···1919 steps:
2020 # Use a GitHub App to create the PR so that CI gets triggered
2121 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
2222- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
2222+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
2323 id: app-token
2424 with:
2525 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
+2-2
.github/workflows/codeowners-v2.yml
···6363 - name: Build codeowners validator
6464 run: nix-build base/ci -A codeownersValidator
65656666- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
6666+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
6767 id: app-token
6868 with:
6969 app-id: ${{ vars.OWNER_RO_APP_ID }}
···9696 # This is intentional, because we need to request the review of owners as declared in the base branch.
9797 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
98989999- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
9999+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
100100 id: app-token
101101 with:
102102 app-id: ${{ vars.OWNER_APP_ID }}
+1-1
.github/workflows/eval.yml
···244244 steps:
245245 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions
246246 # Can't use the token received from permissions above, because it can't get enough permissions
247247- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
247247+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
248248 id: app-token
249249 with:
250250 app-id: ${{ vars.OWNER_APP_ID }}
+1-1
.github/workflows/periodic-merge.yml
···1919 steps:
2020 # Use a GitHub App to create the PR so that CI gets triggered
2121 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
2222- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
2222+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
2323 id: app-token
2424 with:
2525 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
···396396 raise NRError(
397397 "please specify one of the following "
398398 + "supported image variants via --image-variant:\n"
399399- + "\n".join(f"- {v}" for v in variants.keys())
399399+ + "\n".join(f"- {v}" for v in variants)
400400 )
401401402402 match action:
···518518 "Done. The virtual machine can be started by running", vm_path
519519 )
520520 case Action.BUILD_IMAGE:
521521- disk_path = path_to_config / variants[args.image_variant]
521521+ if flake:
522522+ image_name = nix.get_build_image_name_flake(
523523+ flake,
524524+ args.image_variant,
525525+ eval_flags=flake_common_flags,
526526+ )
527527+ else:
528528+ image_name = nix.get_build_image_name(
529529+ build_attr,
530530+ args.image_variant,
531531+ instantiate_flags=flake_common_flags,
532532+ )
533533+ disk_path = path_to_config / image_name
522534 print_result("Done. The disk image can be found in", disk_path)
523535524536 case Action.EDIT:
···369369 "agpl"
370370 ]
371371 },
372372+ "twofactor_admin": {
373373+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
374374+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
375375+ "version": "4.8.0",
376376+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
377377+ "homepage": "",
378378+ "licenses": [
379379+ "agpl"
380380+ ]
381381+ },
372382 "twofactor_nextcloud_notification": {
373383 "hash": "sha256-4fXWgDeiup5/Gm9hdZDj/u07rp/Nzwly53aLUT/d0IU=",
374384 "url": "https://github.com/nextcloud-releases/twofactor_nextcloud_notification/releases/download/v3.9.0/twofactor_nextcloud_notification-v3.9.0.tar.gz",
+10
pkgs/servers/nextcloud/packages/30.json
···369369 "agpl"
370370 ]
371371 },
372372+ "twofactor_admin": {
373373+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
374374+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
375375+ "version": "4.8.0",
376376+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
377377+ "homepage": "",
378378+ "licenses": [
379379+ "agpl"
380380+ ]
381381+ },
372382 "twofactor_webauthn": {
373383 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=",
374384 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",
+10
pkgs/servers/nextcloud/packages/31.json
···359359 "agpl"
360360 ]
361361 },
362362+ "twofactor_admin": {
363363+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
364364+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
365365+ "version": "4.8.0",
366366+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
367367+ "homepage": "",
368368+ "licenses": [
369369+ "agpl"
370370+ ]
371371+ },
362372 "twofactor_webauthn": {
363373 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=",
364374 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",