Merge master into staging-next

authored by

github-actions[bot] and committed by
GitHub
44e3fc61 8277f398

+141 -86
+1
nixos/modules/services/monitoring/prometheus/exporters.nix
··· 28 "blackbox" 29 "collectd" 30 "dnsmasq" 31 "dovecot" 32 "fritzbox" 33 "json"
··· 28 "blackbox" 29 "collectd" 30 "dnsmasq" 31 + "domain" 32 "dovecot" 33 "fritzbox" 34 "json"
+19
nixos/modules/services/monitoring/prometheus/exporters/domain.nix
···
··· 1 + { config, lib, pkgs, options }: 2 + 3 + with lib; 4 + 5 + let 6 + cfg = config.services.prometheus.exporters.domain; 7 + in 8 + { 9 + port = 9222; 10 + serviceOpts = { 11 + serviceConfig = { 12 + ExecStart = '' 13 + ${pkgs.prometheus-domain-exporter}/bin/domain_exporter \ 14 + --bind ${cfg.listenAddress}:${toString cfg.port} \ 15 + ${concatStringsSep " \\\n " cfg.extraFlags} 16 + ''; 17 + }; 18 + }; 19 + }
+3 -3
nixos/modules/services/web-servers/nginx/default.nix
··· 154 155 ${optionalString (cfg.recommendedProxySettings) '' 156 proxy_redirect off; 157 - proxy_connect_timeout 90; 158 - proxy_send_timeout 90; 159 - proxy_read_timeout 90; 160 proxy_http_version 1.0; 161 include ${recommendedProxyConfig}; 162 ''}
··· 154 155 ${optionalString (cfg.recommendedProxySettings) '' 156 proxy_redirect off; 157 + proxy_connect_timeout 60; 158 + proxy_send_timeout 60; 159 + proxy_read_timeout 60; 160 proxy_http_version 1.0; 161 include ${recommendedProxyConfig}; 162 ''}
+16
nixos/tests/prometheus-exporters.nix
··· 201 ''; 202 }; 203 204 dovecot = { 205 exporterConfig = { 206 enable = true;
··· 201 ''; 202 }; 203 204 + # Access to WHOIS server is required to properly test this exporter, so 205 + # just perform basic sanity check that the exporter is running and returns 206 + # a failure. 207 + domain = { 208 + exporterConfig = { 209 + enable = true; 210 + }; 211 + exporterTest = '' 212 + wait_for_unit("prometheus-domain-exporter.service") 213 + wait_for_open_port(9222) 214 + succeed( 215 + "curl -sSf 'http://localhost:9222/probe?target=nixos.org' | grep -q 'domain_probe_success 0'" 216 + ) 217 + ''; 218 + }; 219 + 220 dovecot = { 221 exporterConfig = { 222 enable = true;
+1 -1
pkgs/applications/audio/apple-music-electron/default.nix
··· 18 19 install -m 444 -D ${appimageContents}/${pname}.desktop -t $out/share/applications 20 substituteInPlace $out/share/applications/${pname}.desktop \ 21 - --replace 'Exec=AppRun' 'Exec=$out/bin/apple-music-electron' 22 cp -r ${appimageContents}/usr/share/icons $out/share 23 ''; 24
··· 18 19 install -m 444 -D ${appimageContents}/${pname}.desktop -t $out/share/applications 20 substituteInPlace $out/share/applications/${pname}.desktop \ 21 + --replace "Exec=AppRun" "Exec=$out/bin/apple-music-electron" 22 cp -r ${appimageContents}/usr/share/icons $out/share 23 ''; 24
-1
pkgs/applications/radio/gnuradio/3.8.nix
··· 1 { lib, stdenv 2 , fetchFromGitHub 3 - , fetchpatch 4 , cmake 5 # Remove gcc and python references 6 , removeReferencesTo
··· 1 { lib, stdenv 2 , fetchFromGitHub 3 , cmake 4 # Remove gcc and python references 5 , removeReferencesTo
-53
pkgs/applications/virtualization/cloud-hypervisor/cargo-lock-vendor-fix.patch
··· 1 - diff --git a/Cargo.lock b/Cargo.lock 2 - index e566ed25..a661a963 100644 3 - --- a/Cargo.lock 4 - +++ b/Cargo.lock 5 - @@ -689,7 +689,7 @@ dependencies = [ 6 - "serde", 7 - "serde_derive", 8 - "serde_json", 9 - - "vfio-bindings 0.2.0 (git+https://github.com/rust-vmm/vfio-bindings)", 10 - + "vfio-bindings", 11 - "vfio-ioctls", 12 - "vm-allocator", 13 - "vm-device", 14 - @@ -1346,17 +1346,12 @@ checksum = "f1bddf1187be692e79c5ffeab891132dfb0f236ed36a43c7ed39f1165ee20191" 15 - [[package]] 16 - name = "vfio-bindings" 17 - version = "0.2.0" 18 - -source = "git+https://github.com/rust-vmm/vfio-bindings#f08cbcbf4041c981441d9c036c49ebad5098ed1c" 19 - +source = "registry+https://github.com/rust-lang/crates.io-index" 20 - +checksum = "4a21f546f2bda37f5a8cfb138c87f95b8e34d2d78d6a7a92ba3785f4e08604a7" 21 - dependencies = [ 22 - "vmm-sys-util", 23 - ] 24 - 25 - -[[package]] 26 - -name = "vfio-bindings" 27 - -version = "0.2.0" 28 - -source = "registry+https://github.com/rust-lang/crates.io-index" 29 - -checksum = "4a21f546f2bda37f5a8cfb138c87f95b8e34d2d78d6a7a92ba3785f4e08604a7" 30 - - 31 - [[package]] 32 - name = "vfio-ioctls" 33 - version = "0.1.0" 34 - @@ -1366,7 +1361,7 @@ dependencies = [ 35 - "kvm-bindings", 36 - "kvm-ioctls", 37 - "log 0.4.8", 38 - - "vfio-bindings 0.2.0 (registry+https://github.com/rust-lang/crates.io-index)", 39 - + "vfio-bindings", 40 - "vm-memory", 41 - "vmm-sys-util", 42 - ] 43 - diff --git a/pci/Cargo.toml b/pci/Cargo.toml 44 - index 9c6955c7..4ecf8e6b 100644 45 - --- a/pci/Cargo.toml 46 - +++ b/pci/Cargo.toml 47 - @@ -23,5 +23,5 @@ vm-memory = "0.2.1" 48 - vm-migration = { path = "../vm-migration" } 49 - 50 - [dependencies.vfio-bindings] 51 - -git = "https://github.com/rust-vmm/vfio-bindings" 52 - +version = "0.2.0" 53 - features = ["fam-wrappers"]
···
+7 -8
pkgs/applications/virtualization/cloud-hypervisor/default.nix
··· 1 - { lib, fetchFromGitHub, rustPlatform, pkg-config, openssl }: 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cloud-hypervisor"; 5 - version = "0.8.0"; 6 7 src = fetchFromGitHub { 8 owner = "cloud-hypervisor"; 9 repo = pname; 10 rev = "v${version}"; 11 - sha256 = "h2aWWjycTm84TS89/vhqnAvwOqeeSDtvvCt+Is6I0eI="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 - buildInputs = [ openssl ]; 16 17 - cargoPatches = [ ./cargo-lock-vendor-fix.patch ]; 18 - cargoSha256 = "fOIB+qVDqAAgQPW3bK2NfST24GzYJeRXgaMFXyNPcPQ="; 19 20 meta = with lib; { 21 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor"; 22 description = "Open source Virtual Machine Monitor (VMM) that runs on top of KVM"; 23 changelog = "https://github.com/cloud-hypervisor/cloud-hypervisor/releases/tag/v${version}"; 24 license = with licenses; [ asl20 bsd3 ]; 25 - maintainers = with maintainers; [ offline ]; 26 - platforms = [ "x86_64-linux" ]; 27 }; 28 }
··· 1 + { lib, stdenv, fetchFromGitHub, rustPlatform, pkg-config, dtc, openssl }: 2 3 rustPlatform.buildRustPackage rec { 4 pname = "cloud-hypervisor"; 5 + version = "0.14.1"; 6 7 src = fetchFromGitHub { 8 owner = "cloud-hypervisor"; 9 repo = pname; 10 rev = "v${version}"; 11 + sha256 = "0pnfg6dzpz8v40cwg3dmlj52x8pblavv7mkczar814dwbk01y7vr"; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; 15 + buildInputs = [ openssl ] ++ lib.optional stdenv.isAarch64 dtc; 16 17 + cargoSha256 = "0dbjds40znly11i0ssfv66w82ynxp00ixw1349m5ln9i9ms94sr4"; 18 19 meta = with lib; { 20 homepage = "https://github.com/cloud-hypervisor/cloud-hypervisor"; 21 description = "Open source Virtual Machine Monitor (VMM) that runs on top of KVM"; 22 changelog = "https://github.com/cloud-hypervisor/cloud-hypervisor/releases/tag/v${version}"; 23 license = with licenses; [ asl20 bsd3 ]; 24 + maintainers = with maintainers; [ offline qyliss ]; 25 + platforms = [ "aarch64-linux" "x86_64-linux" ]; 26 }; 27 }
+2 -2
pkgs/development/libraries/coordgenlibs/default.nix
··· 9 10 stdenv.mkDerivation rec { 11 pname = "coordgenlibs"; 12 - version = "2.0.0"; 13 14 src = fetchFromGitHub { 15 owner = "schrodinger"; 16 repo = pname; 17 rev = "v${version}"; 18 - sha256 = "sha256-lfA0y/tT64C/7NjBff4HEzIfhZ3piFBkQjX5xVbFXFc="; 19 }; 20 21 nativeBuildInputs = [ cmake ];
··· 9 10 stdenv.mkDerivation rec { 11 pname = "coordgenlibs"; 12 + version = "2.0.2"; 13 14 src = fetchFromGitHub { 15 owner = "schrodinger"; 16 repo = pname; 17 rev = "v${version}"; 18 + sha256 = "sha256-BcDqrOotqRPMnzvfjzbeCf8gT3yQzKihywKrpah1D7w="; 19 }; 20 21 nativeBuildInputs = [ cmake ];
+2
pkgs/development/python-modules/minio/default.nix
··· 8 , pytz 9 , pytestCheckHook 10 , urllib3 11 }: 12 13 buildPythonPackage rec { ··· 26 python-dateutil 27 pytz 28 urllib3 29 ]; 30 31 checkInputs = [ faker mock nose pytestCheckHook ];
··· 8 , pytz 9 , pytestCheckHook 10 , urllib3 11 + , certifi 12 }: 13 14 buildPythonPackage rec { ··· 27 python-dateutil 28 pytz 29 urllib3 30 + certifi 31 ]; 32 33 checkInputs = [ faker mock nose pytestCheckHook ];
+2 -2
pkgs/development/python-modules/pysmappee/default.nix
··· 11 12 buildPythonPackage rec { 13 pname = "pysmappee"; 14 - version = "0.2.17"; 15 disabled = pythonOlder "3.7"; 16 17 src = fetchFromGitHub { 18 owner = "smappee"; 19 repo = pname; 20 rev = version; 21 - sha256 = "00274fbclj5kmwxi2bfx4913r4l0y8qvkfcc9d7ryalvf8jq24k6"; 22 }; 23 24 propagatedBuildInputs = [
··· 11 12 buildPythonPackage rec { 13 pname = "pysmappee"; 14 + version = "0.2.18"; 15 disabled = pythonOlder "3.7"; 16 17 src = fetchFromGitHub { 18 owner = "smappee"; 19 repo = pname; 20 rev = version; 21 + sha256 = "sha256-DnRtKr8aGZ6rcN/wTpcFNaI+EJm07nObfWyBpLkQF38="; 22 }; 23 24 propagatedBuildInputs = [
+3 -3
pkgs/development/tools/rust/cargo-make/default.nix
··· 4 5 rustPlatform.buildRustPackage rec { 6 pname = "cargo-make"; 7 - version = "0.32.15"; 8 9 src = fetchCrate { 10 inherit pname version; 11 - sha256 = "sha256-BvZe2+PwradByyDeqhs3u42tbLrR5UMyUhJVSlX/U+w="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; ··· 16 buildInputs = [ openssl ] 17 ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ]; 18 19 - cargoSha256 = "sha256-eA1cyffQAmSN3jQo5k8H6eYrS23qUxsiAqWzwrYmh3o="; 20 21 # Some tests fail because they need network access. 22 # However, Travis ensures a proper build.
··· 4 5 rustPlatform.buildRustPackage rec { 6 pname = "cargo-make"; 7 + version = "0.32.16"; 8 9 src = fetchCrate { 10 inherit pname version; 11 + sha256 = "sha256-FrrQcZHy5WjNYCod2TBWVAj4clNWPLWLIR2/Kvkz4q0="; 12 }; 13 14 nativeBuildInputs = [ pkg-config ]; ··· 16 buildInputs = [ openssl ] 17 ++ lib.optionals stdenv.isDarwin [ Security SystemConfiguration ]; 18 19 + cargoSha256 = "sha256-QEHl/Hhug0Ua/SZV0iq1jc6QGGxA1NwheEgGBZRYunI="; 20 21 # Some tests fail because they need network access. 22 # However, Travis ensures a proper build.
+28
pkgs/development/tools/shellharden/default.nix
···
··· 1 + { lib, rustPlatform, fetchFromGitHub }: 2 + 3 + rustPlatform.buildRustPackage rec { 4 + pname = "shellharden"; 5 + version = "4.1.2"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "anordal"; 9 + repo = pname; 10 + rev = "v${version}"; 11 + sha256 = "1003kgnql0z158d3rzz8s3i7s7rx9hjqqvp3li8xhzrgszvkgqk4"; 12 + }; 13 + 14 + cargoSha256 = "1h4wp9xs9nq90ml2km9gd0afrzri6fbgskz6d15jqykm2fw72l88"; 15 + 16 + postPatch = "patchShebangs moduletests/run"; 17 + 18 + meta = with lib; { 19 + description = "The corrective bash syntax highlighter"; 20 + longDescription = '' 21 + Shellharden is a syntax highlighter and a tool to semi-automate the 22 + rewriting of scripts to ShellCheck conformance, mainly focused on quoting. 23 + ''; 24 + homepage = "https://github.com/anordal/shellharden"; 25 + license = licenses.mpl20; 26 + maintainers = with maintainers; [ oxzi ]; 27 + }; 28 + }
+11 -5
pkgs/games/devilutionx/default.nix
··· 1 { lib, stdenv, fetchFromGitHub, cmake, SDL2, SDL2_mixer, SDL2_ttf, libsodium, pkg-config }: 2 stdenv.mkDerivation rec { 3 - version = "1.0.1"; 4 - pname = "devilutionx"; 5 6 src = fetchFromGitHub { 7 owner = "diasurgical"; 8 repo = "devilutionX"; 9 - rev = version; 10 - sha256 = "1jvjlch9ql5s5jx9g5y5pkc2xn62199qylsmzpqzx1jc3k2vmw5i"; 11 }; 12 13 NIX_CFLAGS_COMPILE = [ 14 "-I${SDL2_ttf}/include/SDL2" 15 ''-DTTF_FONT_PATH="${placeholder "out"}/share/fonts/truetype/CharisSILB.ttf"'' 16 ]; 17 18 nativeBuildInputs = [ pkg-config cmake ]; 19 buildInputs = [ libsodium SDL2 SDL2_mixer SDL2_ttf ]; ··· 40 longDescription = "In order to play this game a copy of diabdat.mpq is required. Place a copy of diabdat.mpq in ~/.local/share/diasurgical/devilution before executing the game."; 41 license = licenses.unlicense; 42 maintainers = [ maintainers.karolchmist ]; 43 - platforms = platforms.linux ++ platforms.darwin ++ platforms.windows; 44 }; 45 }
··· 1 { lib, stdenv, fetchFromGitHub, cmake, SDL2, SDL2_mixer, SDL2_ttf, libsodium, pkg-config }: 2 stdenv.mkDerivation rec { 3 + version = "2020-10-20"; 4 + pname = "devilutionx-unstable"; 5 6 src = fetchFromGitHub { 7 owner = "diasurgical"; 8 repo = "devilutionX"; 9 + rev = "432fbc8ef7b98e567b08e44ce91b198374a5ff01"; 10 + sha256 = "03w3bgmzwsbycx3fzvn47fsmabl069gw77yn2fqg89wlgaw1yrr9"; 11 }; 12 13 NIX_CFLAGS_COMPILE = [ 14 "-I${SDL2_ttf}/include/SDL2" 15 ''-DTTF_FONT_PATH="${placeholder "out"}/share/fonts/truetype/CharisSILB.ttf"'' 16 ]; 17 + 18 + cmakeFlags = [ 19 + "-DBINARY_RELEASE=ON" 20 + ]; 21 + 22 + enableParallelBuilding = true; 23 24 nativeBuildInputs = [ pkg-config cmake ]; 25 buildInputs = [ libsodium SDL2 SDL2_mixer SDL2_ttf ]; ··· 46 longDescription = "In order to play this game a copy of diabdat.mpq is required. Place a copy of diabdat.mpq in ~/.local/share/diasurgical/devilution before executing the game."; 47 license = licenses.unlicense; 48 maintainers = [ maintainers.karolchmist ]; 49 + platforms = platforms.linux ++ platforms.windows; 50 }; 51 }
+1
pkgs/servers/home-assistant/default.nix
··· 306 "sensor" 307 "smarttub" 308 "smtp" 309 "solaredge" 310 "sonos" 311 "spotify"
··· 306 "sensor" 307 "smarttub" 308 "smtp" 309 + "smappee" 310 "solaredge" 311 "sonos" 312 "spotify"
+26
pkgs/servers/monitoring/prometheus/domain-exporter.nix
···
··· 1 + { lib, buildGoModule, fetchFromGitHub, nixosTests }: 2 + 3 + buildGoModule rec { 4 + pname = "domain-exporter"; 5 + version = "1.10.0"; 6 + 7 + src = fetchFromGitHub { 8 + owner = "caarlos0"; 9 + repo = "domain_exporter"; 10 + rev = "v${version}"; 11 + sha256 = "0pvz5vx9jvxdrkmzqzh7dfi09sb55j6zpx5728m5v38p8cl8vyh6"; 12 + }; 13 + 14 + vendorSha256 = "02m2mnx93xq6cl54waazgxq6vqbswfn9aafz0h694n6rskvdn784"; 15 + 16 + doCheck = false; # needs internet connection 17 + 18 + passthru.tests = { inherit (nixosTests.prometheus-exporters) domain; }; 19 + 20 + meta = with lib; { 21 + homepage = "https://github.com/caarlos0/domain_exporter"; 22 + description = "Exports the expiration time of your domains as prometheus metrics"; 23 + license = licenses.mit; 24 + maintainers = with maintainers; [ mmilata prusnak ]; 25 + }; 26 + }
+11 -3
pkgs/shells/dash/default.nix
··· 1 - { lib, stdenv, buildPackages, autoreconfHook, fetchurl }: 2 3 stdenv.mkDerivation rec { 4 pname = "dash"; ··· 11 12 hardeningDisable = [ "format" ]; 13 14 - # Temporary fix until a proper one is accepted upstream 15 patches = [ 16 (fetchurl { 17 # Dash executes code when noexec ("-n") is specified ··· 19 url = "https://git.kernel.org/pub/scm/utils/dash/dash.git/patch/?id=29d6f2148f10213de4e904d515e792d2cf8c968e"; 20 sha256 = "08q90bx36ixwlcj331dh7420qyj8i0qh1cc1gljrhd83fhl9w0y5"; 21 }) 22 - ] ++ lib.optional stdenv.isDarwin ./0001-fix-dirent64-et-al-on-darwin.patch; 23 depsBuildBuild = [ buildPackages.stdenv.cc ]; 24 nativeBuildInputs = lib.optional stdenv.isDarwin autoreconfHook; 25 26 meta = with lib; { 27 homepage = "http://gondor.apana.org.au/~herbert/dash/";
··· 1 + { lib, stdenv, buildPackages, autoreconfHook, fetchurl, libedit }: 2 3 stdenv.mkDerivation rec { 4 pname = "dash"; ··· 11 12 hardeningDisable = [ "format" ]; 13 14 patches = [ 15 (fetchurl { 16 # Dash executes code when noexec ("-n") is specified ··· 18 url = "https://git.kernel.org/pub/scm/utils/dash/dash.git/patch/?id=29d6f2148f10213de4e904d515e792d2cf8c968e"; 19 sha256 = "08q90bx36ixwlcj331dh7420qyj8i0qh1cc1gljrhd83fhl9w0y5"; 20 }) 21 + ] ++ lib.optionals stdenv.isDarwin [ 22 + # Temporary fix until a proper one is accepted upstream 23 + ./0001-fix-dirent64-et-al-on-darwin.patch 24 + ]; 25 + 26 depsBuildBuild = [ buildPackages.stdenv.cc ]; 27 nativeBuildInputs = lib.optional stdenv.isDarwin autoreconfHook; 28 + buildInputs = [ libedit ]; 29 + 30 + configureFlags = [ "--with-libedit" ]; 31 + 32 + enableParallelBuilding = true; 33 34 meta = with lib; { 35 homepage = "http://gondor.apana.org.au/~herbert/dash/";
+2 -2
pkgs/tools/misc/chezmoi/default.nix
··· 2 3 buildGoModule rec { 4 pname = "chezmoi"; 5 - version = "2.0.7"; 6 7 src = fetchFromGitHub { 8 owner = "twpayne"; 9 repo = "chezmoi"; 10 rev = "v${version}"; 11 - sha256 = "sha256-mJJtkJ57rYEe1BWK3TWAMOar/IUUC9ybiccx81puHsE="; 12 }; 13 14 vendorSha256 = "sha256-YU+t8GVsLYWONezUIB4NUrVxtYOmf/2b5v4v3VSYtBU=";
··· 2 3 buildGoModule rec { 4 pname = "chezmoi"; 5 + version = "2.0.8"; 6 7 src = fetchFromGitHub { 8 owner = "twpayne"; 9 repo = "chezmoi"; 10 rev = "v${version}"; 11 + sha256 = "sha256-bGrGekZLystw3AvQP9bdFGlxteGCzwrhamaO8WLKf7U="; 12 }; 13 14 vendorSha256 = "sha256-YU+t8GVsLYWONezUIB4NUrVxtYOmf/2b5v4v3VSYtBU=";
+3 -3
pkgs/tools/misc/fselect/default.nix
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "fselect"; 5 - version = "0.7.3"; 6 7 src = fetchFromGitHub { 8 owner = "jhspetersson"; 9 repo = "fselect"; 10 rev = version; 11 - sha256 = "sha256-udHSyw7tf1toB+v67BvJ49INFJdNR2BjQuHEzQJyIoU="; 12 }; 13 14 - cargoSha256 = "sha256-vVIanMkc0sPzu0L48oOh8wEEUOckR/AYkz81u4OR+fE="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 buildInputs = lib.optional stdenv.isDarwin libiconv;
··· 2 3 rustPlatform.buildRustPackage rec { 4 pname = "fselect"; 5 + version = "0.7.4"; 6 7 src = fetchFromGitHub { 8 owner = "jhspetersson"; 9 repo = "fselect"; 10 rev = version; 11 + sha256 = "sha256-gwFX5c5y4bL+KhPDnvCbDco1ORYyqZYFsetMrmOATZU="; 12 }; 13 14 + cargoSha256 = "sha256-2cs+5UL3tNfUzjlFIdsG05moiOktXSJOZJlgo/rZINw="; 15 16 nativeBuildInputs = [ installShellFiles ]; 17 buildInputs = lib.optional stdenv.isDarwin libiconv;
+3
pkgs/top-level/all-packages.nix
··· 13232 13233 shellcheck = callPackage ../development/tools/shellcheck {}; 13234 13235 schemaspy = callPackage ../development/tools/database/schemaspy { }; 13236 13237 shncpd = callPackage ../tools/networking/shncpd { }; ··· 18870 prometheus-consul-exporter = callPackage ../servers/monitoring/prometheus/consul-exporter.nix { }; 18871 prometheus-dnsmasq-exporter = callPackage ../servers/monitoring/prometheus/dnsmasq-exporter.nix { }; 18872 prometheus-dovecot-exporter = callPackage ../servers/monitoring/prometheus/dovecot-exporter.nix { }; 18873 prometheus-flow-exporter = callPackage ../servers/monitoring/prometheus/flow-exporter.nix { }; 18874 prometheus-fritzbox-exporter = callPackage ../servers/monitoring/prometheus/fritzbox-exporter.nix { }; 18875 prometheus-gitlab-ci-pipelines-exporter = callPackage ../servers/monitoring/prometheus/gitlab-ci-pipelines-exporter.nix { };
··· 13232 13233 shellcheck = callPackage ../development/tools/shellcheck {}; 13234 13235 + shellharden = callPackage ../development/tools/shellharden {}; 13236 + 13237 schemaspy = callPackage ../development/tools/database/schemaspy { }; 13238 13239 shncpd = callPackage ../tools/networking/shncpd { }; ··· 18872 prometheus-consul-exporter = callPackage ../servers/monitoring/prometheus/consul-exporter.nix { }; 18873 prometheus-dnsmasq-exporter = callPackage ../servers/monitoring/prometheus/dnsmasq-exporter.nix { }; 18874 prometheus-dovecot-exporter = callPackage ../servers/monitoring/prometheus/dovecot-exporter.nix { }; 18875 + prometheus-domain-exporter = callPackage ../servers/monitoring/prometheus/domain-exporter.nix { }; 18876 prometheus-flow-exporter = callPackage ../servers/monitoring/prometheus/flow-exporter.nix { }; 18877 prometheus-fritzbox-exporter = callPackage ../servers/monitoring/prometheus/fritzbox-exporter.nix { }; 18878 prometheus-gitlab-ci-pipelines-exporter = callPackage ../servers/monitoring/prometheus/gitlab-ci-pipelines-exporter.nix { };