···19 steps:
20 # Use a GitHub App to create the PR so that CI gets triggered
21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
22- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
23 id: app-token
24 with:
25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
···19 steps:
20 # Use a GitHub App to create the PR so that CI gets triggered
21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
22+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
23 id: app-token
24 with:
25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
+2-2
.github/workflows/codeowners-v2.yml
···63 - name: Build codeowners validator
64 run: nix-build base/ci -A codeownersValidator
6566- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
67 id: app-token
68 with:
69 app-id: ${{ vars.OWNER_RO_APP_ID }}
···96 # This is intentional, because we need to request the review of owners as declared in the base branch.
97 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
9899- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
100 id: app-token
101 with:
102 app-id: ${{ vars.OWNER_APP_ID }}
···63 - name: Build codeowners validator
64 run: nix-build base/ci -A codeownersValidator
6566+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
67 id: app-token
68 with:
69 app-id: ${{ vars.OWNER_RO_APP_ID }}
···96 # This is intentional, because we need to request the review of owners as declared in the base branch.
97 - uses: actions/checkout@11bd71901bbe5b1630ceea73d27597364c9af683 # v4.2.2
9899+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
100 id: app-token
101 with:
102 app-id: ${{ vars.OWNER_APP_ID }}
+1-1
.github/workflows/eval.yml
···244 steps:
245 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions
246 # Can't use the token received from permissions above, because it can't get enough permissions
247- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
248 id: app-token
249 with:
250 app-id: ${{ vars.OWNER_APP_ID }}
···244 steps:
245 # See ./codeowners-v2.yml, reuse the same App because we need the same permissions
246 # Can't use the token received from permissions above, because it can't get enough permissions
247+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
248 id: app-token
249 with:
250 app-id: ${{ vars.OWNER_APP_ID }}
+1-1
.github/workflows/periodic-merge.yml
···19 steps:
20 # Use a GitHub App to create the PR so that CI gets triggered
21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
22- - uses: actions/create-github-app-token@af35edadc00be37caa72ed9f3e6d5f7801bfdf09 # v1.11.7
23 id: app-token
24 with:
25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
···19 steps:
20 # Use a GitHub App to create the PR so that CI gets triggered
21 # The App is scoped to Repository > Contents and Pull Requests: write for Nixpkgs
22+ - uses: actions/create-github-app-token@3ff1caaa28b64c9cc276ce0a02e2ff584f3900c5 # v2.0.2
23 id: app-token
24 with:
25 app-id: ${{ vars.NIXPKGS_CI_APP_ID }}
···396 raise NRError(
397 "please specify one of the following "
398 + "supported image variants via --image-variant:\n"
399- + "\n".join(f"- {v}" for v in variants.keys())
400 )
401402 match action:
···518 "Done. The virtual machine can be started by running", vm_path
519 )
520 case Action.BUILD_IMAGE:
521- disk_path = path_to_config / variants[args.image_variant]
000000000000522 print_result("Done. The disk image can be found in", disk_path)
523524 case Action.EDIT:
···396 raise NRError(
397 "please specify one of the following "
398 + "supported image variants via --image-variant:\n"
399+ + "\n".join(f"- {v}" for v in variants)
400 )
401402 match action:
···518 "Done. The virtual machine can be started by running", vm_path
519 )
520 case Action.BUILD_IMAGE:
521+ if flake:
522+ image_name = nix.get_build_image_name_flake(
523+ flake,
524+ args.image_variant,
525+ eval_flags=flake_common_flags,
526+ )
527+ else:
528+ image_name = nix.get_build_image_name(
529+ build_attr,
530+ args.image_variant,
531+ instantiate_flags=flake_common_flags,
532+ )
533+ disk_path = path_to_config / image_name
534 print_result("Done. The disk image can be found in", disk_path)
535536 case Action.EDIT:
···353 value = import <nixpkgs/nixos>;
354 set = if builtins.isFunction value then value {} else value;
355 in
356- builtins.mapAttrs (n: v: v.passthru.filePath) set.config.system.build.images
357 """),
358 ],
359 stdout=PIPE,
···376 value = import "{tmp_path}";
377 set = if builtins.isFunction value then value {{}} else value;
378 in
379- builtins.mapAttrs (n: v: v.passthru.filePath) set.preAttr.config.system.build.images
380 """),
381 "--inst-flag",
382 ],
···411 "--json",
412 "flake.nix#myAttr.config.system.build.images",
413 "--apply",
414- "builtins.mapAttrs (n: v: v.passthru.filePath)",
415 "--eval-flag",
416 ],
417 stdout=PIPE,
···353 value = import <nixpkgs/nixos>;
354 set = if builtins.isFunction value then value {} else value;
355 in
356+ builtins.attrNames set.config.system.build.images
357 """),
358 ],
359 stdout=PIPE,
···376 value = import "{tmp_path}";
377 set = if builtins.isFunction value then value {{}} else value;
378 in
379+ builtins.attrNames set.preAttr.config.system.build.images
380 """),
381 "--inst-flag",
382 ],
···411 "--json",
412 "flake.nix#myAttr.config.system.build.images",
413 "--apply",
414+ "builtins.attrNames",
415 "--eval-flag",
416 ],
417 stdout=PIPE,
···369 "agpl"
370 ]
371 },
372+ "twofactor_admin": {
373+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
374+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
375+ "version": "4.8.0",
376+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
377+ "homepage": "",
378+ "licenses": [
379+ "agpl"
380+ ]
381+ },
382 "twofactor_nextcloud_notification": {
383 "hash": "sha256-4fXWgDeiup5/Gm9hdZDj/u07rp/Nzwly53aLUT/d0IU=",
384 "url": "https://github.com/nextcloud-releases/twofactor_nextcloud_notification/releases/download/v3.9.0/twofactor_nextcloud_notification-v3.9.0.tar.gz",
···369 "agpl"
370 ]
371 },
372+ "twofactor_admin": {
373+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
374+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
375+ "version": "4.8.0",
376+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
377+ "homepage": "",
378+ "licenses": [
379+ "agpl"
380+ ]
381+ },
382 "twofactor_webauthn": {
383 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=",
384 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",
···359 "agpl"
360 ]
361 },
362+ "twofactor_admin": {
363+ "hash": "sha256-zZvH7xfSooKBG4CKvSuf8D/6KnKEunLa+DRLAkWGoow=",
364+ "url": "https://github.com/nextcloud-releases/twofactor_admin/releases/download/v4.8.0/twofactor_admin.tar.gz",
365+ "version": "4.8.0",
366+ "description": "This two-factor auth (2FA) provider for Nextcloud allows admins to generate a one-time\n\t\tcode for users to log into a 2FA protected account. This is helpful in situations where\n\t\tusers have lost access to their other 2FA methods or mandatory 2FA without any previously\n\t\tenabled 2FA provider.",
367+ "homepage": "",
368+ "licenses": [
369+ "agpl"
370+ ]
371+ },
372 "twofactor_webauthn": {
373 "hash": "sha256-16Silofm/alQaKZ2buNqyLEjKK2kR2IpTAxEawHpGjI=",
374 "url": "https://github.com/nextcloud-releases/twofactor_webauthn/releases/download/v2.1.0/twofactor_webauthn-v2.1.0.tar.gz",