (m: m == n) cfg.plugins) (c.plugins or [])
-
then throw "`plugins` attribute in UWSGI configuration contains plugins not in config.services.uwsgi.plugins"
+
then throw "`plugins` attribute in uWSGI configuration contains plugins not in config.services.uwsgi.plugins"
else c.plugins or cfg.plugins;
hasPython = v: filter (n: n == "python${v}") plugins != [];
···
python =
if hasPython2 && hasPython3 then
-
throw "`plugins` attribute in UWSGI configuration shouldn't contain both python2 and python3"
+
throw "`plugins` attribute in uWSGI configuration shouldn't contain both python2 and python3"
else if hasPython2 then cfg.package.python2
else if hasPython3 then cfg.package.python3
else null;
···
oldPaths = filter (x: x != null) (map getPath env');
in env' ++ [ "PATH=${optionalString (oldPaths != []) "${last oldPaths}:"}${pythonEnv}/bin" ];
}
-
else if c.type == "emperor"
+
else if isEmperor
then {
emperor = if builtins.typeOf c.vassals != "set" then c.vassals
else pkgs.buildEnv {
···
paths = mapAttrsToList buildCfg c.vassals;
};
} // removeAttrs c [ "type" "vassals" ]
-
else throw "`type` attribute in UWSGI configuration should be either 'normal' or 'emperor'";
+
else throw "`type` attribute in uWSGI configuration should be either 'normal' or 'emperor'";
};
in pkgs.writeTextDir "${name}.json" (builtins.toJSON uwsgiCfg);
···
};
instance = mkOption {
-
type = with lib.types; let
+
type = with types; let
valueType = nullOr (oneOf [
bool
int
···
user = mkOption {
type = types.str;
default = "uwsgi";
-
description = "User account under which uwsgi runs.";
+
description = "User account under which uWSGI runs.";
};
group = mkOption {
type = types.str;
default = "uwsgi";
-
description = "Group account under which uwsgi runs.";
+
description = "Group account under which uWSGI runs.";
+
};
+
+
capabilities = mkOption {
+
type = types.listOf types.str;
+
apply = caps: caps ++ optionals isEmperor imperialPowers;
+
default = [ ];
+
example = literalExample ''
+
[
+
"CAP_NET_BIND_SERVICE" # bind on ports <1024
+
"CAP_NET_RAW" # open raw sockets
+
]
+
'';
+
description = ''
+
Grant capabilities to the uWSGI instance. See the
+
<literal>capabilities(7)</literal> for available values.
+
<note>
+
<para>
+
uWSGI runs as an unprivileged user (even as Emperor) with the minimal
+
capabilities required. This option can be used to add fine-grained
+
permissions without running the service as root.
+
</para>
+
<para>
+
When in Emperor mode, any capability to be inherited by a vassal must
+
be specified again in the vassal configuration using <literal>cap</literal>.
+
See the uWSGI <link
+
xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link>
+
for more information.
+
</para>
+
</note>
+
'';
};
};
};
config = mkIf cfg.enable {
+
systemd.tmpfiles.rules = optional (cfg.runDir != "/run/uwsgi") ''
+
d ${cfg.runDir} 775 ${cfg.user} ${cfg.group}
+
'';
+
systemd.services.uwsgi = {
wantedBy = [ "multi-user.target" ];
-
preStart = ''
-
mkdir -p ${cfg.runDir}
-
chown ${cfg.user}:${cfg.group} ${cfg.runDir}
-
'';
serviceConfig = {
+
User = cfg.user;
+
Group = cfg.group;
Type = "notify";
-
ExecStart = "${cfg.package}/bin/uwsgi --uid ${cfg.user} --gid ${cfg.group} --json ${buildCfg "server" cfg.instance}/server.json";
+
ExecStart = "${cfg.package}/bin/uwsgi --json ${buildCfg "server" cfg.instance}/server.json";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
ExecStop = "${pkgs.coreutils}/bin/kill -INT $MAINPID";
NotifyAccess = "main";
KillSignal = "SIGQUIT";
+
AmbientCapabilities = cfg.capabilities;
+
CapabilityBoundingSet = cfg.capabilities;
};
};
+1 -1
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
···
timeoutStr = if blCfg.timeout == null then "-1" else toString blCfg.timeout;
isAarch64 = pkgs.stdenv.hostPlatform.isAarch64;
-
optional = pkgs.stdenv.lib.optionalString;
+
optional = pkgs.lib.optionalString;
configTxt =
pkgs.writeText "config.txt" (''
+1 -1
nixos/tests/3proxy.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "3proxy";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ misuzu ];
};
+1 -1
nixos/tests/agda.nix
···
in
{
name = "agda";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ alexarice turion ];
};
+1 -1
nixos/tests/ammonite.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "ammonite";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/atd.nix
···
{
name = "atd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bjornfor ];
};
+1 -1
nixos/tests/avahi.nix
···
# Test whether `avahi-daemon' and `libnss-mdns' work as expected.
import ./make-test-python.nix {
name = "avahi";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/awscli.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "awscli";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/babeld.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "babeld";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hexa ];
};
+1 -1
nixos/tests/bat.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "bat";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
machine = { pkgs, ... }: { environment.systemPackages = [ pkgs.bat ]; };
+1 -1
nixos/tests/bcachefs.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "bcachefs";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chiiruno ];
+
meta.maintainers = with pkgs.lib.maintainers; [ chiiruno ];
machine = { pkgs, ... }: {
virtualisation.emptyDiskImages = [ 4096 ];
+1 -1
nixos/tests/bitcoind.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "bitcoind";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ _1000101 ];
};
+1 -1
nixos/tests/bittorrent.nix
···
{
name = "bittorrent";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ domenkozar eelco rob bobvanderlinden ];
};
+1 -1
nixos/tests/bitwarden.nix
···
makeBitwardenTest = backend: makeTest {
name = "bitwarden_rs-${backend}";
meta = {
-
maintainers = with pkgs.stdenv.lib.maintainers; [ jjjollyjim ];
+
maintainers = with pkgs.lib.maintainers; [ jjjollyjim ];
};
nodes = {
+1 -1
nixos/tests/blockbook-frontend.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "blockbook-frontend";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ _1000101 ];
};
+1 -1
nixos/tests/boot-stage1.nix
···
machine.succeed('pgrep -a -f "^kcanary$"')
'';
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ aszlig ];
+
meta.maintainers = with pkgs.lib.maintainers; [ aszlig ];
})
+1 -1
nixos/tests/borgbackup.nix
···
in {
name = "borgbackup";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ dotlambda ];
};
+1 -1
nixos/tests/buildbot.nix
···
bbworker.fail("nc -z bbmaster 8011")
'';
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ nand0p ];
+
meta.maintainers = with pkgs.lib.maintainers; [ nand0p ];
} {}
+1 -1
nixos/tests/buildkite-agents.nix
···
{
name = "buildkite-agent";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ flokli ];
};
+1 -1
nixos/tests/caddy.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "caddy";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ xfix Br1ght0ne ];
};
+1 -1
nixos/tests/cadvisor.nix
···
import ./make-test-python.nix ({ pkgs, ... } : {
name = "cadvisor";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ offline ];
};
+1 -1
nixos/tests/cage.nix
···
{
name = "cage";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ matthewbauer flokli ];
};
+1 -1
nixos/tests/cagebreak.nix
···
in
{
name = "cagebreak";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ berbiche ];
};
+1 -1
nixos/tests/ceph-multi-node.nix
···
'';
in {
name = "basic-multi-node-ceph-cluster";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lejonet ];
};
+1 -1
nixos/tests/ceph-single-node.nix
···
'';
in {
name = "basic-single-node-ceph-cluster";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lejonet johanot ];
};
+1 -1
nixos/tests/charliecloud.nix
···
in {
name = "charliecloud";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bzizou ];
};
+1 -1
nixos/tests/cjdns.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "cjdns";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ehmry ];
};
+1 -1
nixos/tests/clickhouse.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "clickhouse";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ];
+
meta.maintainers = with pkgs.lib.maintainers; [ ma27 ];
machine = {
services.clickhouse.enable = true;
+1 -1
nixos/tests/cloud-init.nix
···
};
in makeTest {
name = "cloud-init";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lewo ];
};
machine = { ... }:
+1 -1
nixos/tests/cockroachdb.nix
···
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "cockroachdb";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers;
+
meta.maintainers = with pkgs.lib.maintainers;
[ thoughtpolice ];
nodes = {
+1 -1
nixos/tests/containers-bridge.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-bridge";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aristid aszlig eelco kampfschlaefer ];
};
+1 -1
nixos/tests/containers-extra_veth.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-extra_veth";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ kampfschlaefer ];
};
+1 -1
nixos/tests/containers-hosts.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-hosts";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ montag451 ];
};
+1 -1
nixos/tests/containers-imperative.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-imperative";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aristid aszlig eelco kampfschlaefer ];
};
+1 -1
nixos/tests/containers-ip.nix
···
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-ipv4-ipv6";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aristid aszlig eelco kampfschlaefer ];
};
+1 -1
nixos/tests/containers-macvlans.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-macvlans";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ montag451 ];
};
+1 -1
nixos/tests/containers-physical_interfaces.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-physical_interfaces";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ kampfschlaefer ];
};
+1 -1
nixos/tests/containers-portforward.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-portforward";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aristid aszlig eelco kampfschlaefer ianwookim ];
};
+1 -1
nixos/tests/containers-reloadable.nix
···
};
in {
name = "containers-reloadable";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ danbst ];
};
+1 -1
nixos/tests/containers-restart_networking.nix
···
in import ./make-test-python.nix ({ pkgs, ...} :
{
name = "containers-restart_networking";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ kampfschlaefer ];
};
+1 -1
nixos/tests/containers-tmpfs.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "containers-tmpfs";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ kampka ];
};
+1 -1
nixos/tests/convos.nix
···
in
{
name = "convos";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ sgo ];
};
+1 -1
nixos/tests/couchdb.nix
···
{
name = "couchdb";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ fpletz ];
};
+1 -1
nixos/tests/cri-o.nix
···
# This test runs CRI-O and verifies via critest
import ./make-test-python.nix ({ pkgs, ... }: {
name = "cri-o";
-
maintainers = with pkgs.stdenv.lib.maintainers; teams.podman.members;
+
maintainers = with pkgs.lib.maintainers; teams.podman.members;
nodes = {
crio = {
+1 -1
nixos/tests/deluge.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "deluge";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ flokli ];
};
+1 -1
nixos/tests/dnscrypt-proxy2.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "dnscrypt-proxy2";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ joachifm ];
};
+1 -1
nixos/tests/dnscrypt-wrapper/default.nix
···
import ../make-test-python.nix ({ pkgs, ... }: {
name = "dnscrypt-wrapper";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ rnhmjoj ];
};
+1 -1
nixos/tests/docker-edge.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "docker";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus offline ];
};
+1 -1
nixos/tests/docker-registry.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "docker-registry";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ globin ma27 ironpinguin ];
};
+1 -1
nixos/tests/docker-tools-cross.nix
···
in {
name = "docker-tools";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ roberth ];
};
+1 -1
nixos/tests/docker-tools-overlay.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "docker-tools-overlay";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 ];
};
+1 -1
nixos/tests/docker-tools.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "docker-tools";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 ];
};
+1 -1
nixos/tests/docker.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "docker";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus offline ];
};
+1 -1
nixos/tests/documize.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "documize";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 ];
};
+1 -1
nixos/tests/dokuwiki.nix
···
in {
name = "dokuwiki";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ _1000101 ];
};
machine = { ... }: {
+1 -1
nixos/tests/elk.nix
···
mkElkTest = name : elk :
import ./make-test-python.nix ({
inherit name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco offline basvandijk ];
};
nodes = {
+1 -1
nixos/tests/emacs-daemon.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "emacs-daemon";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ];
};
+1 -1
nixos/tests/engelsystem.nix
···
{ pkgs, lib, ... }:
{
name = "engelsystem";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ talyz ];
};
+1 -1
nixos/tests/enlightenment.nix
···
{
name = "enlightenment";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ romildo ];
};
+1 -1
nixos/tests/env.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "environment";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/ergo.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "ergo";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/etcd-cluster.nix
···
in {
name = "etcd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ offline ];
};
+1 -1
nixos/tests/etcd.nix
···
import ./make-test-python.nix ({ pkgs, ... } : {
name = "etcd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ offline ];
};
+1 -1
nixos/tests/etesync-dav.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "etesync-dav";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ _3699n ];
};
+1 -1
nixos/tests/fenics.nix
···
{
name = "fenics";
meta = {
-
maintainers = with pkgs.stdenv.lib.maintainers; [ knedlsepp ];
+
maintainers = with pkgs.lib.maintainers; [ knedlsepp ];
};
nodes = {
+1 -1
nixos/tests/ferm.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "ferm";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mic92 ];
};
+1 -1
nixos/tests/firefox.nix
···
import ./make-test-python.nix ({ pkgs, esr ? false, ... }: {
name = "firefox";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco shlevy ];
};
+1 -1
nixos/tests/firejail.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "firejail";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ sgo ];
};
+1 -1
nixos/tests/firewall.nix
···
import ./make-test-python.nix ( { pkgs, ... } : {
name = "firewall";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/freeswitch.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "freeswitch";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ misuzu ];
};
nodes = {
+1 -1
nixos/tests/gerrit.nix
···
in {
name = "gerrit";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ flokli zimbatm ];
};
+1 -1
nixos/tests/git/hub.nix
···
import ../make-test-python.nix ({ pkgs, ...} : {
name = "hub";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/gitdaemon.nix
···
in {
name = "gitdaemon";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ tilpner ];
};
+1 -1
nixos/tests/gitlab.nix
···
in
import ./make-test-python.nix ({ pkgs, lib, ...} : with lib; {
name = "gitlab";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ globin ];
};
+1 -1
nixos/tests/gitolite-fcgiwrap.nix
···
{
name = "gitolite-fcgiwrap";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bbigras ];
};
+1 -1
nixos/tests/gitolite.nix
···
{
name = "gitolite";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bjornfor ];
};
+1 -1
nixos/tests/go-neb.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "go-neb";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hexa maralorn ];
};
+1 -1
nixos/tests/gocd-agent.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "gocd-agent";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ grahamc swarren83 ];
# gocd agent needs to register with the autoregister key created on first server startup,
+1 -1
nixos/tests/gocd-server.nix
···
{
name = "gocd-server";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ swarren83 ];
};
+1 -1
nixos/tests/google-oslogin/default.nix
···
'';
in {
name = "google-oslogin";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ adisbladis flokli ];
};
+1 -1
nixos/tests/gotify-server.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "gotify-server";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 ];
};
+1 -1
nixos/tests/grocy.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "grocy";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 ];
};
+1 -1
nixos/tests/gvisor.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "gvisor";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ andrew-d ];
};
+1 -1
nixos/tests/haka.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "haka";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ tvestelind ];
};
+1 -1
nixos/tests/handbrake.nix
···
name = "handbrake";
meta = {
-
maintainers = with pkgs.stdenv.lib.maintainers; [ danieldk ];
+
maintainers = with pkgs.lib.maintainers; [ danieldk ];
};
machine = { pkgs, ... }: {
+1 -1
nixos/tests/hardened.nix
···
import ./make-test-python.nix ({ pkgs, latestKernel ? false, ... } : {
name = "hardened";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ joachifm ];
};
+1 -1
nixos/tests/hitch/default.nix
···
import ../make-test-python.nix ({ pkgs, ... }:
{
name = "hitch";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ jflanglois ];
};
machine = { pkgs, ... }: {
+1 -1
nixos/tests/hocker-fetchdocker/default.nix
···
import ../make-test-python.nix ({ pkgs, ...} : {
name = "test-hocker-fetchdocker";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ixmatus ];
broken = true; # tries to download from registry-1.docker.io - how did this ever work?
};
+1 -1
nixos/tests/home-assistant.nix
···
mqttPassword = "secret";
in {
name = "home-assistant";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ dotlambda ];
};
+1 -1
nixos/tests/hostname.nix
···
in
makeTest {
name = "hostname-${fqdn}";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ primeos blitz ];
};
+1 -1
nixos/tests/hound.nix
···
# Test whether `houndd` indexes nixpkgs
import ./make-test-python.nix ({ pkgs, ... } : {
name = "hound";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ grahamc ];
};
machine = { pkgs, ... }: {
+1 -1
nixos/tests/hydra/common.nix
···
buildInputs = [ pkgs.makeWrapper ];
installPhase = "install -m755 -D ${./create-trivial-project.sh} $out/bin/create-trivial-project.sh";
postFixup = ''
-
wrapProgram "$out/bin/create-trivial-project.sh" --prefix PATH ":" ${pkgs.stdenv.lib.makeBinPath [ pkgs.curl ]} --set EXPR_PATH ${trivialJob}
+
wrapProgram "$out/bin/create-trivial-project.sh" --prefix PATH ":" ${pkgs.lib.makeBinPath [ pkgs.curl ]} --set EXPR_PATH ${trivialJob}
'';
};
in {
+1 -1
nixos/tests/hydra/default.nix
···
makeHydraTest = with pkgs.lib; name: package: makeTest {
name = "hydra-${name}";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ pstn lewo ma27 ];
};
+1 -1
nixos/tests/i3wm.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "i3wm";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aszlig ];
};
+1 -1
nixos/tests/icingaweb2.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "icingaweb2";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ das_j ];
};
+1 -1
nixos/tests/iftop.nix
···
{
name = "iftop";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ];
+
meta.maintainers = with pkgs.lib.maintainers; [ ma27 ];
nodes = {
withIftop = {
+1 -1
nixos/tests/influxdb.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "influxdb";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ offline ];
};
+1 -1
nixos/tests/initrd-network.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "initrd-network";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ];
+
meta.maintainers = [ pkgs.lib.maintainers.eelco ];
machine = { ... }: {
imports = [ ../modules/profiles/minimal.nix ];
+1 -1
nixos/tests/installer.nix
···
makeTest {
inherit enableOCR;
name = "installer-" + name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
# put global maintainers here, individuals go into makeInstallerTest fkt call
maintainers = (meta.maintainers or []);
};
+1 -1
nixos/tests/ipfs.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "ipfs";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mguentner ];
};
+1 -1
nixos/tests/ipv6.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "ipv6";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/jenkins.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "jenkins";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bjornfor coconnor domenkozar eelco ];
};
+1 -1
nixos/tests/jitsi-meet.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "jitsi-meet";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = teams.jitsi.members;
};
+1 -1
nixos/tests/jq.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "jq";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.jq = { pkgs, ... }: { environment.systemPackages = [ pkgs.jq ]; };
+1 -1
nixos/tests/k3s.nix
···
in
{
name = "k3s";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ euank ];
};
+1 -1
nixos/tests/kafka.nix
···
let
makeKafkaTest = name: kafkaPackage: (import ./make-test-python.nix ({
inherit name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/kernel-latest.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "kernel-latest";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/kernel-lts.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "kernel-lts";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/kernel-testing.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "kernel-testing";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/keycloak.nix
···
{ pkgs, databaseType, ... }:
{
name = "keycloak";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ talyz ];
};
+1 -1
nixos/tests/knot.nix
···
'';
in {
name = "knot";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hexa ];
};
+1 -1
nixos/tests/krb5/deprecated-config.nix
···
import ../make-test-python.nix ({ pkgs, ...} : {
name = "krb5-with-deprecated-config";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eqyiel ];
};
+1 -1
nixos/tests/krb5/example-config.nix
···
import ../make-test-python.nix ({ pkgs, ...} : {
name = "krb5-with-example-config";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eqyiel ];
};
+1 -1
nixos/tests/leaps.nix
···
{
name = "leaps";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ qknight ];
};
+1 -1
nixos/tests/lightdm.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "lightdm";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aszlig worldofpeace ];
};
+1 -1
nixos/tests/limesurvey.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "limesurvey";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ];
+
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
machine = { ... }: {
services.limesurvey = {
+1 -1
nixos/tests/locate.nix
···
let inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey;
in {
name = "locate";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chkno ];
+
meta.maintainers = with pkgs.lib.maintainers; [ chkno ];
nodes = rec {
a = {
+1 -1
nixos/tests/login.nix
···
{
name = "login";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/lsd.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "lsd";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.lsd = { pkgs, ... }: { environment.systemPackages = [ pkgs.lsd ]; };
+1 -1
nixos/tests/lxd-nftables.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "lxd-nftables";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ patryk27 ];
};
+1 -1
nixos/tests/lxd.nix
···
in {
name = "lxd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ patryk27 ];
};
+1 -1
nixos/tests/magic-wormhole-mailbox-server.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "magic-wormhole-mailbox-server";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/magnetico.nix
···
in
{
name = "magnetico";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ rnhmjoj ];
};
+1 -1
nixos/tests/matrix-synapse.nix
···
in {
name = "matrix-synapse";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = teams.matrix.members;
};
+1 -1
nixos/tests/metabase.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "metabase";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/minecraft-server.nix
···
rcon-port = 43000;
in import ./make-test-python.nix ({ pkgs, ... }: {
name = "minecraft-server";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.server = { ... }: {
environment.systemPackages = [ pkgs.mcrcon ];
+1 -1
nixos/tests/miniflux.nix
···
with lib;
{
name = "miniflux";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ bricewge ];
+
meta.maintainers = with pkgs.lib.maintainers; [ bricewge ];
nodes = {
default =
+1 -1
nixos/tests/minio.nix
···
'';
in {
name = "minio";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bachp ];
};
+1 -1
nixos/tests/misc.nix
···
import ./make-test-python.nix ({ pkgs, ...} : rec {
name = "misc";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/molly-brown.nix
···
in {
name = "molly-brown";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ ehmry ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ ehmry ]; };
nodes = {
+1 -1
nixos/tests/mongodb.nix
···
in {
name = "mongodb";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bluescreen303 offline cstrahan rvl phile314 ];
};
+1 -1
nixos/tests/morty.nix
···
{
name = "morty";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ leenaars ];
};
+1 -1
nixos/tests/mosquitto.nix
···
topic = "test/foo";
in {
name = "mosquitto";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ peterhoeg ];
};
+1 -1
nixos/tests/mpd.nix
···
};
in {
name = "mpd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ emmanuelrosa ];
};
+1 -1
nixos/tests/mumble.nix
···
in
{
name = "mumble";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ thoughtpolice eelco ];
};
+2 -2
nixos/tests/munin.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "munin";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ domenkozar eelco ];
};
···
};
# increase the systemd timer interval so it fires more often
-
systemd.timers.munin-cron.timerConfig.OnCalendar = pkgs.stdenv.lib.mkForce "*:*:0/10";
+
systemd.timers.munin-cron.timerConfig.OnCalendar = pkgs.lib.mkForce "*:*:0/10";
};
};
+1 -1
nixos/tests/mutable-users.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "mutable-users";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ gleber ];
};
+1 -1
nixos/tests/mxisd.nix
···
import ./make-test-python.nix ({ pkgs, ... } : {
name = "mxisd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mguentner ];
};
+1 -1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
···
in {
name = "mariadb-galera-mariabackup";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ izorkin ];
};
+1 -1
nixos/tests/mysql/mariadb-galera-rsync.nix
···
in {
name = "mariadb-galera-rsync";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ izorkin ];
};
+1 -1
nixos/tests/mysql/mysql-backup.nix
···
# Test whether mysqlBackup option works
import ./../make-test-python.nix ({ pkgs, ... } : {
name = "mysql-backup";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ rvl ];
};
+1 -1
nixos/tests/mysql/mysql-replication.nix
···
{
name = "mysql-replication";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco shlevy ];
};
+2 -2
nixos/tests/mysql/mysql.nix
···
import ./../make-test-python.nix ({ pkgs, ...} : {
name = "mysql";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco shlevy ];
};
···
mariadb.succeed(
"echo 'use testdb; drop table rocksdb;' | sudo -u testuser mysql -u testuser"
)
-
'' + pkgs.stdenv.lib.optionalString pkgs.stdenv.isx86_64 ''
+
'' + pkgs.lib.optionalString pkgs.stdenv.isx86_64 ''
# Check if TokuDB plugin works
mariadb.succeed(
"echo 'use testdb; create table tokudb (test_id INT, PRIMARY KEY (test_id)) ENGINE = TokuDB;' | sudo -u testuser mysql -u testuser"
+1 -1
nixos/tests/nagios.nix
···
import ./make-test-python.nix (
{ pkgs, ... }: {
name = "nagios";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ symphorien ];
};
+1 -1
nixos/tests/nano.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "nano";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/nat.nix
···
{
name = "nat" + (if withFirewall then "WithFirewall" else "Standalone")
+ (lib.optionalString withConntrackHelpers "withConntrackHelpers");
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco rob ];
};
+1 -1
nixos/tests/ncdns.nix
···
{
name = "ncdns";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ rnhmjoj ];
};
+1 -1
nixos/tests/ndppd.nix
···
import ./make-test-python.nix ({ pkgs, lib, ...} : {
name = "ndppd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ fpletz ];
};
+1 -1
nixos/tests/netdata.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "netdata";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ cransom ];
};
+1 -1
nixos/tests/networking-proxy.nix
···
};
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "networking-proxy";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ];
};
+1 -1
nixos/tests/nextcloud/basic.nix
···
adminuser = "root";
in {
name = "nextcloud-basic";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ globin eqyiel ];
};
+1 -1
nixos/tests/nextcloud/with-mysql-and-memcached.nix
···
adminuser = "root";
in {
name = "nextcloud-with-mysql-and-memcached";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eqyiel ];
};
+1 -1
nixos/tests/nextcloud/with-postgresql-and-redis.nix
···
adminuser = "custom-admin-username";
in {
name = "nextcloud-with-postgresql-and-redis";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eqyiel ];
};
+1 -1
nixos/tests/nexus.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "nexus";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ironpinguin ma27 ];
};
+1 -1
nixos/tests/nfs/simple.nix
···
{
name = "nfs";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/nginx-sandbox.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "nginx-sandbox";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ izorkin ];
};
+1 -1
nixos/tests/nginx-sso.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "nginx-sso";
meta = {
-
maintainers = with pkgs.stdenv.lib.maintainers; [ delroth ];
+
maintainers = with pkgs.lib.maintainers; [ delroth ];
};
machine = {
+1 -1
nixos/tests/nginx.nix
···
# 3. nginx doesn't restart on configuration changes (only reloads)
import ./make-test-python.nix ({ pkgs, ... }: {
name = "nginx";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mbbx6spp danbst ];
};
+1 -1
nixos/tests/novacomd.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "novacomd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ dtzWill ];
};
+1 -1
nixos/tests/nsd.nix
···
};
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "nsd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aszlig ];
};
+2 -2
nixos/tests/nzbget.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "nzbget";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aanderse flokli ];
};
···
# hack, don't add (unfree) unrar to nzbget's path,
# so we can run this test in CI
-
systemd.services.nzbget.path = pkgs.stdenv.lib.mkForce [ pkgs.p7zip ];
+
systemd.services.nzbget.path = pkgs.lib.mkForce [ pkgs.p7zip ];
};
};
+1 -1
nixos/tests/openarena.nix
···
in {
name = "openarena";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ fpletz ];
};
+1 -1
nixos/tests/openssh.nix
···
snakeOilPrivateKey snakeOilPublicKey;
in {
name = "openssh";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aszlig eelco ];
};
+1 -1
nixos/tests/opentabletdriver.nix
···
import ./make-test-python.nix ( { pkgs, ... }: {
name = "opentabletdriver";
meta = {
-
maintainers = with pkgs.stdenv.lib.maintainers; [ thiagokokada ];
+
maintainers = with pkgs.lib.maintainers; [ thiagokokada ];
};
machine = { pkgs, ... }:
+1 -1
nixos/tests/overlayfs.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "overlayfs";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ bachp ];
+
meta.maintainers = with pkgs.lib.maintainers; [ bachp ];
machine = { pkgs, ... }: {
virtualisation.emptyDiskImages = [ 512 ];
+1 -1
nixos/tests/packagekit.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "packagekit";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ peterhoeg ];
};
+1 -1
nixos/tests/pantheon.nix
···
{
name = "pantheon";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = pkgs.pantheon.maintainers;
};
+1 -1
nixos/tests/peerflix.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "peerflix";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ offline ];
};
+1 -1
nixos/tests/pgmanage.nix
···
in
{
name = "pgmanage";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ basvandijk ];
};
nodes = {
+1 -1
nixos/tests/pinnwand.nix
···
in
{
name = "pinnwand";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers =[ hexa ];
};
+1 -1
nixos/tests/plasma5.nix
···
{
name = "plasma5";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ttuegel ];
};
+1 -1
nixos/tests/postgis.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "postgis";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lsix ];
};
+1 -1
nixos/tests/postgresql.nix
···
'';
make-postgresql-test = postgresql-name: postgresql-package: backup-all: makeTest {
name = postgresql-name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ zagy ];
};
+1 -1
nixos/tests/printing.nix
···
in {
name = "printing";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ domenkozar eelco matthewbauer ];
};
+1 -1
nixos/tests/privacyidea.nix
···
import ./make-test-python.nix ({ pkgs, ...} : rec {
name = "privacyidea";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ fpletz ];
};
+1 -1
nixos/tests/proxy.nix
···
};
in {
name = "proxy";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/pt2-clone.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "pt2-clone";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ fgaz ];
};
+1 -1
nixos/tests/quagga.nix
···
{
name = "quagga";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ tavyc ];
};
+1 -1
nixos/tests/quorum.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "quorum";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/rabbitmq.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "rabbitmq";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco offline ];
};
+25 -4
nixos/tests/redis.nix
···
-
import ./make-test-python.nix ({ pkgs, ...} : {
+
import ./make-test-python.nix ({ pkgs, ... }:
+
let
+
redisSocket = "/run/redis/redis.sock";
+
in
+
{
name = "redis";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ flokli ];
};
···
{
services.redis.enable = true;
-
services.redis.unixSocket = "/run/redis/redis.sock";
+
services.redis.unixSocket = redisSocket;
+
+
# Allow access to the unix socket for the "redis" group.
+
services.redis.settings.unixsocketperm = "770";
+
+
users.users."member" = {
+
createHome = false;
+
description = "A member of the redis group";
+
extraGroups = [
+
"redis"
+
];
+
group = "users";
+
shell = "/bin/sh";
+
};
};
};
···
start_all()
machine.wait_for_unit("redis")
machine.wait_for_open_port("6379")
+
+
# The unix socket is accessible to the redis group
+
machine.succeed('su member -c "redis-cli ping | grep PONG"')
+
machine.succeed("redis-cli ping | grep PONG")
-
machine.succeed("redis-cli -s /run/redis/redis.sock ping | grep PONG")
+
machine.succeed("redis-cli -s ${redisSocket} ping | grep PONG")
'';
})
+1 -1
nixos/tests/resolv.nix
···
# Test whether DNS resolving returns multiple records and all address families.
import ./make-test-python.nix ({ pkgs, ... } : {
name = "resolv";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ckauhaus ];
};
+1 -1
nixos/tests/restic.nix
···
{
name = "restic";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bbigras i077 ];
};
+1 -1
nixos/tests/ripgrep.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "ripgrep";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.ripgrep = { pkgs, ... }: { environment.systemPackages = [ pkgs.ripgrep ]; };
+1 -1
nixos/tests/robustirc-bridge.nix
···
{
name = "robustirc-bridge";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hax404 ];
};
+1 -1
nixos/tests/roundcube.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "roundcube";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ globin ];
};
+2 -2
nixos/tests/rsyslogd.nix
···
{
test1 = makeTest {
name = "rsyslogd-test1";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ];
+
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
machine = { config, pkgs, ... }: {
services.rsyslogd.enable = true;
···
test2 = makeTest {
name = "rsyslogd-test2";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ];
+
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
machine = { config, pkgs, ... }: {
services.rsyslogd.enable = true;
+1 -1
nixos/tests/samba-wsdd.nix
···
{
name = "samba-wsdd";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ izorkin ];
+
meta.maintainers = with pkgs.lib.maintainers; [ izorkin ];
nodes = {
client_wsdd = { pkgs, ... }: {
+1 -1
nixos/tests/sanoid.nix
···
};
in {
name = "sanoid";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lopsided98 ];
};
+1 -1
nixos/tests/sbt-extras.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "sbt-extras";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/sbt.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "sbt";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/scala.nix
···
let
common = name: package: (import ./make-test-python.nix ({
inherit name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/sddm.nix
···
autoLogin = {
name = "sddm-autologin";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ttuegel ];
};
+1 -1
nixos/tests/service-runner.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "service-runner";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ roberth ];
};
+1 -1
nixos/tests/shadow.nix
···
password4 = "asdf123";
in import ./make-test-python.nix ({ pkgs, ... }: {
name = "shadow";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.shadow = { pkgs, ... }: {
environment.systemPackages = [ pkgs.shadow ];
+1 -1
nixos/tests/signal-desktop.nix
···
{
name = "signal-desktop";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ flokli ];
};
+1 -1
nixos/tests/simple.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "simple";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/smokeping.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "smokeping";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ cransom ];
};
+1 -1
nixos/tests/snapcast.nix
···
httpPort = 10080;
in {
name = "snapcast";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hexa ];
};
+1 -1
nixos/tests/sogo.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "sogo";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ajs124 das_j ];
};
+1 -1
nixos/tests/solr.nix
···
{
name = "solr";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ];
+
meta.maintainers = [ pkgs.lib.maintainers.aanderse ];
machine =
{ config, pkgs, ... }:
+2 -2
nixos/tests/spike.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
let
-
riscvPkgs = import ../.. { crossSystem = pkgs.stdenv.lib.systems.examples.riscv64-embedded; };
+
riscvPkgs = import ../.. { crossSystem = pkgs.lib.systems.examples.riscv64-embedded; };
in
{
name = "spike";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ blitz ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ blitz ]; };
machine = { pkgs, lib, ... }: {
environment.systemPackages = [ pkgs.spike riscvPkgs.riscv-pk riscvPkgs.hello ];
+1 -1
nixos/tests/sssd-ldap.nix
···
in import ./make-test-python.nix {
name = "sssd-ldap";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bbigras ];
};
+1 -1
nixos/tests/sssd.nix
···
{
name = "sssd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bbigras ];
};
machine = { pkgs, ... }: {
+1 -1
nixos/tests/strongswan-swanctl.nix
···
proposals = [ "aes128-sha256-x25519" ];
in {
name = "strongswan-swanctl";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ];
+
meta.maintainers = with pkgs.lib.maintainers; [ basvandijk ];
nodes = {
alice = { ... } : {
+1 -1
nixos/tests/sudo.nix
···
in
import ./make-test-python.nix ({ pkgs, ...} : {
name = "sudo";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lschuermann ];
};
+1 -1
nixos/tests/switch-test.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "switch-test";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ gleber ];
};
+1 -1
nixos/tests/syncthing-init.nix
···
in {
name = "syncthing-init";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ lassulus ];
+
meta.maintainers = with pkgs.lib.maintainers; [ lassulus ];
machine = {
services.syncthing = {
+1 -1
nixos/tests/syncthing-relay.nix
···
import ./make-test-python.nix ({ lib, pkgs, ... }: {
name = "syncthing-relay";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ delroth ];
+
meta.maintainers = with pkgs.lib.maintainers; [ delroth ];
machine = {
environment.systemPackages = [ pkgs.jq ];
+1 -1
nixos/tests/syncthing.nix
···
import ./make-test-python.nix ({ lib, pkgs, ... }: {
name = "syncthing";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chkno ];
+
meta.maintainers = with pkgs.lib.maintainers; [ chkno ];
nodes = rec {
a = {
+1 -1
nixos/tests/systemd-analyze.nix
···
{
name = "systemd-analyze";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ raskin ];
};
+3 -3
nixos/tests/systemd-boot.nix
···
{
basic = makeTest {
name = "systemd-boot";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ];
+
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
machine = common;
···
# Boot without having created an EFI entry--instead using default "/EFI/BOOT/BOOTX64.EFI"
fallback = makeTest {
name = "systemd-boot-fallback";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ];
+
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
machine = { pkgs, lib, ... }: {
imports = [ common ];
···
update = makeTest {
name = "systemd-boot-update";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ];
+
meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ];
machine = common;
+1 -1
nixos/tests/systemd-journal.nix
···
{
name = "systemd-journal";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lewo ];
};
+1 -1
nixos/tests/systemd-networkd-dhcpserver.nix
···
# reachable via the DHCP allocated address.
import ./make-test-python.nix ({pkgs, ...}: {
name = "systemd-networkd-dhcpserver";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ tomfitzhenry ];
};
nodes = {
+1 -1
nixos/tests/systemd-networkd-ipv6-prefix-delegation.nix
···
import ./make-test-python.nix ({pkgs, ...}: {
name = "systemd-networkd-ipv6-prefix-delegation";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ andir ];
};
nodes = {
+1 -1
nixos/tests/systemd-networkd.nix
···
};
in import ./make-test-python.nix ({pkgs, ... }: {
name = "networkd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ninjatrappeur ];
};
nodes = {
+1 -1
nixos/tests/teeworlds.nix
···
in {
name = "teeworlds";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ hax404 ];
};
+1 -1
nixos/tests/telegraf.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "telegraf";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mic92 ];
};
+1 -1
nixos/tests/trac.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "trac";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/traefik.nix
···
# and a Docker container.
import ./make-test-python.nix ({ pkgs, ... }: {
name = "traefik";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ joko ];
};
+1 -1
nixos/tests/transmission.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "transmission";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ coconnor ];
};
+1 -1
nixos/tests/trezord.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "trezord";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ mmahut _1000101 ];
};
nodes = {
+1 -1
nixos/tests/trickster.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "trickster";
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
maintainers = with maintainers; [ _1000101 ];
};
+1 -1
nixos/tests/tuptime.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "tuptime";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ evils ];
};
+1 -1
nixos/tests/ucg.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "ucg";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ AndersonTorres ];
};
+1 -1
nixos/tests/udisks2.nix
···
{
name = "udisks2";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ eelco ];
};
+1 -1
nixos/tests/unbound.nix
···
in
{
name = "unbound";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ andir ];
};
+1 -1
nixos/tests/upnp.nix
···
in
{
name = "upnp";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ bobvanderlinden ];
};
+46 -17
nixos/tests/uwsgi.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "uwsgi";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 ];
};
machine = { pkgs, ... }: {
-
services.uwsgi.enable = true;
-
services.uwsgi.plugins = [ "python3" "php" ];
-
services.uwsgi.instance = {
-
type = "emperor";
-
vassals.python = {
+
users.users.hello =
+
{ isSystemUser = true;
+
group = "hello";
+
};
+
users.groups.hello = { };
+
+
services.uwsgi = {
+
enable = true;
+
plugins = [ "python3" "php" ];
+
capabilities = [ "CAP_NET_BIND_SERVICE" ];
+
instance.type = "emperor";
+
+
instance.vassals.hello = {
type = "normal";
-
master = true;
-
workers = 2;
-
http = ":8000";
+
immediate-uid = "hello";
+
immediate-gid = "hello";
module = "wsgi:application";
+
http = ":80";
+
cap = "net_bind_service";
+
pythonPackages = self: [ self.flask ];
chdir = pkgs.writeTextDir "wsgi.py" ''
from flask import Flask
+
import subprocess
application = Flask(__name__)
@application.route("/")
def hello():
-
return "Hello World!"
+
return "Hello, World!"
+
+
@application.route("/whoami")
+
def whoami():
+
whoami = "${pkgs.coreutils}/bin/whoami"
+
proc = subprocess.run(whoami, capture_output=True)
+
return proc.stdout.decode().strip()
'';
-
pythonPackages = self: with self; [ flask ];
};
-
vassals.php = {
+
+
instance.vassals.php = {
type = "normal";
master = true;
workers = 2;
-
http-socket = ":8001";
+
http-socket = ":8000";
http-socket-modifier1 = 14;
php-index = "index.php";
php-docroot = pkgs.writeTextDir "index.php" ''
···
''
machine.wait_for_unit("multi-user.target")
machine.wait_for_unit("uwsgi.service")
-
machine.wait_for_open_port(8000)
-
machine.wait_for_open_port(8001)
-
assert "Hello World" in machine.succeed("curl -fv 127.0.0.1:8000")
-
assert "Hello World" in machine.succeed("curl -fv 127.0.0.1:8001")
+
+
with subtest("uWSGI has started"):
+
machine.wait_for_unit("uwsgi.service")
+
+
with subtest("Vassal can bind on port <1024"):
+
machine.wait_for_open_port(80)
+
hello = machine.succeed("curl -f http://machine").strip()
+
assert "Hello, World!" in hello, f"Excepted 'Hello, World!', got '{hello}'"
+
+
with subtest("Vassal is running as dedicated user"):
+
username = machine.succeed("curl -f http://machine/whoami").strip()
+
assert username == "hello", f"Excepted 'hello', got '{username}'"
+
+
with subtest("PHP plugin is working"):
+
machine.wait_for_open_port(8000)
+
assert "Hello World" in machine.succeed("curl -fv http://machine:8000")
'';
})
+1 -1
nixos/tests/vault.nix
···
import ./make-test-python.nix ({ pkgs, ... }:
{
name = "vault";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ lnl7 ];
};
machine = { pkgs, ... }: {
+1 -1
nixos/tests/vector.nix
···
{
test1 = makeTest {
name = "vector-test1";
-
meta.maintainers = [ pkgs.stdenv.lib.maintainers.happysalada ];
+
meta.maintainers = [ pkgs.lib.maintainers.happysalada ];
machine = { config, pkgs, ... }: {
services.vector = {
+1 -1
nixos/tests/victoriametrics.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "victoriametrics";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ yorickvp ];
};
+1 -1
nixos/tests/virtualbox.nix
···
# (keep black happy)
'';
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ aszlig cdepillabout ];
};
};
+1 -1
nixos/tests/wasabibackend.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "wasabibackend";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ mmahut ];
};
+1 -1
nixos/tests/web-servers/unit-php.nix
···
in {
name = "unit-php-test";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ izorkin ];
+
meta.maintainers = with pkgs.lib.maintainers; [ izorkin ];
machine = { config, lib, pkgs, ... }: {
services.unit = {
+1 -1
nixos/tests/wireguard/basic.nix
···
in
{
name = "wireguard";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 ];
};
+1 -1
nixos/tests/wireguard/generated.nix
···
{ kernelPackages ? null }:
import ../make-test-python.nix ({ pkgs, lib, ... } : {
name = "wireguard-generated";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 grahamc ];
};
+1 -1
nixos/tests/wireguard/namespaces.nix
···
import ../make-test-python.nix ({ pkgs, lib, ... } : {
name = "wireguard-with-namespaces";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ asymmetric ];
};
+1 -1
nixos/tests/wireguard/wg-quick.nix
···
in
{
name = "wg-quick";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ xwvvvvwx ];
};
+1 -1
nixos/tests/wordpress.nix
···
{
name = "wordpress";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [
flokli
grahamc # under duress!
+1 -1
nixos/tests/xautolock.nix
···
{
name = "xautolock";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ];
+
meta.maintainers = with pkgs.lib.maintainers; [ ma27 ];
nodes.machine = {
imports = [ ./common/x11.nix ./common/user-account.nix ];
+1 -1
nixos/tests/xmonad.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "xmonad";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/xmpp/ejabberd.nix
···
import ../make-test-python.nix ({ pkgs, ... }: {
name = "ejabberd";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ajs124 ];
};
nodes = {
+1 -1
nixos/tests/xrdp.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "xrdp";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ volth ];
};
+1 -1
nixos/tests/xss-lock.nix
···
{
name = "xss-lock";
-
meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ];
+
meta.maintainers = with pkgs.lib.maintainers; [ ma27 ];
nodes = {
simple = {
+1 -1
nixos/tests/xterm.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "xterm";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ];
};
+1 -1
nixos/tests/yabar.nix
···
{
name = "yabar";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ ma27 ];
};
+1 -1
nixos/tests/yggdrasil.nix
···
in import ./make-test-python.nix ({ pkgs, ...} : {
name = "yggdrasil";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ gazally ];
};
+1 -1
nixos/tests/yq.nix
···
import ./make-test-python.nix ({ pkgs, ... }: {
name = "yq";
-
meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; };
+
meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; };
nodes.yq = { pkgs, ... }: { environment.systemPackages = with pkgs; [ jq yq ]; };
+1 -1
nixos/tests/zfs.nix
···
}:
makeTest {
name = "zfs-" + name;
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ adisbladis ];
};
+1 -1
nixos/tests/zookeeper.nix
···
in {
name = "zookeeper";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ nequissimus ztzg ];
};
+1 -1
nixos/tests/zsh-history.nix
···
import ./make-test-python.nix ({ pkgs, ...} : {
name = "zsh-history";
-
meta = with pkgs.stdenv.lib.maintainers; {
+
meta = with pkgs.lib.maintainers; {
maintainers = [ kampka ];
};
+13
pkgs/applications/editors/emacs-modes/manual-packages.nix
···
org-mac-link =
callPackage ./org-mac-link { };
+
ott-mode = self.trivialBuild {
+
pname = "ott-mod";
+
+
inherit (external.ott) src version;
+
+
postUnpack = "mv $sourceRoot/emacs/ott-mode.el $sourceRoot";
+
+
meta = {
+
description = "Standalone package providing ott-mode without building ott and with compiled bytecode.";
+
inherit (external.Agda.meta) homepage license;
+
};
+
};
+
perl-completion =
callPackage ./perl-completion { };
+3
pkgs/applications/misc/dockbarx/default.nix
···
++ (with gnome2; [ gnome_python gnome_python_desktop ])
++ [ keybinder ];
+
# no tests
+
doCheck = false;
+
meta = with stdenv.lib; {
homepage = "https://launchpad.net/dockbar/";
description = "Lightweight taskbar / panel replacement for Linux which works as a stand-alone dock";
+4 -1
pkgs/applications/misc/raiseorlaunch/default.nix
···
};
nativeBuildInputs = [ python3Packages.setuptools_scm ];
-
checkInputs = [ python3Packages.pytest ];
pythonPath = with python3Packages; [ i3ipc ];
+
+
# no tests
+
doCheck = false;
+
pythonImportsCheck = [ "raiseorlaunch" ];
meta = with lib; {
maintainers = with maintainers; [ winpat ];
+4
pkgs/applications/misc/remarkable/remarkable-mouse/default.nix
···
propagatedBuildInputs = with python3Packages; [ screeninfo paramiko pynput libevdev ];
+
# no tests
+
doCheck = false;
+
pythonImportsCheck = [ "remarkable_mouse" ];
+
meta = with stdenv.lib; {
description = "A program to use a reMarkable as a graphics tablet";
homepage = "https://github.com/evidlo/remarkable_mouse";
+2 -2
pkgs/applications/networking/flexget/default.nix
···
python3Packages.buildPythonApplication rec {
pname = "FlexGet";
-
version = "3.1.95";
+
version = "3.1.98";
src = python3Packages.fetchPypi {
inherit pname version;
-
sha256 = "5dc80828713c0ece57c6e86a2bad41bbdf34ec41a0ea4da71adfb43784d85120";
+
sha256 = "d2d17a5ea821a580c55680294fce9ecf7012ef86c086c742414ec5bcb8468972";
};
postPatch = ''
+7 -1
pkgs/applications/science/logic/ott/default.nix
···
installTargets = "ott.install";
-
postInstall = "opaline -prefix $out";
+
postInstall = ''
+
opaline -prefix $out
+
''
+
# There is `emacsPackages.ott-mode` for this now.
+
+ ''
+
rm -r $out/share/emacs
+
'';
meta = {
description = "A tool for the working semanticist";
+4
pkgs/applications/window-managers/i3/altlayout.nix
···
pythonPath = with python3Packages; [ enum-compat i3ipc docopt ];
+
doCheck = false;
+
+
pythonImportsCheck = [ "i3altlayout" ];
+
meta = with lib; {
maintainers = with maintainers; [ magnetophon ];
description = "Helps you handle more efficiently your screen real estate in i3wm by auto-splitting windows on their longest side";
+1 -1
pkgs/desktops/pantheon/default.nix
···
wingpanel-indicator-session wingpanel-indicator-sound
];
-
maintainers = with pkgs.stdenv.lib.maintainers; [ worldofpeace ];
+
maintainers = with pkgs.lib.maintainers; [ worldofpeace ];
mutter = pkgs.gnome3.mutter334;
-1
pkgs/development/compilers/go/1.14.nix
···
disallowedReferences = [ goBootstrap ];
meta = with stdenv.lib; {
-
branch = "1.14";
homepage = "http://golang.org/";
description = "The Go Programming language";
license = licenses.bsd3;
-1
pkgs/development/compilers/go/1.15.nix
···
disallowedReferences = [ goBootstrap ];
meta = with stdenv.lib; {
-
branch = "1.15";
homepage = "http://golang.org/";
description = "The Go Programming language";
license = licenses.bsd3;
-1
pkgs/development/compilers/go/1.4.nix
···
'';
meta = with stdenv.lib; {
-
branch = "1.4";
homepage = "http://golang.org/";
description = "The Go Programming language";
license = licenses.bsd3;
-1
pkgs/development/compilers/go/2-dev.nix
···
disallowedReferences = [ goBootstrap ];
meta = with stdenv.lib; {
-
branch = "dev.go2go";
homepage = "http://golang.org/";
description = "The Go Programming language";
license = licenses.bsd3;
+1 -6
pkgs/development/go-modules/generic/default.nix
···
# We want parallel builds by default
, enableParallelBuilding ? true
-
# Disabled flag
-
, disabled ? false
-
# Do not enable this without good reason
# IE: programs coupled with the compiler
, allowGoReference ? false
···
[ lib.maintainers.kalbasit ];
};
});
-
in if disabled then
-
throw "${package.name} not supported for go ${go.meta.branch}"
-
else if (goPackagePath != null) then
+
in if (goPackagePath != null) then
throw "`goPackagePath` not needed with `buildGoModule`"
else
package
+1 -6
pkgs/development/go-packages/generic/default.nix
···
# We want parallel builds by default
, enableParallelBuilding ? true
-
# Disabled flag
-
, disabled ? false
-
# Go import path of the package
, goPackagePath
···
platforms = go.meta.platforms or lib.platforms.all;
} // meta;
});
-
in if disabled then
-
throw "${package.name} not supported for go ${go.meta.branch}"
-
else
+
in
package
+2 -2
pkgs/development/haskell-modules/configuration-ghcjs.nix
···
base template-haskell ghcjs-base split containers text ghc-prim
];
description = "FFI QuasiQuoter for GHCJS";
-
license = pkgs.stdenv.lib.licenses.mit;
+
license = pkgs.lib.licenses.mit;
}) {};
# experimental
ghcjs-vdom = self.callPackage
···
base ghc-prim ghcjs-ffiqq ghcjs-base ghcjs-prim containers split
template-haskell
];
-
license = pkgs.stdenv.lib.licenses.mit;
+
license = pkgs.lib.licenses.mit;
description = "bindings for https://github.com/Matt-Esch/virtual-dom";
}) {};
+2 -2
pkgs/development/haskell-modules/configuration-nix.nix
···
# mplayer-spot uses mplayer at runtime.
mplayer-spot =
-
let path = pkgs.stdenv.lib.makeBinPath [ pkgs.mplayer ];
+
let path = pkgs.lib.makeBinPath [ pkgs.mplayer ];
in overrideCabal (addBuildTool super.mplayer-spot pkgs.makeWrapper) (oldAttrs: {
postInstall = ''
wrapProgram $out/bin/mplayer-spot --prefix PATH : "${path}"
···
primitive_0_7_1_0 = dontCheck super.primitive_0_7_1_0;
cut-the-crap =
-
let path = pkgs.stdenv.lib.makeBinPath [ pkgs.ffmpeg_3 pkgs.youtube-dl ];
+
let path = pkgs.lib.makeBinPath [ pkgs.ffmpeg_3 pkgs.youtube-dl ];
in overrideCabal (addBuildTool super.cut-the-crap pkgs.makeWrapper) (_drv: {
postInstall = ''
wrapProgram $out/bin/cut-the-crap \
+2 -2
pkgs/development/interpreters/erlang/R16B02-basho.nix
···
knownVulnerabilities = [ "CVE-2017-1000385" ];
platforms = ["x86_64-linux" "x86_64-darwin"];
-
license = pkgs.stdenv.lib.licenses.asl20;
-
maintainers = with pkgs.stdenv.lib.maintainers; [ mdaiter ];
+
license = pkgs.lib.licenses.asl20;
+
maintainers = with pkgs.lib.maintainers; [ mdaiter ];
};
}
+40
pkgs/development/libraries/argtable/default.nix
···
+
{ stdenv
+
, fetchFromGitHub
+
, cmake
+
}:
+
+
stdenv.mkDerivation rec {
+
pname = "argtable";
+
version = "3.1.5";
+
srcVersion = "v${version}.1c1bb23";
+
+
src = fetchFromGitHub {
+
owner = "argtable";
+
repo = "argtable3";
+
rev = srcVersion;
+
sha256 = "sha256-sL6mnxsuL1K0DY26jLF/2Czo0RxHYJ3xU3VyavISiMM=";
+
};
+
+
nativeBuildInputs = [ cmake ];
+
+
postPatch = ''
+
patchShebangs tools/build
+
'';
+
+
meta = with stdenv.lib; {
+
homepage = "https://argtable.org";
+
description = "A single-file, ANSI C command-line parsing library";
+
longDescription = ''
+
Argtable is an open source ANSI C library that parses GNU-style
+
command-line options. It simplifies command-line parsing by defining a
+
declarative-style API that you can use to specify what your command-line
+
syntax looks like. Argtable will automatically generate consistent error
+
handling logic and textual descriptions of the command line syntax, which
+
are essential but tedious to implement for a robust CLI program.
+
'';
+
license = with licenses; bsd3;
+
maintainers = with maintainers; [ AndersonTorres artuuge ];
+
platforms = with platforms; all;
+
};
+
}
+
# TODO [ AndersonTorres ]: a NixOS test suite
+12 -4
pkgs/development/libraries/libgda/default.nix
···
-
{ stdenv, fetchurl, pkgconfig, intltool, itstool, libxml2, gtk3, openssl, gnome3, gobject-introspection, vala, libgee
-
, overrideCC, gcc6
+
{ stdenv, fetchurl, pkg-config, intltool, itstool, libxml2, gtk3, openssl, gnome3, gobject-introspection, vala, libgee
+
, overrideCC, gcc6, fetchpatch, autoreconfHook, gtk-doc, autoconf-archive, yelp-tools
, mysqlSupport ? false, libmysqlclient ? null
, postgresSupport ? false, postgresql ? null
}:
···
url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz";
sha256 = "1j1l4dwjgw6w4d1v4bl5a4kwyj7bcih8mj700ywm7xakh1xxyv3g";
};
+
+
patches = [
+
# fix compile error with mysql
+
(fetchpatch {
+
url = "https://gitlab.gnome.org/GNOME/libgda/-/commit/9859479884fad5f39e6c37e8995e57c28b11b1b9.diff";
+
sha256 = "158sncc5bg9lkri1wb0i1ri1nhx4c34rzi47gbfkwphlp7qd4qqv";
+
})
+
];
+
configureFlags = with stdenv.lib; [
-
"--enable-gi-system-install=no"
"--with-mysql=${if mysqlSupport then "yes" else "no"}"
"--with-postgres=${if postgresSupport then "yes" else "no"}"
···
hardeningDisable = [ "format" ];
-
nativeBuildInputs = [ pkgconfig intltool itstool libxml2 gobject-introspection vala ];
+
nativeBuildInputs = [ pkg-config intltool itstool libxml2 gobject-introspection vala autoreconfHook gtk-doc autoconf-archive yelp-tools ];
buildInputs = with stdenv.lib; [ gtk3 openssl libgee ]
++ optional (mysqlSupport) libmysqlclient
++ optional (postgresSupport) postgresql;
+51 -15
pkgs/development/libraries/libjson-rpc-cpp/default.nix
···
-
{ stdenv, fetchFromGitHub, cmake, jsoncpp, argtable, curl, libmicrohttpd
-
, doxygen, catch, pkg-config
+
{ stdenv
+
, fetchFromGitHub
+
, fetchpatch
+
, pkg-config
+
, cmake
+
, argtable
+
, catch2
+
, curl
+
, doxygen
+
, hiredis
+
, jsoncpp
+
, libmicrohttpd
}:
stdenv.mkDerivation rec {
pname = "libjson-rpc-cpp";
-
version = "0.7.0";
+
version = "1.3.0";
src = fetchFromGitHub {
owner = "cinemast";
repo = "libjson-rpc-cpp";
-
sha256 = "07bg4nyvx0yyhy8c4x9i22kwqpx5jlv36dvpabgbb46ayyndhr7a";
+
sha256 = "sha256-EAakiqlfMprwLjloDekOssaB/EnAmn5njcwHGZtYs9w=";
rev = "v${version}";
};
-
NIX_CFLAGS_COMPILE = "-I${catch}/include/catch";
+
NIX_CFLAGS_COMPILE = "-I${catch2}/include/catch2";
+
+
patches = [
+
(fetchpatch {
+
name = "int-to-MHD_Result.patch";
+
url = "https://patch-diff.githubusercontent.com/raw/cinemast/libjson-rpc-cpp/pull/299.patch";
+
sha256 = "sha256-hiey6etzbOxhMElTMX7offKbey7c2OO/UWeN03k0AaM=";
+
})
+
];
+
+
nativeBuildInputs = [ pkg-config cmake doxygen ];
+
buildInputs = [
+
argtable
+
catch2
+
curl
+
hiredis
+
jsoncpp
+
libmicrohttpd
+
];
postPatch = ''
for f in cmake/FindArgtable.cmake \
···
sed -i -re 's#MATCHES "jsoncpp"#MATCHES ".*/jsoncpp/json$"#g' cmake/FindJsoncpp.cmake
'';
-
configurePhase = ''
+
preConfigure = ''
mkdir -p Build/Install
pushd Build
+
'';
+
# this hack is needed because the cmake scripts
+
# require write permission to absolute paths
+
configurePhase = ''
+
runHook preConfigure
cmake .. -DCMAKE_INSTALL_PREFIX=$(pwd)/Install \
-DCMAKE_BUILD_TYPE=Release
+
runHook postConfigure
'';
-
installPhase = ''
-
mkdir -p $out
-
+
preInstall = ''
function fixRunPath {
p=$(patchelf --print-rpath $1)
q="$p:${stdenv.lib.makeLibraryPath [ jsoncpp argtable libmicrohttpd curl ]}:$out/lib"
patchelf --set-rpath $q $1
}
-
make install
+
mkdir -p $out
+
'';
-
sed -i -re "s#-([LI]).*/Build/Install(.*)#-\1$out\2#g" Install/lib/pkgconfig/*.pc
-
for f in Install/lib/*.so* $(find Install/bin -executable -type f); do
+
postInstall = ''
+
sed -i -re "s#-([LI]).*/Build/Install(.*)#-\1$out\2#g" Install/lib64/pkgconfig/*.pc
+
for f in Install/lib64/*.so* $(find Install/bin -executable -type f); do
fixRunPath $f
done
-
cp -r Install/* $out
'';
-
nativeBuildInputs = [ cmake pkg-config ];
-
buildInputs = [ jsoncpp argtable curl libmicrohttpd doxygen catch ];
+
installPhase = ''
+
runHook preInstall
+
make install
+
runHook postInstall
+
'';
meta = with stdenv.lib; {
description = "C++ framework for json-rpc (json remote procedure call)";
+10
pkgs/development/libraries/libmicrohttpd/0.9.72.nix
···
+
{ stdenv, callPackage, fetchurl }:
+
+
callPackage ./generic.nix ( rec {
+
version = "0.9.72";
+
+
src = fetchurl {
+
url = "mirror://gnu/libmicrohttpd/libmicrohttpd-${version}.tar.gz";
+
sha256 = "sha256-Cugl+ODX9BIB/USg3xz0VMHLC8UP6dWcJlUiYCZML/g=";
+
};
+
})
+6 -2
pkgs/development/python-modules/asyncio-dgram/default.nix
···
-
{ lib
+
{ stdenv
+
, lib
, buildPythonPackage
, fetchFromGitHub
, pytestCheckHook
···
sha256 = "1zkmjvq47zw2fsbnzhr5mh9rsazx0z1f8m528ash25jrxsza5crm";
};
+
# OSError: AF_UNIX path too long
+
doCheck = !stdenv.isDarwin;
+
checkInputs = [
pytestCheckHook
-
pytest-asyncio
+
pytest-asyncio
];
disabledTests = [ "test_protocol_pause_resume" ];
+14 -10
pkgs/development/python-modules/clifford/default.nix
···
inherit pname version;
sha256 = "ade11b20d0631dfc9c2f18ce0149f1e61e4baf114108b27cfd68e5c1619ecc0c";
};
-
patches = [ (fetchpatch {
-
# Compatibility with h5py 3.
-
# Will be included in the next releasse after 1.3.1
-
url = "https://github.com/pygae/clifford/pull/388/commits/955d141662c68d3d61aa50a162b39e656684c208.patch";
-
sha256 = "00m8ias58xycn5n78sy9wywf4wck1v0gb8gzmg40inzdiha93jyz";
-
}) ];
+
+
patches = [
+
(fetchpatch {
+
# Compatibility with h5py 3.
+
# Will be included in the next releasse after 1.3.1
+
url = "https://github.com/pygae/clifford/pull/388/commits/955d141662c68d3d61aa50a162b39e656684c208.patch";
+
sha256 = "0pkpwnk0kfdxsbzsxqlqh8kgif17l5has0mg31g3kyp8lncj89b1";
+
})
+
];
propagatedBuildInputs = [
future
···
cd clifford/test
'';
-
pytestFlagsArray = [
-
"-m \"not veryslow\""
-
"--ignore=test_algebra_initialisation.py" # fails without JIT
-
"--ignore=test_cga.py"
+
disabledTests = [
+
"veryslow"
+
"test_algebra_initialisation"
+
"test_cga"
+
"test_estimate_rotor_sequential[random_sphere]"
];
meta = with lib; {
+25
pkgs/development/python-modules/commandparse/default.nix
···
+
{ lib
+
, buildPythonPackage
+
, fetchPypi
+
}:
+
+
buildPythonPackage rec {
+
pname = "commandparse";
+
version = "1.1.1";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "06mcxc0vs5qdcywalgyx5zm18z4xcsrg5g0wsqqv5qawkrvmvl53";
+
};
+
+
# tests only distributed upstream source, not PyPi
+
doCheck = false;
+
pythonImportsCheck = [ "commandparse" ];
+
+
meta = with lib; {
+
description = "Python module to parse command based CLI application";
+
homepage = "https://github.com/flgy/commandparse";
+
license = with licenses; [ mit ];
+
maintainers = [ maintainers.fab ];
+
};
+
}
+4
pkgs/development/python-modules/nixpkgs/default.nix
···
buildInputs = [ pbr ];
propagatedBuildInputs = [ pythonix ];
+
# does not have any tests
+
doCheck = false;
+
pythonImportsCheck = [ "nixpkgs" ];
+
meta = with stdenv.lib; {
description = "Allows to `from nixpkgs import` stuff in interactive Python sessions";
homepage = "https://github.com/t184256/nixpkgs-python-importer";
+2
pkgs/development/python-modules/python-engineio/default.nix
···
pytestCheckHook
];
+
doCheck = !stdenv.isDarwin;
+
preCheck = stdenv.lib.optionalString stdenv.isLinux ''
echo "nameserver 127.0.0.1" > resolv.conf
export NIX_REDIRECTS=/etc/protocols=${iana-etc}/etc/protocols:/etc/resolv.conf=$(realpath resolv.conf) \
+3 -2
pkgs/development/python-modules/shiboken2/default.nix
···
-
{ buildPythonPackage, python, fetchurl, stdenv, pyside2,
-
cmake, qt5, llvmPackages }:
+
{ buildPythonPackage, python, fetchurl, stdenv, pyside2
+
, cmake, qt5, llvmPackages }:
stdenv.mkDerivation {
pname = "shiboken2";
···
license = with licenses; [ gpl2 lgpl21 ];
homepage = "https://wiki.qt.io/Qt_for_Python";
maintainers = with maintainers; [ gebner ];
+
broken = stdenv.isDarwin;
};
}
+2 -2
pkgs/development/tools/gotools/default.nix
···
-
{ stdenv, go, buildGoModule, fetchgit }:
+
{ stdenv, buildGoModule, fetchgit }:
buildGoModule rec {
pname = "gotools-unstable";
···
'';
excludedPackages = "\\("
-
+ stdenv.lib.concatStringsSep "\\|" ([ "testdata" ] ++ stdenv.lib.optionals (stdenv.lib.versionAtLeast go.meta.branch "1.5") [ "vet" "cover" ])
+
+ stdenv.lib.concatStringsSep "\\|" ([ "testdata" "vet" "cover" ])
+ "\\)";
# Set GOTOOLDIR for derivations adding this to buildInputs
+1 -1
pkgs/development/tools/misc/ctags/wrapped.nix
···
{ pkgs, ctags }:
-
with pkgs.stdenv.lib;
+
with pkgs.lib;
# define some ctags wrappers adding support for some not that common languages
# customization:
+3 -3
pkgs/development/tools/misc/texlab/default.nix
···
rustPlatform.buildRustPackage rec {
pname = "texlab";
-
version = "2.2.1";
+
version = "2.2.2";
src = fetchFromGitHub {
owner = "latex-lsp";
repo = pname;
rev = "v${version}";
-
sha256 = "1hiy8klig7j0if4iqbb0432iqsnds00aya6p4xmm913qfpsyh6cq";
+
sha256 = "06x7j4ppgw24xbsnyj1icaksngqbvq6mk8wfcqikzmvmifjspx9m";
};
-
cargoSha256 = "0pf8j202rpglcxamsr8r3wwmgsdgih24m52vh1q85l93vj7jkm1v";
+
cargoSha256 = "0gzxylpn2hps0kxczd6wwcqhnvm6ir971bfvpgjr6rxi12hs47ky";
nativeBuildInputs = [ installShellFiles ];
+1 -1
pkgs/development/tools/poetry2nix/poetry2nix/overrides.nix
···
export LLVM_CONFIG=${pkgs.llvm}/bin/llvm-config
'';
-
__impureHostDeps = pkgs.stdenv.lib.optionals pkgs.stdenv.isDarwin [ "/usr/lib/libm.dylib" ];
+
__impureHostDeps = pkgs.lib.optionals pkgs.stdenv.isDarwin [ "/usr/lib/libm.dylib" ];
passthru = old.passthru // { llvm = pkgs.llvm; };
}
+3
pkgs/games/anki/default.nix
···
# UTF-8 locale needed for testing
LC_ALL = "en_US.UTF-8";
+
# tests fail with to many open files
+
doCheck = !stdenv.isDarwin;
+
# - Anki writes some files to $HOME during tests
# - Skip tests using network
checkPhase = ''
+1 -1
pkgs/servers/http/nginx/modules.nix
···
meta = {
description = "PageSpeed module for Nginx";
homepage = "https://developers.google.com/speed/pagespeed/module/";
-
license = pkgs.stdenv.lib.licenses.asl20;
+
license = pkgs.lib.licenses.asl20;
};
}
''
+4
pkgs/servers/uwsgi/default.nix
···
, plugins ? []
, pam, withPAM ? stdenv.isLinux
, systemd, withSystemd ? stdenv.isLinux
+
, libcap, withCap ? stdenv.isLinux
, python2, python3, ncurses
, ruby, php, libmysqlclient
}:
···
buildInputs = [ jansson pcre ]
++ lib.optional withPAM pam
++ lib.optional withSystemd systemd
+
++ lib.optional withCap libcap
++ lib.concatMap (x: x.inputs) needed
;
···
( lib.optional withPAM "pam"
++ lib.optional withSystemd "systemd_logger"
);
+
+
UWSGI_INCLUDES = lib.optionalString withCap "${libcap.dev}/include";
passthru = {
inherit python2 python3;
+1 -1
pkgs/servers/zigbee2mqtt/default.nix
···
passthru.tests.zigbee2mqtt = nixosTests.zigbee2mqtt;
-
meta = with pkgs.stdenv.lib; {
+
meta = with pkgs.lib; {
description = "Zigbee to MQTT bridge using zigbee-shepherd";
license = licenses.gpl3;
homepage = https://github.com/Koenkk/zigbee2mqtt;
-41
pkgs/tools/misc/argtable/default.nix
···
-
{ stdenv
-
, fetchgit
-
}:
-
stdenv.mkDerivation {
-
pname = "argtable";
-
version = "3.0.1";
-
-
src = fetchgit {
-
url = "https://github.com/argtable/argtable3.git";
-
rev = "de93cfd85f755250285b337cba053a709a270721";
-
sha256 = "0fbvk78s3dwryrzgafdra0lb8w7lb873c6xgldl94ps9828x85i3";
-
};
-
-
buildPhase = ''
-
gcc -shared -o libargtable3.so -fPIC argtable3.c
-
-
pushd tests
-
make
-
popd
-
'';
-
-
installPhase = ''
-
mkdir -p $out/include
-
cp argtable3.h $out/include
-
-
mkdir -p $out/lib
-
cp libargtable3.so $out/lib
-
-
mkdir -p $out/src
-
cp argtable3.c $out/src
-
cp -r examples $out/src
-
ln -s $out/include/argtable3.h $out/src/argtable3.h
-
'';
-
-
meta = with stdenv.lib; {
-
homepage = "https://www.argtable.org/";
-
description = "A Cross-Platform, Single-File, ANSI C Command-Line Parsing Library";
-
license = licenses.bsd3;
-
maintainers = with maintainers; [ artuuge ];
-
};
-
}
+4 -1
pkgs/tools/networking/urlwatch/default.nix
···
{ stdenv, fetchFromGitHub, python3Packages }:
python3Packages.buildPythonApplication rec {
-
name = "urlwatch-${version}";
+
pname = "urlwatch";
version = "2.21";
src = fetchFromGitHub {
···
requests
pyppeteer
];
+
+
# no tests
+
doCheck = false;
meta = with stdenv.lib; {
description = "A tool for monitoring webpages for updates";
+32
pkgs/tools/security/badchars/default.nix
···
+
{ lib
+
, buildPythonApplication
+
, fetchPypi
+
}:
+
+
buildPythonApplication rec {
+
pname = "badchars";
+
version = "0.4.0";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "1xqki8qnfwl97d60xj69alyzwa1mnfbwki25j0vhvhb05varaxz2";
+
};
+
+
postPatch = ''
+
substituteInPlace setup.py --replace "argparse" ""
+
'';
+
+
# no tests are available and it can't be imported (it's only a script, not a module)
+
doCheck = false;
+
+
meta = with lib; {
+
description = "HEX badchar generator for different programming languages";
+
longDescription = ''
+
A HEX bad char generator to instruct encoders such as shikata-ga-nai to
+
transform those to other chars.
+
'';
+
homepage = "https://github.com/cytopia/badchars";
+
license = with licenses; [ mit ];
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+38
pkgs/tools/security/ldeep/default.nix
···
+
{ lib
+
, buildPythonApplication
+
, fetchPypi
+
, commandparse
+
, dnspython
+
, ldap3
+
, termcolor
+
, tqdm
+
}:
+
+
buildPythonApplication rec {
+
pname = "ldeep";
+
version = "1.0.9";
+
+
src = fetchPypi {
+
inherit pname version;
+
sha256 = "0n38idkn9hy31m5xkrc36dmw364d137c7phssvj76gr2gqsrqjy3";
+
};
+
+
propagatedBuildInputs = [
+
commandparse
+
dnspython
+
ldap3
+
termcolor
+
tqdm
+
];
+
+
# no tests are present
+
doCheck = false;
+
pythonImportsCheck = [ "ldeep" ];
+
+
meta = with lib; {
+
description = "In-depth LDAP enumeration utility";
+
homepage = "https://github.com/franc-pentest/ldeep";
+
license = with licenses; [ mit ];
+
maintainers = with maintainers; [ fab ];
+
};
+
}
+13 -4
pkgs/top-level/all-packages.nix
···
apitrace = libsForQt514.callPackage ../applications/graphics/apitrace {};
+
argtable = callPackage ../development/libraries/argtable { };
+
arguments = callPackage ../development/libraries/arguments { };
argus = callPackage ../tools/networking/argus {};
argus-clients = callPackage ../tools/networking/argus-clients {};
-
-
argtable = callPackage ../tools/misc/argtable {};
argyllcms = callPackage ../tools/graphics/argyllcms {};
···
bashplotlib = callPackage ../tools/misc/bashplotlib { };
babeld = callPackage ../tools/networking/babeld { };
+
+
badchars = python3Packages.callPackage ../tools/security/badchars { };
badvpn = callPackage ../tools/networking/badvpn {};
···
lcdf-typetools = callPackage ../tools/misc/lcdf-typetools { };
ldapvi = callPackage ../tools/misc/ldapvi { };
+
+
ldeep = python3Packages.callPackage ../tools/security/ldeep { };
ldns = callPackage ../development/libraries/ldns { };
···
libjreen = callPackage ../development/libraries/libjreen { };
-
libjson-rpc-cpp = callPackage ../development/libraries/libjson-rpc-cpp { };
+
libjson-rpc-cpp = callPackage ../development/libraries/libjson-rpc-cpp {
+
libmicrohttpd = libmicrohttpd_0_9_72;
+
};
libkate = callPackage ../development/libraries/libkate { };
···
libmicrohttpd_0_9_70 = callPackage ../development/libraries/libmicrohttpd/0.9.70.nix { };
libmicrohttpd_0_9_71 = callPackage ../development/libraries/libmicrohttpd/0.9.71.nix { };
+
libmicrohttpd_0_9_72 = callPackage ../development/libraries/libmicrohttpd/0.9.72.nix { };
libmicrohttpd = libmicrohttpd_0_9_71;
libmikmod = callPackage ../development/libraries/libmikmod {
···
vte_290 = callPackage ../development/libraries/vte/2.90.nix { };
vtk_7 = libsForQt515.callPackage ../development/libraries/vtk/7.x.nix {
+
stdenv = gcc9Stdenv;
inherit (darwin) libobjc;
inherit (darwin.apple_sdk.libs) xpc;
inherit (darwin.apple_sdk.frameworks) Cocoa CoreServices DiskArbitration
···
CoreText IOSurface ImageIO OpenGL GLUT;
vtk_8 = libsForQt515.callPackage ../development/libraries/vtk/8.x.nix {
+
stdenv = gcc9Stdenv;
inherit (darwin) libobjc;
inherit (darwin.apple_sdk.libs) xpc;
inherit (darwin.apple_sdk.frameworks) Cocoa CoreServices DiskArbitration
···
inherit
autoconf automake editorconfig-core-c git libffi libpng pkgconfig
poppler rtags w3m zlib substituteAll rustPlatform cmake llvmPackages
-
libtool zeromq openssl;
+
libtool zeromq openssl ott;
+2
pkgs/top-level/python-packages.nix
···
colour = callPackage ../development/python-modules/colour { };
+
commandparse = callPackage ../development/python-modules/commandparse { };
+
CommonMark = callPackage ../development/python-modules/commonmark { };
compiledb = callPackage ../development/python-modules/compiledb { };