Merge branch 'master' into staging-next

+744 -413
+1 -1
doc/languages-frameworks/emscripten.section.md
··· 102 102 echo "================= /testing zlib using node =================" 103 103 ''; 104 104 105 - postPatch = pkgs.stdenv.lib.optionalString pkgs.stdenv.isDarwin '' 105 + postPatch = pkgs.lib.optionalString pkgs.stdenv.isDarwin '' 106 106 substituteInPlace configure \ 107 107 --replace '/usr/bin/libtool' 'ar' \ 108 108 --replace 'AR="libtool"' 'AR="ar"' \
+30
nixos/doc/manual/release-notes/rl-2103.xml
··· 187 187 </listitem> 188 188 <listitem> 189 189 <para> 190 + The uWSGI server is now built with POSIX capabilities. As a consequence, 191 + root is no longer required in emperor mode and the service defaults to 192 + running as the unprivileged <literal>uwsgi</literal> user. Any additional 193 + capability can be added via the new option 194 + <xref linkend="opt-services.uwsgi.capabilities"/>. 195 + The previous behaviour can be restored by setting: 196 + <programlisting> 197 + <xref linkend="opt-services.uwsgi.user"/> = "root"; 198 + <xref linkend="opt-services.uwsgi.group"/> = "root"; 199 + <xref linkend="opt-services.uwsgi.instance"/> = 200 + { 201 + uid = "uwsgi"; 202 + gid = "uwsgi"; 203 + }; 204 + </programlisting> 205 + </para> 206 + <para> 207 + Another incompatibility from the previous release is that vassals running under a 208 + different user or group need to use <literal>immediate-{uid,gid}</literal> 209 + instead of the usual <literal>uid,gid</literal> options. 210 + </para> 211 + </listitem> 212 + <listitem> 213 + <para> 190 214 <package>btc1</package> has been abandoned upstream, and removed. 191 215 </para> 192 216 </listitem> ··· 533 557 <para> 534 558 The GNOME desktop manager once again installs <package>gnome3.epiphany</package> by default. 535 559 </para> 560 + </listitem> 561 + <listitem> 562 + <para> 563 + NixOS now generates empty <literal>/etc/netgroup</literal>. 564 + <literal>/etc/netgroup</literal> defines network-wide groups and may affect to setups using NIS. 565 + </para> 536 566 </listitem> 537 567 </itemizedlist> 538 568 </section>
+4
nixos/modules/config/networking.nix
··· 193 193 cat ${escapeShellArgs cfg.hostFiles} > $out 194 194 ''; 195 195 196 + # /etc/netgroup: Network-wide groups. 197 + netgroup.text = mkDefault '' 198 + ''; 199 + 196 200 # /etc/host.conf: resolver configuration file 197 201 "host.conf".text = '' 198 202 multi on
+2 -2
nixos/modules/services/security/fprintd.nix
··· 43 43 44 44 config = mkIf cfg.enable { 45 45 46 - services.dbus.packages = [ pkgs.fprintd ]; 46 + services.dbus.packages = [ cfg.package ]; 47 47 48 - environment.systemPackages = [ pkgs.fprintd ]; 48 + environment.systemPackages = [ cfg.package ]; 49 49 50 50 systemd.packages = [ cfg.package ]; 51 51
+3 -6
nixos/modules/services/web-apps/ihatemoney/default.nix
··· 44 44 in 45 45 { 46 46 options.services.ihatemoney = { 47 - enable = mkEnableOption "ihatemoney webapp. Note that this will set uwsgi to emperor mode running as root"; 47 + enable = mkEnableOption "ihatemoney webapp. Note that this will set uwsgi to emperor mode"; 48 48 backend = mkOption { 49 49 type = types.enum [ "sqlite" "postgresql" ]; 50 50 default = "sqlite"; ··· 116 116 services.uwsgi = { 117 117 enable = true; 118 118 plugins = [ "python3" ]; 119 - # the vassal needs to be able to setuid 120 - user = "root"; 121 - group = "root"; 122 119 instance = { 123 120 type = "emperor"; 124 121 vassals.ihatemoney = { 125 122 type = "normal"; 126 123 strict = true; 127 - uid = user; 128 - gid = group; 124 + immediate-uid = user; 125 + immediate-gid = group; 129 126 # apparently flask uses threads: https://github.com/spiral-project/ihatemoney/commit/c7815e48781b6d3a457eaff1808d179402558f8c 130 127 enable-threads = true; 131 128 module = "wsgi:application";
+59 -12
nixos/modules/services/web-servers/uwsgi.nix
··· 5 5 let 6 6 cfg = config.services.uwsgi; 7 7 8 + isEmperor = cfg.instance.type == "emperor"; 9 + 10 + imperialPowers = 11 + [ 12 + # spawn other user processes 13 + "CAP_SETUID" "CAP_SETGID" 14 + "CAP_SYS_CHROOT" 15 + # transfer capabilities 16 + "CAP_SETPCAP" 17 + # create other user sockets 18 + "CAP_CHOWN" 19 + ]; 20 + 8 21 buildCfg = name: c: 9 22 let 10 23 plugins = 11 24 if any (n: !any (m: m == n) cfg.plugins) (c.plugins or []) 12 - then throw "`plugins` attribute in UWSGI configuration contains plugins not in config.services.uwsgi.plugins" 25 + then throw "`plugins` attribute in uWSGI configuration contains plugins not in config.services.uwsgi.plugins" 13 26 else c.plugins or cfg.plugins; 14 27 15 28 hasPython = v: filter (n: n == "python${v}") plugins != []; ··· 18 31 19 32 python = 20 33 if hasPython2 && hasPython3 then 21 - throw "`plugins` attribute in UWSGI configuration shouldn't contain both python2 and python3" 34 + throw "`plugins` attribute in uWSGI configuration shouldn't contain both python2 and python3" 22 35 else if hasPython2 then cfg.package.python2 23 36 else if hasPython3 then cfg.package.python3 24 37 else null; ··· 43 56 oldPaths = filter (x: x != null) (map getPath env'); 44 57 in env' ++ [ "PATH=${optionalString (oldPaths != []) "${last oldPaths}:"}${pythonEnv}/bin" ]; 45 58 } 46 - else if c.type == "emperor" 59 + else if isEmperor 47 60 then { 48 61 emperor = if builtins.typeOf c.vassals != "set" then c.vassals 49 62 else pkgs.buildEnv { ··· 51 64 paths = mapAttrsToList buildCfg c.vassals; 52 65 }; 53 66 } // removeAttrs c [ "type" "vassals" ] 54 - else throw "`type` attribute in UWSGI configuration should be either 'normal' or 'emperor'"; 67 + else throw "`type` attribute in uWSGI configuration should be either 'normal' or 'emperor'"; 55 68 }; 56 69 57 70 in pkgs.writeTextDir "${name}.json" (builtins.toJSON uwsgiCfg); ··· 79 92 }; 80 93 81 94 instance = mkOption { 82 - type = with lib.types; let 95 + type = with types; let 83 96 valueType = nullOr (oneOf [ 84 97 bool 85 98 int ··· 137 150 user = mkOption { 138 151 type = types.str; 139 152 default = "uwsgi"; 140 - description = "User account under which uwsgi runs."; 153 + description = "User account under which uWSGI runs."; 141 154 }; 142 155 143 156 group = mkOption { 144 157 type = types.str; 145 158 default = "uwsgi"; 146 - description = "Group account under which uwsgi runs."; 159 + description = "Group account under which uWSGI runs."; 160 + }; 161 + 162 + capabilities = mkOption { 163 + type = types.listOf types.str; 164 + apply = caps: caps ++ optionals isEmperor imperialPowers; 165 + default = [ ]; 166 + example = literalExample '' 167 + [ 168 + "CAP_NET_BIND_SERVICE" # bind on ports <1024 169 + "CAP_NET_RAW" # open raw sockets 170 + ] 171 + ''; 172 + description = '' 173 + Grant capabilities to the uWSGI instance. See the 174 + <literal>capabilities(7)</literal> for available values. 175 + <note> 176 + <para> 177 + uWSGI runs as an unprivileged user (even as Emperor) with the minimal 178 + capabilities required. This option can be used to add fine-grained 179 + permissions without running the service as root. 180 + </para> 181 + <para> 182 + When in Emperor mode, any capability to be inherited by a vassal must 183 + be specified again in the vassal configuration using <literal>cap</literal>. 184 + See the uWSGI <link 185 + xlink:href="https://uwsgi-docs.readthedocs.io/en/latest/Capabilities.html">docs</link> 186 + for more information. 187 + </para> 188 + </note> 189 + ''; 147 190 }; 148 191 }; 149 192 }; 150 193 151 194 config = mkIf cfg.enable { 195 + systemd.tmpfiles.rules = optional (cfg.runDir != "/run/uwsgi") '' 196 + d ${cfg.runDir} 775 ${cfg.user} ${cfg.group} 197 + ''; 198 + 152 199 systemd.services.uwsgi = { 153 200 wantedBy = [ "multi-user.target" ]; 154 - preStart = '' 155 - mkdir -p ${cfg.runDir} 156 - chown ${cfg.user}:${cfg.group} ${cfg.runDir} 157 - ''; 158 201 serviceConfig = { 202 + User = cfg.user; 203 + Group = cfg.group; 159 204 Type = "notify"; 160 - ExecStart = "${cfg.package}/bin/uwsgi --uid ${cfg.user} --gid ${cfg.group} --json ${buildCfg "server" cfg.instance}/server.json"; 205 + ExecStart = "${cfg.package}/bin/uwsgi --json ${buildCfg "server" cfg.instance}/server.json"; 161 206 ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; 162 207 ExecStop = "${pkgs.coreutils}/bin/kill -INT $MAINPID"; 163 208 NotifyAccess = "main"; 164 209 KillSignal = "SIGQUIT"; 210 + AmbientCapabilities = cfg.capabilities; 211 + CapabilityBoundingSet = cfg.capabilities; 165 212 }; 166 213 }; 167 214
+1 -1
nixos/modules/system/boot/loader/raspberrypi/raspberrypi.nix
··· 20 20 timeoutStr = if blCfg.timeout == null then "-1" else toString blCfg.timeout; 21 21 22 22 isAarch64 = pkgs.stdenv.hostPlatform.isAarch64; 23 - optional = pkgs.stdenv.lib.optionalString; 23 + optional = pkgs.lib.optionalString; 24 24 25 25 configTxt = 26 26 pkgs.writeText "config.txt" (''
+1 -1
nixos/tests/3proxy.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "3proxy"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ misuzu ]; 5 5 }; 6 6
+1 -1
nixos/tests/agda.nix
··· 9 9 in 10 10 { 11 11 name = "agda"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ alexarice turion ]; 14 14 }; 15 15
+1 -1
nixos/tests/ammonite.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "ammonite"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/atd.nix
··· 2 2 3 3 { 4 4 name = "atd"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ bjornfor ]; 7 7 }; 8 8
+1 -1
nixos/tests/avahi.nix
··· 8 8 # Test whether `avahi-daemon' and `libnss-mdns' work as expected. 9 9 import ./make-test-python.nix { 10 10 name = "avahi"; 11 - meta = with pkgs.stdenv.lib.maintainers; { 11 + meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ eelco ]; 13 13 }; 14 14
+1 -1
nixos/tests/awscli.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "awscli"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/babeld.nix
··· 1 1 2 2 import ./make-test-python.nix ({ pkgs, lib, ...} : { 3 3 name = "babeld"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ hexa ]; 6 6 }; 7 7
+1 -1
nixos/tests/bat.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "bat"; 3 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 4 4 5 5 machine = { pkgs, ... }: { environment.systemPackages = [ pkgs.bat ]; }; 6 6
+1 -1
nixos/tests/bcachefs.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "bcachefs"; 3 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chiiruno ]; 3 + meta.maintainers = with pkgs.lib.maintainers; [ chiiruno ]; 4 4 5 5 machine = { pkgs, ... }: { 6 6 virtualisation.emptyDiskImages = [ 4096 ];
+1 -1
nixos/tests/bitcoind.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "bitcoind"; 3 - meta = with pkgs.stdenv.lib; { 3 + meta = with pkgs.lib; { 4 4 maintainers = with maintainers; [ _1000101 ]; 5 5 }; 6 6
+1 -1
nixos/tests/bittorrent.nix
··· 35 35 36 36 { 37 37 name = "bittorrent"; 38 - meta = with pkgs.stdenv.lib.maintainers; { 38 + meta = with pkgs.lib.maintainers; { 39 39 maintainers = [ domenkozar eelco rob bobvanderlinden ]; 40 40 }; 41 41
+1 -1
nixos/tests/bitwarden.nix
··· 27 27 makeBitwardenTest = backend: makeTest { 28 28 name = "bitwarden_rs-${backend}"; 29 29 meta = { 30 - maintainers = with pkgs.stdenv.lib.maintainers; [ jjjollyjim ]; 30 + maintainers = with pkgs.lib.maintainers; [ jjjollyjim ]; 31 31 }; 32 32 33 33 nodes = {
+1 -1
nixos/tests/blockbook-frontend.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "blockbook-frontend"; 3 - meta = with pkgs.stdenv.lib; { 3 + meta = with pkgs.lib; { 4 4 maintainers = with maintainers; [ _1000101 ]; 5 5 }; 6 6
+1 -1
nixos/tests/boot-stage1.nix
··· 158 158 machine.succeed('pgrep -a -f "^kcanary$"') 159 159 ''; 160 160 161 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ aszlig ]; 161 + meta.maintainers = with pkgs.lib.maintainers; [ aszlig ]; 162 162 })
+1 -1
nixos/tests/borgbackup.nix
··· 36 36 37 37 in { 38 38 name = "borgbackup"; 39 - meta = with pkgs.stdenv.lib; { 39 + meta = with pkgs.lib; { 40 40 maintainers = with maintainers; [ dotlambda ]; 41 41 }; 42 42
+1 -1
nixos/tests/buildbot.nix
··· 109 109 bbworker.fail("nc -z bbmaster 8011") 110 110 ''; 111 111 112 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ nand0p ]; 112 + meta.maintainers = with pkgs.lib.maintainers; [ nand0p ]; 113 113 } {}
+1 -1
nixos/tests/buildkite-agents.nix
··· 2 2 3 3 { 4 4 name = "buildkite-agent"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ flokli ]; 7 7 }; 8 8
+1 -1
nixos/tests/caddy.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "caddy"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ xfix Br1ght0ne ]; 5 5 }; 6 6
+1 -1
nixos/tests/cadvisor.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... } : { 2 2 name = "cadvisor"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ offline ]; 5 5 }; 6 6
+1 -1
nixos/tests/cage.nix
··· 2 2 3 3 { 4 4 name = "cage"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ matthewbauer flokli ]; 7 7 }; 8 8
+1 -1
nixos/tests/cagebreak.nix
··· 9 9 in 10 10 { 11 11 name = "cagebreak"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ berbiche ]; 14 14 }; 15 15
+1 -1
nixos/tests/ceph-multi-node.nix
··· 218 218 ''; 219 219 in { 220 220 name = "basic-multi-node-ceph-cluster"; 221 - meta = with pkgs.stdenv.lib.maintainers; { 221 + meta = with pkgs.lib.maintainers; { 222 222 maintainers = [ lejonet ]; 223 223 }; 224 224
+1 -1
nixos/tests/ceph-single-node.nix
··· 184 184 ''; 185 185 in { 186 186 name = "basic-single-node-ceph-cluster"; 187 - meta = with pkgs.stdenv.lib.maintainers; { 187 + meta = with pkgs.lib.maintainers; { 188 188 maintainers = [ lejonet johanot ]; 189 189 }; 190 190
+1 -1
nixos/tests/charliecloud.nix
··· 11 11 12 12 in { 13 13 name = "charliecloud"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ bzizou ]; 16 16 }; 17 17
+1 -1
nixos/tests/cjdns.nix
··· 19 19 20 20 import ./make-test-python.nix ({ pkgs, ...} : { 21 21 name = "cjdns"; 22 - meta = with pkgs.stdenv.lib.maintainers; { 22 + meta = with pkgs.lib.maintainers; { 23 23 maintainers = [ ehmry ]; 24 24 }; 25 25
+1 -1
nixos/tests/clickhouse.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "clickhouse"; 3 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ]; 3 + meta.maintainers = with pkgs.lib.maintainers; [ ma27 ]; 4 4 5 5 machine = { 6 6 services.clickhouse.enable = true;
+1 -1
nixos/tests/cloud-init.nix
··· 40 40 }; 41 41 in makeTest { 42 42 name = "cloud-init"; 43 - meta = with pkgs.stdenv.lib.maintainers; { 43 + meta = with pkgs.lib.maintainers; { 44 44 maintainers = [ lewo ]; 45 45 }; 46 46 machine = { ... }:
+1 -1
nixos/tests/cockroachdb.nix
··· 99 99 100 100 in import ./make-test-python.nix ({ pkgs, ...} : { 101 101 name = "cockroachdb"; 102 - meta.maintainers = with pkgs.stdenv.lib.maintainers; 102 + meta.maintainers = with pkgs.lib.maintainers; 103 103 [ thoughtpolice ]; 104 104 105 105 nodes = {
+1 -1
nixos/tests/containers-bridge.nix
··· 9 9 10 10 import ./make-test-python.nix ({ pkgs, ...} : { 11 11 name = "containers-bridge"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ aristid aszlig eelco kampfschlaefer ]; 14 14 }; 15 15
+1 -1
nixos/tests/containers-extra_veth.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "containers-extra_veth"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ kampfschlaefer ]; 7 7 }; 8 8
+1 -1
nixos/tests/containers-hosts.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "containers-hosts"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ montag451 ]; 7 7 }; 8 8
+1 -1
nixos/tests/containers-imperative.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "containers-imperative"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ aristid aszlig eelco kampfschlaefer ]; 7 7 }; 8 8
+1 -1
nixos/tests/containers-ip.nix
··· 15 15 16 16 in import ./make-test-python.nix ({ pkgs, ...} : { 17 17 name = "containers-ipv4-ipv6"; 18 - meta = with pkgs.stdenv.lib.maintainers; { 18 + meta = with pkgs.lib.maintainers; { 19 19 maintainers = [ aristid aszlig eelco kampfschlaefer ]; 20 20 }; 21 21
+1 -1
nixos/tests/containers-macvlans.nix
··· 8 8 9 9 import ./make-test-python.nix ({ pkgs, ...} : { 10 10 name = "containers-macvlans"; 11 - meta = with pkgs.stdenv.lib.maintainers; { 11 + meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ montag451 ]; 13 13 }; 14 14
+1 -1
nixos/tests/containers-physical_interfaces.nix
··· 1 1 2 2 import ./make-test-python.nix ({ pkgs, ...} : { 3 3 name = "containers-physical_interfaces"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ kampfschlaefer ]; 6 6 }; 7 7
+1 -1
nixos/tests/containers-portforward.nix
··· 9 9 10 10 import ./make-test-python.nix ({ pkgs, ...} : { 11 11 name = "containers-portforward"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ aristid aszlig eelco kampfschlaefer ianwookim ]; 14 14 }; 15 15
+1 -1
nixos/tests/containers-reloadable.nix
··· 16 16 }; 17 17 in { 18 18 name = "containers-reloadable"; 19 - meta = with pkgs.stdenv.lib.maintainers; { 19 + meta = with pkgs.lib.maintainers; { 20 20 maintainers = [ danbst ]; 21 21 }; 22 22
+1 -1
nixos/tests/containers-restart_networking.nix
··· 19 19 in import ./make-test-python.nix ({ pkgs, ...} : 20 20 { 21 21 name = "containers-restart_networking"; 22 - meta = with pkgs.stdenv.lib.maintainers; { 22 + meta = with pkgs.lib.maintainers; { 23 23 maintainers = [ kampfschlaefer ]; 24 24 }; 25 25
+1 -1
nixos/tests/containers-tmpfs.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "containers-tmpfs"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ kampka ]; 7 7 }; 8 8
+1 -1
nixos/tests/convos.nix
··· 6 6 in 7 7 { 8 8 name = "convos"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ sgo ]; 11 11 }; 12 12
+1 -1
nixos/tests/couchdb.nix
··· 19 19 20 20 { 21 21 name = "couchdb"; 22 - meta = with pkgs.stdenv.lib.maintainers; { 22 + meta = with pkgs.lib.maintainers; { 23 23 maintainers = [ fpletz ]; 24 24 }; 25 25
+1 -1
nixos/tests/cri-o.nix
··· 1 1 # This test runs CRI-O and verifies via critest 2 2 import ./make-test-python.nix ({ pkgs, ... }: { 3 3 name = "cri-o"; 4 - maintainers = with pkgs.stdenv.lib.maintainers; teams.podman.members; 4 + maintainers = with pkgs.lib.maintainers; teams.podman.members; 5 5 6 6 nodes = { 7 7 crio = {
+1 -1
nixos/tests/deluge.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "deluge"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ flokli ]; 5 5 }; 6 6
+1 -1
nixos/tests/dnscrypt-proxy2.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "dnscrypt-proxy2"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ joachifm ]; 5 5 }; 6 6
+1 -1
nixos/tests/dnscrypt-wrapper/default.nix
··· 1 1 import ../make-test-python.nix ({ pkgs, ... }: { 2 2 name = "dnscrypt-wrapper"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ rnhmjoj ]; 5 5 }; 6 6
+1 -1
nixos/tests/docker-edge.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "docker"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ nequissimus offline ]; 7 7 }; 8 8
+1 -1
nixos/tests/docker-registry.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "docker-registry"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ globin ma27 ironpinguin ]; 7 7 }; 8 8
+1 -1
nixos/tests/docker-tools-cross.nix
··· 35 35 36 36 in { 37 37 name = "docker-tools"; 38 - meta = with pkgs.stdenv.lib.maintainers; { 38 + meta = with pkgs.lib.maintainers; { 39 39 maintainers = [ roberth ]; 40 40 }; 41 41
+1 -1
nixos/tests/docker-tools-overlay.nix
··· 3 3 import ./make-test-python.nix ({ pkgs, ... }: 4 4 { 5 5 name = "docker-tools-overlay"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ lnl7 ]; 8 8 }; 9 9
+1 -1
nixos/tests/docker-tools.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ... }: { 4 4 name = "docker-tools"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ lnl7 ]; 7 7 }; 8 8
+1 -1
nixos/tests/docker.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "docker"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ nequissimus offline ]; 7 7 }; 8 8
+1 -1
nixos/tests/documize.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ...} : { 2 2 name = "documize"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6
+1 -1
nixos/tests/dokuwiki.nix
··· 32 32 33 33 in { 34 34 name = "dokuwiki"; 35 - meta = with pkgs.stdenv.lib; { 35 + meta = with pkgs.lib; { 36 36 maintainers = with maintainers; [ _1000101 ]; 37 37 }; 38 38 machine = { ... }: {
+1 -1
nixos/tests/elk.nix
··· 12 12 mkElkTest = name : elk : 13 13 import ./make-test-python.nix ({ 14 14 inherit name; 15 - meta = with pkgs.stdenv.lib.maintainers; { 15 + meta = with pkgs.lib.maintainers; { 16 16 maintainers = [ eelco offline basvandijk ]; 17 17 }; 18 18 nodes = {
+1 -1
nixos/tests/emacs-daemon.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "emacs-daemon"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ]; 5 5 }; 6 6
+1 -1
nixos/tests/engelsystem.nix
··· 2 2 { pkgs, lib, ... }: 3 3 { 4 4 name = "engelsystem"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ talyz ]; 7 7 }; 8 8
+1 -1
nixos/tests/enlightenment.nix
··· 2 2 { 3 3 name = "enlightenment"; 4 4 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ romildo ]; 7 7 }; 8 8
+1 -1
nixos/tests/env.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "environment"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/ergo.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "ergo"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/etcd-cluster.nix
··· 97 97 in { 98 98 name = "etcd"; 99 99 100 - meta = with pkgs.stdenv.lib.maintainers; { 100 + meta = with pkgs.lib.maintainers; { 101 101 maintainers = [ offline ]; 102 102 }; 103 103
+1 -1
nixos/tests/etcd.nix
··· 3 3 import ./make-test-python.nix ({ pkgs, ... } : { 4 4 name = "etcd"; 5 5 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ offline ]; 8 8 }; 9 9
+1 -1
nixos/tests/etesync-dav.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 3 3 name = "etesync-dav"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ _3699n ]; 6 6 }; 7 7
+1 -1
nixos/tests/fenics.nix
··· 29 29 { 30 30 name = "fenics"; 31 31 meta = { 32 - maintainers = with pkgs.stdenv.lib.maintainers; [ knedlsepp ]; 32 + maintainers = with pkgs.lib.maintainers; [ knedlsepp ]; 33 33 }; 34 34 35 35 nodes = {
+1 -1
nixos/tests/ferm.nix
··· 1 1 2 2 import ./make-test-python.nix ({ pkgs, ...} : { 3 3 name = "ferm"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ mic92 ]; 6 6 }; 7 7
+1 -1
nixos/tests/firefox.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, esr ? false, ... }: { 2 2 name = "firefox"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ eelco shlevy ]; 5 5 }; 6 6
+1 -1
nixos/tests/firejail.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "firejail"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ sgo ]; 5 5 }; 6 6
+1 -1
nixos/tests/firewall.nix
··· 2 2 3 3 import ./make-test-python.nix ( { pkgs, ... } : { 4 4 name = "firewall"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ eelco ]; 7 7 }; 8 8
+1 -1
nixos/tests/freeswitch.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "freeswitch"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ misuzu ]; 5 5 }; 6 6 nodes = {
+1 -1
nixos/tests/gerrit.nix
··· 9 9 in { 10 10 name = "gerrit"; 11 11 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ flokli zimbatm ]; 14 14 }; 15 15
+1 -1
nixos/tests/git/hub.nix
··· 1 1 import ../make-test-python.nix ({ pkgs, ...} : { 2 2 name = "hub"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/gitdaemon.nix
··· 7 7 in { 8 8 name = "gitdaemon"; 9 9 10 - meta = with pkgs.stdenv.lib.maintainers; { 10 + meta = with pkgs.lib.maintainers; { 11 11 maintainers = [ tilpner ]; 12 12 }; 13 13
+1 -1
nixos/tests/gitlab.nix
··· 5 5 in 6 6 import ./make-test-python.nix ({ pkgs, lib, ...} : with lib; { 7 7 name = "gitlab"; 8 - meta = with pkgs.stdenv.lib.maintainers; { 8 + meta = with pkgs.lib.maintainers; { 9 9 maintainers = [ globin ]; 10 10 }; 11 11
+1 -1
nixos/tests/gitolite-fcgiwrap.nix
··· 13 13 { 14 14 name = "gitolite-fcgiwrap"; 15 15 16 - meta = with pkgs.stdenv.lib.maintainers; { 16 + meta = with pkgs.lib.maintainers; { 17 17 maintainers = [ bbigras ]; 18 18 }; 19 19
+1 -1
nixos/tests/gitolite.nix
··· 51 51 { 52 52 name = "gitolite"; 53 53 54 - meta = with pkgs.stdenv.lib.maintainers; { 54 + meta = with pkgs.lib.maintainers; { 55 55 maintainers = [ bjornfor ]; 56 56 }; 57 57
+1 -1
nixos/tests/go-neb.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: 2 2 { 3 3 name = "go-neb"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ hexa maralorn ]; 6 6 }; 7 7
+1 -1
nixos/tests/gocd-agent.nix
··· 11 11 12 12 import ./make-test-python.nix ({ pkgs, ...} : { 13 13 name = "gocd-agent"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ grahamc swarren83 ]; 16 16 17 17 # gocd agent needs to register with the autoregister key created on first server startup,
+1 -1
nixos/tests/gocd-server.nix
··· 6 6 7 7 { 8 8 name = "gocd-server"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ swarren83 ]; 11 11 }; 12 12
+1 -1
nixos/tests/google-oslogin/default.nix
··· 11 11 ''; 12 12 in { 13 13 name = "google-oslogin"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ adisbladis flokli ]; 16 16 }; 17 17
+1 -1
nixos/tests/gotify-server.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ...} : { 2 2 name = "gotify-server"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6
+1 -1
nixos/tests/grocy.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "grocy"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ma27 ]; 5 5 }; 6 6
+1 -1
nixos/tests/gvisor.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "gvisor"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ andrew-d ]; 7 7 }; 8 8
+1 -1
nixos/tests/haka.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "haka"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ tvestelind ]; 7 7 }; 8 8
+1 -1
nixos/tests/handbrake.nix
··· 9 9 name = "handbrake"; 10 10 11 11 meta = { 12 - maintainers = with pkgs.stdenv.lib.maintainers; [ danieldk ]; 12 + maintainers = with pkgs.lib.maintainers; [ danieldk ]; 13 13 }; 14 14 15 15 machine = { pkgs, ... }: {
+1 -1
nixos/tests/hardened.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, latestKernel ? false, ... } : { 2 2 name = "hardened"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ joachifm ]; 5 5 }; 6 6
+1 -1
nixos/tests/hitch/default.nix
··· 1 1 import ../make-test-python.nix ({ pkgs, ... }: 2 2 { 3 3 name = "hitch"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ jflanglois ]; 6 6 }; 7 7 machine = { pkgs, ... }: {
+1 -1
nixos/tests/hocker-fetchdocker/default.nix
··· 1 1 import ../make-test-python.nix ({ pkgs, ...} : { 2 2 name = "test-hocker-fetchdocker"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ixmatus ]; 5 5 broken = true; # tries to download from registry-1.docker.io - how did this ever work? 6 6 };
+1 -1
nixos/tests/home-assistant.nix
··· 6 6 mqttPassword = "secret"; 7 7 in { 8 8 name = "home-assistant"; 9 - meta = with pkgs.stdenv.lib; { 9 + meta = with pkgs.lib; { 10 10 maintainers = with maintainers; [ dotlambda ]; 11 11 }; 12 12
+1 -1
nixos/tests/hostname.nix
··· 13 13 in 14 14 makeTest { 15 15 name = "hostname-${fqdn}"; 16 - meta = with pkgs.stdenv.lib.maintainers; { 16 + meta = with pkgs.lib.maintainers; { 17 17 maintainers = [ primeos blitz ]; 18 18 }; 19 19
+1 -1
nixos/tests/hound.nix
··· 1 1 # Test whether `houndd` indexes nixpkgs 2 2 import ./make-test-python.nix ({ pkgs, ... } : { 3 3 name = "hound"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ grahamc ]; 6 6 }; 7 7 machine = { pkgs, ... }: {
+1 -1
nixos/tests/hydra/common.nix
··· 19 19 buildInputs = [ pkgs.makeWrapper ]; 20 20 installPhase = "install -m755 -D ${./create-trivial-project.sh} $out/bin/create-trivial-project.sh"; 21 21 postFixup = '' 22 - wrapProgram "$out/bin/create-trivial-project.sh" --prefix PATH ":" ${pkgs.stdenv.lib.makeBinPath [ pkgs.curl ]} --set EXPR_PATH ${trivialJob} 22 + wrapProgram "$out/bin/create-trivial-project.sh" --prefix PATH ":" ${pkgs.lib.makeBinPath [ pkgs.curl ]} --set EXPR_PATH ${trivialJob} 23 23 ''; 24 24 }; 25 25 in {
+1 -1
nixos/tests/hydra/default.nix
··· 16 16 17 17 makeHydraTest = with pkgs.lib; name: package: makeTest { 18 18 name = "hydra-${name}"; 19 - meta = with pkgs.stdenv.lib.maintainers; { 19 + meta = with pkgs.lib.maintainers; { 20 20 maintainers = [ pstn lewo ma27 ]; 21 21 }; 22 22
+1 -1
nixos/tests/i3wm.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "i3wm"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ aszlig ]; 5 5 }; 6 6
+1 -1
nixos/tests/icingaweb2.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "icingaweb2"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ das_j ]; 5 5 }; 6 6
+1 -1
nixos/tests/iftop.nix
··· 4 4 5 5 { 6 6 name = "iftop"; 7 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ]; 7 + meta.maintainers = with pkgs.lib.maintainers; [ ma27 ]; 8 8 9 9 nodes = { 10 10 withIftop = {
+1 -1
nixos/tests/influxdb.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "influxdb"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ offline ]; 7 7 }; 8 8
+1 -1
nixos/tests/initrd-network.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ...} : { 2 2 name = "initrd-network"; 3 3 4 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.eelco ]; 4 + meta.maintainers = [ pkgs.lib.maintainers.eelco ]; 5 5 6 6 machine = { ... }: { 7 7 imports = [ ../modules/profiles/minimal.nix ];
+1 -1
nixos/tests/installer.nix
··· 270 270 makeTest { 271 271 inherit enableOCR; 272 272 name = "installer-" + name; 273 - meta = with pkgs.stdenv.lib.maintainers; { 273 + meta = with pkgs.lib.maintainers; { 274 274 # put global maintainers here, individuals go into makeInstallerTest fkt call 275 275 maintainers = (meta.maintainers or []); 276 276 };
+1 -1
nixos/tests/ipfs.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "ipfs"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mguentner ]; 5 5 }; 6 6
+1 -1
nixos/tests/ipv6.nix
··· 3 3 4 4 import ./make-test-python.nix ({ pkgs, lib, ...} : { 5 5 name = "ipv6"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ eelco ]; 8 8 }; 9 9
+1 -1
nixos/tests/jenkins.nix
··· 5 5 6 6 import ./make-test-python.nix ({ pkgs, ...} : { 7 7 name = "jenkins"; 8 - meta = with pkgs.stdenv.lib.maintainers; { 8 + meta = with pkgs.lib.maintainers; { 9 9 maintainers = [ bjornfor coconnor domenkozar eelco ]; 10 10 }; 11 11
+1 -1
nixos/tests/jitsi-meet.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "jitsi-meet"; 3 - meta = with pkgs.stdenv.lib; { 3 + meta = with pkgs.lib; { 4 4 maintainers = teams.jitsi.members; 5 5 }; 6 6
+1 -1
nixos/tests/jq.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "jq"; 3 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 4 4 5 5 nodes.jq = { pkgs, ... }: { environment.systemPackages = [ pkgs.jq ]; }; 6 6
+1 -1
nixos/tests/k3s.nix
··· 31 31 in 32 32 { 33 33 name = "k3s"; 34 - meta = with pkgs.stdenv.lib.maintainers; { 34 + meta = with pkgs.lib.maintainers; { 35 35 maintainers = [ euank ]; 36 36 }; 37 37
+1 -1
nixos/tests/kafka.nix
··· 8 8 let 9 9 makeKafkaTest = name: kafkaPackage: (import ./make-test-python.nix ({ 10 10 inherit name; 11 - meta = with pkgs.stdenv.lib.maintainers; { 11 + meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ nequissimus ]; 13 13 }; 14 14
+1 -1
nixos/tests/kernel-latest.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "kernel-latest"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/kernel-lts.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "kernel-lts"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/kernel-testing.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "kernel-testing"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/keycloak.nix
··· 10 10 { pkgs, databaseType, ... }: 11 11 { 12 12 name = "keycloak"; 13 - meta = with pkgs.stdenv.lib.maintainers; { 13 + meta = with pkgs.lib.maintainers; { 14 14 maintainers = [ talyz ]; 15 15 }; 16 16
+1 -1
nixos/tests/knot.nix
··· 37 37 ''; 38 38 in { 39 39 name = "knot"; 40 - meta = with pkgs.stdenv.lib.maintainers; { 40 + meta = with pkgs.lib.maintainers; { 41 41 maintainers = [ hexa ]; 42 42 }; 43 43
+1 -1
nixos/tests/krb5/deprecated-config.nix
··· 3 3 4 4 import ../make-test-python.nix ({ pkgs, ...} : { 5 5 name = "krb5-with-deprecated-config"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9
+1 -1
nixos/tests/krb5/example-config.nix
··· 3 3 4 4 import ../make-test-python.nix ({ pkgs, ...} : { 5 5 name = "krb5-with-example-config"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9
+1 -1
nixos/tests/leaps.nix
··· 2 2 3 3 { 4 4 name = "leaps"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ qknight ]; 7 7 }; 8 8
+1 -1
nixos/tests/lightdm.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "lightdm"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ aszlig worldofpeace ]; 5 5 }; 6 6
+1 -1
nixos/tests/limesurvey.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "limesurvey"; 3 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ]; 3 + meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 4 4 5 5 machine = { ... }: { 6 6 services.limesurvey = {
+1 -1
nixos/tests/locate.nix
··· 2 2 let inherit (import ./ssh-keys.nix pkgs) snakeOilPrivateKey snakeOilPublicKey; 3 3 in { 4 4 name = "locate"; 5 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chkno ]; 5 + meta.maintainers = with pkgs.lib.maintainers; [ chkno ]; 6 6 7 7 nodes = rec { 8 8 a = {
+1 -1
nixos/tests/login.nix
··· 2 2 3 3 { 4 4 name = "login"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ eelco ]; 7 7 }; 8 8
+1 -1
nixos/tests/lsd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "lsd"; 3 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 4 4 5 5 nodes.lsd = { pkgs, ... }: { environment.systemPackages = [ pkgs.lsd ]; }; 6 6
+1 -1
nixos/tests/lxd-nftables.nix
··· 8 8 import ./make-test-python.nix ({ pkgs, ...} : { 9 9 name = "lxd-nftables"; 10 10 11 - meta = with pkgs.stdenv.lib.maintainers; { 11 + meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ patryk27 ]; 13 13 }; 14 14
+1 -1
nixos/tests/lxd.nix
··· 47 47 in { 48 48 name = "lxd"; 49 49 50 - meta = with pkgs.stdenv.lib.maintainers; { 50 + meta = with pkgs.lib.maintainers; { 51 51 maintainers = [ patryk27 ]; 52 52 }; 53 53
+1 -1
nixos/tests/magic-wormhole-mailbox-server.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "magic-wormhole-mailbox-server"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/magnetico.nix
··· 5 5 in 6 6 { 7 7 name = "magnetico"; 8 - meta = with pkgs.stdenv.lib.maintainers; { 8 + meta = with pkgs.lib.maintainers; { 9 9 maintainers = [ rnhmjoj ]; 10 10 }; 11 11
+1 -1
nixos/tests/matrix-synapse.nix
··· 29 29 in { 30 30 31 31 name = "matrix-synapse"; 32 - meta = with pkgs.stdenv.lib; { 32 + meta = with pkgs.lib; { 33 33 maintainers = teams.matrix.members; 34 34 }; 35 35
+1 -1
nixos/tests/metabase.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "metabase"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/minecraft-server.nix
··· 4 4 rcon-port = 43000; 5 5 in import ./make-test-python.nix ({ pkgs, ... }: { 6 6 name = "minecraft-server"; 7 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 7 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 8 8 9 9 nodes.server = { ... }: { 10 10 environment.systemPackages = [ pkgs.mcrcon ];
+1 -1
nixos/tests/miniflux.nix
··· 11 11 with lib; 12 12 { 13 13 name = "miniflux"; 14 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ bricewge ]; 14 + meta.maintainers = with pkgs.lib.maintainers; [ bricewge ]; 15 15 16 16 nodes = { 17 17 default =
+1 -1
nixos/tests/minio.nix
··· 20 20 ''; 21 21 in { 22 22 name = "minio"; 23 - meta = with pkgs.stdenv.lib.maintainers; { 23 + meta = with pkgs.lib.maintainers; { 24 24 maintainers = [ bachp ]; 25 25 }; 26 26
+1 -1
nixos/tests/misc.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : rec { 4 4 name = "misc"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ eelco ]; 7 7 }; 8 8
+1 -1
nixos/tests/molly-brown.nix
··· 4 4 in { 5 5 6 6 name = "molly-brown"; 7 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ ehmry ]; }; 7 + meta = with pkgs.lib.maintainers; { maintainers = [ ehmry ]; }; 8 8 9 9 nodes = { 10 10
+1 -1
nixos/tests/mongodb.nix
··· 26 26 27 27 in { 28 28 name = "mongodb"; 29 - meta = with pkgs.stdenv.lib.maintainers; { 29 + meta = with pkgs.lib.maintainers; { 30 30 maintainers = [ bluescreen303 offline cstrahan rvl phile314 ]; 31 31 }; 32 32
+1 -1
nixos/tests/morty.nix
··· 2 2 3 3 { 4 4 name = "morty"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ leenaars ]; 7 7 }; 8 8
+1 -1
nixos/tests/mosquitto.nix
··· 7 7 topic = "test/foo"; 8 8 in { 9 9 name = "mosquitto"; 10 - meta = with pkgs.stdenv.lib; { 10 + meta = with pkgs.lib; { 11 11 maintainers = with maintainers; [ peterhoeg ]; 12 12 }; 13 13
+1 -1
nixos/tests/mpd.nix
··· 43 43 }; 44 44 in { 45 45 name = "mpd"; 46 - meta = with pkgs.stdenv.lib.maintainers; { 46 + meta = with pkgs.lib.maintainers; { 47 47 maintainers = [ emmanuelrosa ]; 48 48 }; 49 49
+1 -1
nixos/tests/mumble.nix
··· 14 14 in 15 15 { 16 16 name = "mumble"; 17 - meta = with pkgs.stdenv.lib.maintainers; { 17 + meta = with pkgs.lib.maintainers; { 18 18 maintainers = [ thoughtpolice eelco ]; 19 19 }; 20 20
+2 -2
nixos/tests/munin.nix
··· 3 3 4 4 import ./make-test-python.nix ({ pkgs, ...} : { 5 5 name = "munin"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ domenkozar eelco ]; 8 8 }; 9 9 ··· 27 27 }; 28 28 29 29 # increase the systemd timer interval so it fires more often 30 - systemd.timers.munin-cron.timerConfig.OnCalendar = pkgs.stdenv.lib.mkForce "*:*:0/10"; 30 + systemd.timers.munin-cron.timerConfig.OnCalendar = pkgs.lib.mkForce "*:*:0/10"; 31 31 }; 32 32 }; 33 33
+1 -1
nixos/tests/mutable-users.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "mutable-users"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ gleber ]; 7 7 }; 8 8
+1 -1
nixos/tests/mxisd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... } : { 2 2 3 3 name = "mxisd"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ mguentner ]; 6 6 }; 7 7
+1 -1
nixos/tests/mysql/mariadb-galera-mariabackup.nix
··· 6 6 7 7 in { 8 8 name = "mariadb-galera-mariabackup"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ izorkin ]; 11 11 }; 12 12
+1 -1
nixos/tests/mysql/mariadb-galera-rsync.nix
··· 6 6 7 7 in { 8 8 name = "mariadb-galera-rsync"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ izorkin ]; 11 11 }; 12 12
+1 -1
nixos/tests/mysql/mysql-backup.nix
··· 1 1 # Test whether mysqlBackup option works 2 2 import ./../make-test-python.nix ({ pkgs, ... } : { 3 3 name = "mysql-backup"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ rvl ]; 6 6 }; 7 7
+1 -1
nixos/tests/mysql/mysql-replication.nix
··· 7 7 8 8 { 9 9 name = "mysql-replication"; 10 - meta = with pkgs.stdenv.lib.maintainers; { 10 + meta = with pkgs.lib.maintainers; { 11 11 maintainers = [ eelco shlevy ]; 12 12 }; 13 13
+2 -2
nixos/tests/mysql/mysql.nix
··· 1 1 import ./../make-test-python.nix ({ pkgs, ...} : { 2 2 name = "mysql"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ eelco shlevy ]; 5 5 }; 6 6 ··· 185 185 mariadb.succeed( 186 186 "echo 'use testdb; drop table rocksdb;' | sudo -u testuser mysql -u testuser" 187 187 ) 188 - '' + pkgs.stdenv.lib.optionalString pkgs.stdenv.isx86_64 '' 188 + '' + pkgs.lib.optionalString pkgs.stdenv.isx86_64 '' 189 189 # Check if TokuDB plugin works 190 190 mariadb.succeed( 191 191 "echo 'use testdb; create table tokudb (test_id INT, PRIMARY KEY (test_id)) ENGINE = TokuDB;' | sudo -u testuser mysql -u testuser"
+1 -1
nixos/tests/nagios.nix
··· 1 1 import ./make-test-python.nix ( 2 2 { pkgs, ... }: { 3 3 name = "nagios"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ symphorien ]; 6 6 }; 7 7
+1 -1
nixos/tests/nano.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "nano"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/nat.nix
··· 23 23 { 24 24 name = "nat" + (if withFirewall then "WithFirewall" else "Standalone") 25 25 + (lib.optionalString withConntrackHelpers "withConntrackHelpers"); 26 - meta = with pkgs.stdenv.lib.maintainers; { 26 + meta = with pkgs.lib.maintainers; { 27 27 maintainers = [ eelco rob ]; 28 28 }; 29 29
+1 -1
nixos/tests/ncdns.nix
··· 24 24 25 25 { 26 26 name = "ncdns"; 27 - meta = with pkgs.stdenv.lib.maintainers; { 27 + meta = with pkgs.lib.maintainers; { 28 28 maintainers = [ rnhmjoj ]; 29 29 }; 30 30
+1 -1
nixos/tests/ndppd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, lib, ...} : { 2 2 name = "ndppd"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ fpletz ]; 5 5 }; 6 6
+1 -1
nixos/tests/netdata.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "netdata"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ cransom ]; 7 7 }; 8 8
+1 -1
nixos/tests/networking-proxy.nix
··· 12 12 }; 13 13 in import ./make-test-python.nix ({ pkgs, ...} : { 14 14 name = "networking-proxy"; 15 - meta = with pkgs.stdenv.lib.maintainers; { 15 + meta = with pkgs.lib.maintainers; { 16 16 maintainers = [ ]; 17 17 }; 18 18
+1 -1
nixos/tests/nextcloud/basic.nix
··· 3 3 adminuser = "root"; 4 4 in { 5 5 name = "nextcloud-basic"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ globin eqyiel ]; 8 8 }; 9 9
+1 -1
nixos/tests/nextcloud/with-mysql-and-memcached.nix
··· 3 3 adminuser = "root"; 4 4 in { 5 5 name = "nextcloud-with-mysql-and-memcached"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9
+1 -1
nixos/tests/nextcloud/with-postgresql-and-redis.nix
··· 3 3 adminuser = "custom-admin-username"; 4 4 in { 5 5 name = "nextcloud-with-postgresql-and-redis"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ eqyiel ]; 8 8 }; 9 9
+1 -1
nixos/tests/nexus.nix
··· 5 5 6 6 import ./make-test-python.nix ({ pkgs, ...} : { 7 7 name = "nexus"; 8 - meta = with pkgs.stdenv.lib.maintainers; { 8 + meta = with pkgs.lib.maintainers; { 9 9 maintainers = [ ironpinguin ma27 ]; 10 10 }; 11 11
+1 -1
nixos/tests/nfs/simple.nix
··· 19 19 20 20 { 21 21 name = "nfs"; 22 - meta = with pkgs.stdenv.lib.maintainers; { 22 + meta = with pkgs.lib.maintainers; { 23 23 maintainers = [ eelco ]; 24 24 }; 25 25
+1 -1
nixos/tests/nginx-sandbox.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "nginx-sandbox"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ izorkin ]; 5 5 }; 6 6
+1 -1
nixos/tests/nginx-sso.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "nginx-sso"; 3 3 meta = { 4 - maintainers = with pkgs.stdenv.lib.maintainers; [ delroth ]; 4 + maintainers = with pkgs.lib.maintainers; [ delroth ]; 5 5 }; 6 6 7 7 machine = {
+1 -1
nixos/tests/nginx.nix
··· 6 6 # 3. nginx doesn't restart on configuration changes (only reloads) 7 7 import ./make-test-python.nix ({ pkgs, ... }: { 8 8 name = "nginx"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ mbbx6spp danbst ]; 11 11 }; 12 12
+1 -1
nixos/tests/novacomd.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "novacomd"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ dtzWill ]; 5 5 }; 6 6
+1 -1
nixos/tests/nsd.nix
··· 7 7 }; 8 8 in import ./make-test-python.nix ({ pkgs, ...} : { 9 9 name = "nsd"; 10 - meta = with pkgs.stdenv.lib.maintainers; { 10 + meta = with pkgs.lib.maintainers; { 11 11 maintainers = [ aszlig ]; 12 12 }; 13 13
+2 -2
nixos/tests/nzbget.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "nzbget"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ aanderse flokli ]; 5 5 }; 6 6 ··· 10 10 11 11 # hack, don't add (unfree) unrar to nzbget's path, 12 12 # so we can run this test in CI 13 - systemd.services.nzbget.path = pkgs.stdenv.lib.mkForce [ pkgs.p7zip ]; 13 + systemd.services.nzbget.path = pkgs.lib.mkForce [ pkgs.p7zip ]; 14 14 }; 15 15 }; 16 16
+1 -1
nixos/tests/openarena.nix
··· 11 11 12 12 in { 13 13 name = "openarena"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ fpletz ]; 16 16 }; 17 17
+1 -1
nixos/tests/openssh.nix
··· 4 4 snakeOilPrivateKey snakeOilPublicKey; 5 5 in { 6 6 name = "openssh"; 7 - meta = with pkgs.stdenv.lib.maintainers; { 7 + meta = with pkgs.lib.maintainers; { 8 8 maintainers = [ aszlig eelco ]; 9 9 }; 10 10
+1 -1
nixos/tests/opentabletdriver.nix
··· 1 1 import ./make-test-python.nix ( { pkgs, ... }: { 2 2 name = "opentabletdriver"; 3 3 meta = { 4 - maintainers = with pkgs.stdenv.lib.maintainers; [ thiagokokada ]; 4 + maintainers = with pkgs.lib.maintainers; [ thiagokokada ]; 5 5 }; 6 6 7 7 machine = { pkgs, ... }:
+1 -1
nixos/tests/overlayfs.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "overlayfs"; 3 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ bachp ]; 3 + meta.maintainers = with pkgs.lib.maintainers; [ bachp ]; 4 4 5 5 machine = { pkgs, ... }: { 6 6 virtualisation.emptyDiskImages = [ 512 ];
+1 -1
nixos/tests/packagekit.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "packagekit"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ peterhoeg ]; 5 5 }; 6 6
+1 -1
nixos/tests/pantheon.nix
··· 3 3 { 4 4 name = "pantheon"; 5 5 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = pkgs.pantheon.maintainers; 8 8 }; 9 9
+1 -1
nixos/tests/peerflix.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "peerflix"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ offline ]; 7 7 }; 8 8
+1 -1
nixos/tests/pgmanage.nix
··· 6 6 in 7 7 { 8 8 name = "pgmanage"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ basvandijk ]; 11 11 }; 12 12 nodes = {
+1 -1
nixos/tests/pinnwand.nix
··· 25 25 in 26 26 { 27 27 name = "pinnwand"; 28 - meta = with pkgs.stdenv.lib.maintainers; { 28 + meta = with pkgs.lib.maintainers; { 29 29 maintainers =[ hexa ]; 30 30 }; 31 31
+1 -1
nixos/tests/plasma5.nix
··· 2 2 3 3 { 4 4 name = "plasma5"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ ttuegel ]; 7 7 }; 8 8
+1 -1
nixos/tests/postgis.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "postgis"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ lsix ]; 5 5 }; 6 6
+1 -1
nixos/tests/postgresql.nix
··· 23 23 ''; 24 24 make-postgresql-test = postgresql-name: postgresql-package: backup-all: makeTest { 25 25 name = postgresql-name; 26 - meta = with pkgs.stdenv.lib.maintainers; { 26 + meta = with pkgs.lib.maintainers; { 27 27 maintainers = [ zagy ]; 28 28 }; 29 29
+1 -1
nixos/tests/printing.nix
··· 35 35 36 36 in { 37 37 name = "printing"; 38 - meta = with pkgs.stdenv.lib.maintainers; { 38 + meta = with pkgs.lib.maintainers; { 39 39 maintainers = [ domenkozar eelco matthewbauer ]; 40 40 }; 41 41
+1 -1
nixos/tests/privacyidea.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : rec { 4 4 name = "privacyidea"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ fpletz ]; 7 7 }; 8 8
+1 -1
nixos/tests/proxy.nix
··· 11 11 }; 12 12 in { 13 13 name = "proxy"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ eelco ]; 16 16 }; 17 17
+1 -1
nixos/tests/pt2-clone.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "pt2-clone"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ fgaz ]; 5 5 }; 6 6
+1 -1
nixos/tests/quagga.nix
··· 23 23 { 24 24 name = "quagga"; 25 25 26 - meta = with pkgs.stdenv.lib.maintainers; { 26 + meta = with pkgs.lib.maintainers; { 27 27 maintainers = [ tavyc ]; 28 28 }; 29 29
+1 -1
nixos/tests/quorum.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "quorum"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/rabbitmq.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ... }: { 4 4 name = "rabbitmq"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ eelco offline ]; 7 7 }; 8 8
+25 -4
nixos/tests/redis.nix
··· 1 - import ./make-test-python.nix ({ pkgs, ...} : { 1 + import ./make-test-python.nix ({ pkgs, ... }: 2 + let 3 + redisSocket = "/run/redis/redis.sock"; 4 + in 5 + { 2 6 name = "redis"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 7 + meta = with pkgs.lib.maintainers; { 4 8 maintainers = [ flokli ]; 5 9 }; 6 10 ··· 10 14 11 15 { 12 16 services.redis.enable = true; 13 - services.redis.unixSocket = "/run/redis/redis.sock"; 17 + services.redis.unixSocket = redisSocket; 18 + 19 + # Allow access to the unix socket for the "redis" group. 20 + services.redis.settings.unixsocketperm = "770"; 21 + 22 + users.users."member" = { 23 + createHome = false; 24 + description = "A member of the redis group"; 25 + extraGroups = [ 26 + "redis" 27 + ]; 28 + group = "users"; 29 + shell = "/bin/sh"; 30 + }; 14 31 }; 15 32 }; 16 33 ··· 18 35 start_all() 19 36 machine.wait_for_unit("redis") 20 37 machine.wait_for_open_port("6379") 38 + 39 + # The unix socket is accessible to the redis group 40 + machine.succeed('su member -c "redis-cli ping | grep PONG"') 41 + 21 42 machine.succeed("redis-cli ping | grep PONG") 22 - machine.succeed("redis-cli -s /run/redis/redis.sock ping | grep PONG") 43 + machine.succeed("redis-cli -s ${redisSocket} ping | grep PONG") 23 44 ''; 24 45 })
+1 -1
nixos/tests/resolv.nix
··· 1 1 # Test whether DNS resolving returns multiple records and all address families. 2 2 import ./make-test-python.nix ({ pkgs, ... } : { 3 3 name = "resolv"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ ckauhaus ]; 6 6 }; 7 7
+1 -1
nixos/tests/restic.nix
··· 19 19 { 20 20 name = "restic"; 21 21 22 - meta = with pkgs.stdenv.lib.maintainers; { 22 + meta = with pkgs.lib.maintainers; { 23 23 maintainers = [ bbigras i077 ]; 24 24 }; 25 25
+1 -1
nixos/tests/ripgrep.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "ripgrep"; 3 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 4 4 5 5 nodes.ripgrep = { pkgs, ... }: { environment.systemPackages = [ pkgs.ripgrep ]; }; 6 6
+1 -1
nixos/tests/robustirc-bridge.nix
··· 2 2 3 3 { 4 4 name = "robustirc-bridge"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ hax404 ]; 7 7 }; 8 8
+1 -1
nixos/tests/roundcube.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "roundcube"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ globin ]; 5 5 }; 6 6
+2 -2
nixos/tests/rsyslogd.nix
··· 9 9 { 10 10 test1 = makeTest { 11 11 name = "rsyslogd-test1"; 12 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ]; 12 + meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 13 13 14 14 machine = { config, pkgs, ... }: { 15 15 services.rsyslogd.enable = true; ··· 25 25 26 26 test2 = makeTest { 27 27 name = "rsyslogd-test2"; 28 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ]; 28 + meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 29 29 30 30 machine = { config, pkgs, ... }: { 31 31 services.rsyslogd.enable = true;
+1 -1
nixos/tests/samba-wsdd.nix
··· 2 2 3 3 { 4 4 name = "samba-wsdd"; 5 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ izorkin ]; 5 + meta.maintainers = with pkgs.lib.maintainers; [ izorkin ]; 6 6 7 7 nodes = { 8 8 client_wsdd = { pkgs, ... }: {
+1 -1
nixos/tests/sanoid.nix
··· 9 9 }; 10 10 in { 11 11 name = "sanoid"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ lopsided98 ]; 14 14 }; 15 15
+1 -1
nixos/tests/sbt-extras.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "sbt-extras"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/sbt.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "sbt"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/scala.nix
··· 8 8 let 9 9 common = name: package: (import ./make-test-python.nix ({ 10 10 inherit name; 11 - meta = with pkgs.stdenv.lib.maintainers; { 11 + meta = with pkgs.lib.maintainers; { 12 12 maintainers = [ nequissimus ]; 13 13 }; 14 14
+1 -1
nixos/tests/sddm.nix
··· 37 37 38 38 autoLogin = { 39 39 name = "sddm-autologin"; 40 - meta = with pkgs.stdenv.lib.maintainers; { 40 + meta = with pkgs.lib.maintainers; { 41 41 maintainers = [ ttuegel ]; 42 42 }; 43 43
+1 -1
nixos/tests/service-runner.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "service-runner"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ roberth ]; 5 5 }; 6 6
+1 -1
nixos/tests/shadow.nix
··· 5 5 password4 = "asdf123"; 6 6 in import ./make-test-python.nix ({ pkgs, ... }: { 7 7 name = "shadow"; 8 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 8 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 9 9 10 10 nodes.shadow = { pkgs, ... }: { 11 11 environment.systemPackages = [ pkgs.shadow ];
+1 -1
nixos/tests/signal-desktop.nix
··· 2 2 3 3 { 4 4 name = "signal-desktop"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ flokli ]; 7 7 }; 8 8
+1 -1
nixos/tests/simple.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "simple"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ eelco ]; 5 5 }; 6 6
+1 -1
nixos/tests/smokeping.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "smokeping"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ cransom ]; 5 5 }; 6 6
+1 -1
nixos/tests/snapcast.nix
··· 6 6 httpPort = 10080; 7 7 in { 8 8 name = "snapcast"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ hexa ]; 11 11 }; 12 12
+1 -1
nixos/tests/sogo.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "sogo"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ajs124 das_j ]; 5 5 }; 6 6
+1 -1
nixos/tests/solr.nix
··· 2 2 3 3 { 4 4 name = "solr"; 5 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.aanderse ]; 5 + meta.maintainers = [ pkgs.lib.maintainers.aanderse ]; 6 6 7 7 machine = 8 8 { config, pkgs, ... }:
+2 -2
nixos/tests/spike.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: 2 2 3 3 let 4 - riscvPkgs = import ../.. { crossSystem = pkgs.stdenv.lib.systems.examples.riscv64-embedded; }; 4 + riscvPkgs = import ../.. { crossSystem = pkgs.lib.systems.examples.riscv64-embedded; }; 5 5 in 6 6 { 7 7 name = "spike"; 8 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ blitz ]; }; 8 + meta = with pkgs.lib.maintainers; { maintainers = [ blitz ]; }; 9 9 10 10 machine = { pkgs, lib, ... }: { 11 11 environment.systemPackages = [ pkgs.spike riscvPkgs.riscv-pk riscvPkgs.hello ];
+1 -1
nixos/tests/sssd-ldap.nix
··· 10 10 in import ./make-test-python.nix { 11 11 name = "sssd-ldap"; 12 12 13 - meta = with pkgs.stdenv.lib.maintainers; { 13 + meta = with pkgs.lib.maintainers; { 14 14 maintainers = [ bbigras ]; 15 15 }; 16 16
+1 -1
nixos/tests/sssd.nix
··· 2 2 3 3 { 4 4 name = "sssd"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ bbigras ]; 7 7 }; 8 8 machine = { pkgs, ... }: {
+1 -1
nixos/tests/strongswan-swanctl.nix
··· 31 31 proposals = [ "aes128-sha256-x25519" ]; 32 32 in { 33 33 name = "strongswan-swanctl"; 34 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ basvandijk ]; 34 + meta.maintainers = with pkgs.lib.maintainers; [ basvandijk ]; 35 35 nodes = { 36 36 37 37 alice = { ... } : {
+1 -1
nixos/tests/sudo.nix
··· 6 6 in 7 7 import ./make-test-python.nix ({ pkgs, ...} : { 8 8 name = "sudo"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ lschuermann ]; 11 11 }; 12 12
+1 -1
nixos/tests/switch-test.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "switch-test"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ gleber ]; 7 7 }; 8 8
+1 -1
nixos/tests/syncthing-init.nix
··· 4 4 5 5 in { 6 6 name = "syncthing-init"; 7 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ lassulus ]; 7 + meta.maintainers = with pkgs.lib.maintainers; [ lassulus ]; 8 8 9 9 machine = { 10 10 services.syncthing = {
+1 -1
nixos/tests/syncthing-relay.nix
··· 1 1 import ./make-test-python.nix ({ lib, pkgs, ... }: { 2 2 name = "syncthing-relay"; 3 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ delroth ]; 3 + meta.maintainers = with pkgs.lib.maintainers; [ delroth ]; 4 4 5 5 machine = { 6 6 environment.systemPackages = [ pkgs.jq ];
+1 -1
nixos/tests/syncthing.nix
··· 1 1 import ./make-test-python.nix ({ lib, pkgs, ... }: { 2 2 name = "syncthing"; 3 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ chkno ]; 3 + meta.maintainers = with pkgs.lib.maintainers; [ chkno ]; 4 4 5 5 nodes = rec { 6 6 a = {
+1 -1
nixos/tests/systemd-analyze.nix
··· 2 2 3 3 { 4 4 name = "systemd-analyze"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ raskin ]; 7 7 }; 8 8
+3 -3
nixos/tests/systemd-boot.nix
··· 18 18 { 19 19 basic = makeTest { 20 20 name = "systemd-boot"; 21 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ]; 21 + meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 22 22 23 23 machine = common; 24 24 ··· 42 42 # Boot without having created an EFI entry--instead using default "/EFI/BOOT/BOOTX64.EFI" 43 43 fallback = makeTest { 44 44 name = "systemd-boot-fallback"; 45 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ]; 45 + meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 46 46 47 47 machine = { pkgs, lib, ... }: { 48 48 imports = [ common ]; ··· 68 68 69 69 update = makeTest { 70 70 name = "systemd-boot-update"; 71 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ danielfullmer ]; 71 + meta.maintainers = with pkgs.lib.maintainers; [ danielfullmer ]; 72 72 73 73 machine = common; 74 74
+1 -1
nixos/tests/systemd-journal.nix
··· 2 2 3 3 { 4 4 name = "systemd-journal"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ lewo ]; 7 7 }; 8 8
+1 -1
nixos/tests/systemd-networkd-dhcpserver.nix
··· 3 3 # reachable via the DHCP allocated address. 4 4 import ./make-test-python.nix ({pkgs, ...}: { 5 5 name = "systemd-networkd-dhcpserver"; 6 - meta = with pkgs.stdenv.lib.maintainers; { 6 + meta = with pkgs.lib.maintainers; { 7 7 maintainers = [ tomfitzhenry ]; 8 8 }; 9 9 nodes = {
+1 -1
nixos/tests/systemd-networkd-ipv6-prefix-delegation.nix
··· 9 9 10 10 import ./make-test-python.nix ({pkgs, ...}: { 11 11 name = "systemd-networkd-ipv6-prefix-delegation"; 12 - meta = with pkgs.stdenv.lib.maintainers; { 12 + meta = with pkgs.lib.maintainers; { 13 13 maintainers = [ andir ]; 14 14 }; 15 15 nodes = {
+1 -1
nixos/tests/systemd-networkd.nix
··· 61 61 }; 62 62 in import ./make-test-python.nix ({pkgs, ... }: { 63 63 name = "networkd"; 64 - meta = with pkgs.stdenv.lib.maintainers; { 64 + meta = with pkgs.lib.maintainers; { 65 65 maintainers = [ ninjatrappeur ]; 66 66 }; 67 67 nodes = {
+1 -1
nixos/tests/teeworlds.nix
··· 10 10 11 11 in { 12 12 name = "teeworlds"; 13 - meta = with pkgs.stdenv.lib.maintainers; { 13 + meta = with pkgs.lib.maintainers; { 14 14 maintainers = [ hax404 ]; 15 15 }; 16 16
+1 -1
nixos/tests/telegraf.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "telegraf"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mic92 ]; 5 5 }; 6 6
+1 -1
nixos/tests/trac.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "trac"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/traefik.nix
··· 2 2 # and a Docker container. 3 3 import ./make-test-python.nix ({ pkgs, ... }: { 4 4 name = "traefik"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ joko ]; 7 7 }; 8 8
+1 -1
nixos/tests/transmission.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "transmission"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ coconnor ]; 5 5 }; 6 6
+1 -1
nixos/tests/trezord.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "trezord"; 3 - meta = with pkgs.stdenv.lib; { 3 + meta = with pkgs.lib; { 4 4 maintainers = with maintainers; [ mmahut _1000101 ]; 5 5 }; 6 6 nodes = {
+1 -1
nixos/tests/trickster.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "trickster"; 3 - meta = with pkgs.stdenv.lib; { 3 + meta = with pkgs.lib; { 4 4 maintainers = with maintainers; [ _1000101 ]; 5 5 }; 6 6
+1 -1
nixos/tests/tuptime.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "tuptime"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ evils ]; 5 5 }; 6 6
+1 -1
nixos/tests/ucg.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "ucg"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ AndersonTorres ]; 5 5 }; 6 6
+1 -1
nixos/tests/udisks2.nix
··· 11 11 12 12 { 13 13 name = "udisks2"; 14 - meta = with pkgs.stdenv.lib.maintainers; { 14 + meta = with pkgs.lib.maintainers; { 15 15 maintainers = [ eelco ]; 16 16 }; 17 17
+1 -1
nixos/tests/unbound.nix
··· 38 38 in 39 39 { 40 40 name = "unbound"; 41 - meta = with pkgs.stdenv.lib.maintainers; { 41 + meta = with pkgs.lib.maintainers; { 42 42 maintainers = [ andir ]; 43 43 }; 44 44
+1 -1
nixos/tests/upnp.nix
··· 15 15 in 16 16 { 17 17 name = "upnp"; 18 - meta = with pkgs.stdenv.lib.maintainers; { 18 + meta = with pkgs.lib.maintainers; { 19 19 maintainers = [ bobvanderlinden ]; 20 20 }; 21 21
+46 -17
nixos/tests/uwsgi.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: 2 2 { 3 3 name = "uwsgi"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ lnl7 ]; 6 6 }; 7 7 8 8 machine = { pkgs, ... }: { 9 - services.uwsgi.enable = true; 10 - services.uwsgi.plugins = [ "python3" "php" ]; 11 - services.uwsgi.instance = { 12 - type = "emperor"; 13 - vassals.python = { 9 + users.users.hello = 10 + { isSystemUser = true; 11 + group = "hello"; 12 + }; 13 + users.groups.hello = { }; 14 + 15 + services.uwsgi = { 16 + enable = true; 17 + plugins = [ "python3" "php" ]; 18 + capabilities = [ "CAP_NET_BIND_SERVICE" ]; 19 + instance.type = "emperor"; 20 + 21 + instance.vassals.hello = { 14 22 type = "normal"; 15 - master = true; 16 - workers = 2; 17 - http = ":8000"; 23 + immediate-uid = "hello"; 24 + immediate-gid = "hello"; 18 25 module = "wsgi:application"; 26 + http = ":80"; 27 + cap = "net_bind_service"; 28 + pythonPackages = self: [ self.flask ]; 19 29 chdir = pkgs.writeTextDir "wsgi.py" '' 20 30 from flask import Flask 31 + import subprocess 21 32 application = Flask(__name__) 22 33 23 34 @application.route("/") 24 35 def hello(): 25 - return "Hello World!" 36 + return "Hello, World!" 37 + 38 + @application.route("/whoami") 39 + def whoami(): 40 + whoami = "${pkgs.coreutils}/bin/whoami" 41 + proc = subprocess.run(whoami, capture_output=True) 42 + return proc.stdout.decode().strip() 26 43 ''; 27 - pythonPackages = self: with self; [ flask ]; 28 44 }; 29 - vassals.php = { 45 + 46 + instance.vassals.php = { 30 47 type = "normal"; 31 48 master = true; 32 49 workers = 2; 33 - http-socket = ":8001"; 50 + http-socket = ":8000"; 34 51 http-socket-modifier1 = 14; 35 52 php-index = "index.php"; 36 53 php-docroot = pkgs.writeTextDir "index.php" '' ··· 44 61 '' 45 62 machine.wait_for_unit("multi-user.target") 46 63 machine.wait_for_unit("uwsgi.service") 47 - machine.wait_for_open_port(8000) 48 - machine.wait_for_open_port(8001) 49 - assert "Hello World" in machine.succeed("curl -fv 127.0.0.1:8000") 50 - assert "Hello World" in machine.succeed("curl -fv 127.0.0.1:8001") 64 + 65 + with subtest("uWSGI has started"): 66 + machine.wait_for_unit("uwsgi.service") 67 + 68 + with subtest("Vassal can bind on port <1024"): 69 + machine.wait_for_open_port(80) 70 + hello = machine.succeed("curl -f http://machine").strip() 71 + assert "Hello, World!" in hello, f"Excepted 'Hello, World!', got '{hello}'" 72 + 73 + with subtest("Vassal is running as dedicated user"): 74 + username = machine.succeed("curl -f http://machine/whoami").strip() 75 + assert username == "hello", f"Excepted 'hello', got '{username}'" 76 + 77 + with subtest("PHP plugin is working"): 78 + machine.wait_for_open_port(8000) 79 + assert "Hello World" in machine.succeed("curl -fv http://machine:8000") 51 80 ''; 52 81 })
+1 -1
nixos/tests/vault.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: 2 2 { 3 3 name = "vault"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ lnl7 ]; 6 6 }; 7 7 machine = { pkgs, ... }: {
+1 -1
nixos/tests/vector.nix
··· 7 7 { 8 8 test1 = makeTest { 9 9 name = "vector-test1"; 10 - meta.maintainers = [ pkgs.stdenv.lib.maintainers.happysalada ]; 10 + meta.maintainers = [ pkgs.lib.maintainers.happysalada ]; 11 11 12 12 machine = { config, pkgs, ... }: { 13 13 services.vector = {
+1 -1
nixos/tests/victoriametrics.nix
··· 2 2 3 3 import ./make-test-python.nix ({ pkgs, ...} : { 4 4 name = "victoriametrics"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ yorickvp ]; 7 7 }; 8 8
+1 -1
nixos/tests/virtualbox.nix
··· 402 402 # (keep black happy) 403 403 ''; 404 404 405 - meta = with pkgs.stdenv.lib.maintainers; { 405 + meta = with pkgs.lib.maintainers; { 406 406 maintainers = [ aszlig cdepillabout ]; 407 407 }; 408 408 };
+1 -1
nixos/tests/wasabibackend.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "wasabibackend"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ mmahut ]; 5 5 }; 6 6
+1 -1
nixos/tests/web-servers/unit-php.nix
··· 4 4 5 5 in { 6 6 name = "unit-php-test"; 7 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ izorkin ]; 7 + meta.maintainers = with pkgs.lib.maintainers; [ izorkin ]; 8 8 9 9 machine = { config, lib, pkgs, ... }: { 10 10 services.unit = {
+1 -1
nixos/tests/wireguard/basic.nix
··· 6 6 in 7 7 { 8 8 name = "wireguard"; 9 - meta = with pkgs.stdenv.lib.maintainers; { 9 + meta = with pkgs.lib.maintainers; { 10 10 maintainers = [ ma27 ]; 11 11 }; 12 12
+1 -1
nixos/tests/wireguard/generated.nix
··· 1 1 { kernelPackages ? null }: 2 2 import ../make-test-python.nix ({ pkgs, lib, ... } : { 3 3 name = "wireguard-generated"; 4 - meta = with pkgs.stdenv.lib.maintainers; { 4 + meta = with pkgs.lib.maintainers; { 5 5 maintainers = [ ma27 grahamc ]; 6 6 }; 7 7
+1 -1
nixos/tests/wireguard/namespaces.nix
··· 17 17 18 18 import ../make-test-python.nix ({ pkgs, lib, ... } : { 19 19 name = "wireguard-with-namespaces"; 20 - meta = with pkgs.stdenv.lib.maintainers; { 20 + meta = with pkgs.lib.maintainers; { 21 21 maintainers = [ asymmetric ]; 22 22 }; 23 23
+1 -1
nixos/tests/wireguard/wg-quick.nix
··· 7 7 in 8 8 { 9 9 name = "wg-quick"; 10 - meta = with pkgs.stdenv.lib.maintainers; { 10 + meta = with pkgs.lib.maintainers; { 11 11 maintainers = [ xwvvvvwx ]; 12 12 }; 13 13
+1 -1
nixos/tests/wordpress.nix
··· 2 2 3 3 { 4 4 name = "wordpress"; 5 - meta = with pkgs.stdenv.lib.maintainers; { 5 + meta = with pkgs.lib.maintainers; { 6 6 maintainers = [ 7 7 flokli 8 8 grahamc # under duress!
+1 -1
nixos/tests/xautolock.nix
··· 4 4 5 5 { 6 6 name = "xautolock"; 7 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ]; 7 + meta.maintainers = with pkgs.lib.maintainers; [ ma27 ]; 8 8 9 9 nodes.machine = { 10 10 imports = [ ./common/x11.nix ./common/user-account.nix ];
+1 -1
nixos/tests/xmonad.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "xmonad"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/xmpp/ejabberd.nix
··· 1 1 import ../make-test-python.nix ({ pkgs, ... }: { 2 2 name = "ejabberd"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ ajs124 ]; 5 5 }; 6 6 nodes = {
+1 -1
nixos/tests/xrdp.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "xrdp"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ volth ]; 5 5 }; 6 6
+1 -1
nixos/tests/xss-lock.nix
··· 4 4 5 5 { 6 6 name = "xss-lock"; 7 - meta.maintainers = with pkgs.stdenv.lib.maintainers; [ ma27 ]; 7 + meta.maintainers = with pkgs.lib.maintainers; [ ma27 ]; 8 8 9 9 nodes = { 10 10 simple = {
+1 -1
nixos/tests/xterm.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "xterm"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ nequissimus ]; 5 5 }; 6 6
+1 -1
nixos/tests/yabar.nix
··· 4 4 5 5 { 6 6 name = "yabar"; 7 - meta = with pkgs.stdenv.lib.maintainers; { 7 + meta = with pkgs.lib.maintainers; { 8 8 maintainers = [ ma27 ]; 9 9 }; 10 10
+1 -1
nixos/tests/yggdrasil.nix
··· 23 23 24 24 in import ./make-test-python.nix ({ pkgs, ...} : { 25 25 name = "yggdrasil"; 26 - meta = with pkgs.stdenv.lib.maintainers; { 26 + meta = with pkgs.lib.maintainers; { 27 27 maintainers = [ gazally ]; 28 28 }; 29 29
+1 -1
nixos/tests/yq.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ... }: { 2 2 name = "yq"; 3 - meta = with pkgs.stdenv.lib.maintainers; { maintainers = [ nequissimus ]; }; 3 + meta = with pkgs.lib.maintainers; { maintainers = [ nequissimus ]; }; 4 4 5 5 nodes.yq = { pkgs, ... }: { environment.systemPackages = with pkgs; [ jq yq ]; }; 6 6
+1 -1
nixos/tests/zfs.nix
··· 14 14 }: 15 15 makeTest { 16 16 name = "zfs-" + name; 17 - meta = with pkgs.stdenv.lib.maintainers; { 17 + meta = with pkgs.lib.maintainers; { 18 18 maintainers = [ adisbladis ]; 19 19 }; 20 20
+1 -1
nixos/tests/zookeeper.nix
··· 5 5 6 6 in { 7 7 name = "zookeeper"; 8 - meta = with pkgs.stdenv.lib.maintainers; { 8 + meta = with pkgs.lib.maintainers; { 9 9 maintainers = [ nequissimus ztzg ]; 10 10 }; 11 11
+1 -1
nixos/tests/zsh-history.nix
··· 1 1 import ./make-test-python.nix ({ pkgs, ...} : { 2 2 name = "zsh-history"; 3 - meta = with pkgs.stdenv.lib.maintainers; { 3 + meta = with pkgs.lib.maintainers; { 4 4 maintainers = [ kampka ]; 5 5 }; 6 6
+13
pkgs/applications/editors/emacs-modes/manual-packages.nix
··· 114 114 org-mac-link = 115 115 callPackage ./org-mac-link { }; 116 116 117 + ott-mode = self.trivialBuild { 118 + pname = "ott-mod"; 119 + 120 + inherit (external.ott) src version; 121 + 122 + postUnpack = "mv $sourceRoot/emacs/ott-mode.el $sourceRoot"; 123 + 124 + meta = { 125 + description = "Standalone package providing ott-mode without building ott and with compiled bytecode."; 126 + inherit (external.Agda.meta) homepage license; 127 + }; 128 + }; 129 + 117 130 perl-completion = 118 131 callPackage ./perl-completion { }; 119 132
+3
pkgs/applications/misc/dockbarx/default.nix
··· 28 28 ++ (with gnome2; [ gnome_python gnome_python_desktop ]) 29 29 ++ [ keybinder ]; 30 30 31 + # no tests 32 + doCheck = false; 33 + 31 34 meta = with stdenv.lib; { 32 35 homepage = "https://launchpad.net/dockbar/"; 33 36 description = "Lightweight taskbar / panel replacement for Linux which works as a stand-alone dock";
+4 -1
pkgs/applications/misc/raiseorlaunch/default.nix
··· 10 10 }; 11 11 12 12 nativeBuildInputs = [ python3Packages.setuptools_scm ]; 13 - checkInputs = [ python3Packages.pytest ]; 14 13 pythonPath = with python3Packages; [ i3ipc ]; 14 + 15 + # no tests 16 + doCheck = false; 17 + pythonImportsCheck = [ "raiseorlaunch" ]; 15 18 16 19 meta = with lib; { 17 20 maintainers = with maintainers; [ winpat ];
+4
pkgs/applications/misc/remarkable/remarkable-mouse/default.nix
··· 11 11 12 12 propagatedBuildInputs = with python3Packages; [ screeninfo paramiko pynput libevdev ]; 13 13 14 + # no tests 15 + doCheck = false; 16 + pythonImportsCheck = [ "remarkable_mouse" ]; 17 + 14 18 meta = with stdenv.lib; { 15 19 description = "A program to use a reMarkable as a graphics tablet"; 16 20 homepage = "https://github.com/evidlo/remarkable_mouse";
+2 -2
pkgs/applications/networking/flexget/default.nix
··· 2 2 3 3 python3Packages.buildPythonApplication rec { 4 4 pname = "FlexGet"; 5 - version = "3.1.95"; 5 + version = "3.1.98"; 6 6 7 7 src = python3Packages.fetchPypi { 8 8 inherit pname version; 9 - sha256 = "5dc80828713c0ece57c6e86a2bad41bbdf34ec41a0ea4da71adfb43784d85120"; 9 + sha256 = "d2d17a5ea821a580c55680294fce9ecf7012ef86c086c742414ec5bcb8468972"; 10 10 }; 11 11 12 12 postPatch = ''
+7 -1
pkgs/applications/science/logic/ott/default.nix
··· 16 16 17 17 installTargets = "ott.install"; 18 18 19 - postInstall = "opaline -prefix $out"; 19 + postInstall = '' 20 + opaline -prefix $out 21 + '' 22 + # There is `emacsPackages.ott-mode` for this now. 23 + + '' 24 + rm -r $out/share/emacs 25 + ''; 20 26 21 27 meta = { 22 28 description = "A tool for the working semanticist";
+4
pkgs/applications/window-managers/i3/altlayout.nix
··· 11 11 12 12 pythonPath = with python3Packages; [ enum-compat i3ipc docopt ]; 13 13 14 + doCheck = false; 15 + 16 + pythonImportsCheck = [ "i3altlayout" ]; 17 + 14 18 meta = with lib; { 15 19 maintainers = with maintainers; [ magnetophon ]; 16 20 description = "Helps you handle more efficiently your screen real estate in i3wm by auto-splitting windows on their longest side";
+1 -1
pkgs/desktops/pantheon/default.nix
··· 23 23 wingpanel-indicator-session wingpanel-indicator-sound 24 24 ]; 25 25 26 - maintainers = with pkgs.stdenv.lib.maintainers; [ worldofpeace ]; 26 + maintainers = with pkgs.lib.maintainers; [ worldofpeace ]; 27 27 28 28 mutter = pkgs.gnome3.mutter334; 29 29
-1
pkgs/development/compilers/go/1.14.nix
··· 247 247 disallowedReferences = [ goBootstrap ]; 248 248 249 249 meta = with stdenv.lib; { 250 - branch = "1.14"; 251 250 homepage = "http://golang.org/"; 252 251 description = "The Go Programming language"; 253 252 license = licenses.bsd3;
-1
pkgs/development/compilers/go/1.15.nix
··· 250 250 disallowedReferences = [ goBootstrap ]; 251 251 252 252 meta = with stdenv.lib; { 253 - branch = "1.15"; 254 253 homepage = "http://golang.org/"; 255 254 description = "The Go Programming language"; 256 255 license = licenses.bsd3;
-1
pkgs/development/compilers/go/1.4.nix
··· 84 84 ''; 85 85 86 86 meta = with stdenv.lib; { 87 - branch = "1.4"; 88 87 homepage = "http://golang.org/"; 89 88 description = "The Go Programming language"; 90 89 license = licenses.bsd3;
-1
pkgs/development/compilers/go/2-dev.nix
··· 252 252 disallowedReferences = [ goBootstrap ]; 253 253 254 254 meta = with stdenv.lib; { 255 - branch = "dev.go2go"; 256 255 homepage = "http://golang.org/"; 257 256 description = "The Go Programming language"; 258 257 license = licenses.bsd3;
+1 -6
pkgs/development/go-modules/generic/default.nix
··· 27 27 # We want parallel builds by default 28 28 , enableParallelBuilding ? true 29 29 30 - # Disabled flag 31 - , disabled ? false 32 - 33 30 # Do not enable this without good reason 34 31 # IE: programs coupled with the compiler 35 32 , allowGoReference ? false ··· 243 240 [ lib.maintainers.kalbasit ]; 244 241 }; 245 242 }); 246 - in if disabled then 247 - throw "${package.name} not supported for go ${go.meta.branch}" 248 - else if (goPackagePath != null) then 243 + in if (goPackagePath != null) then 249 244 throw "`goPackagePath` not needed with `buildGoModule`" 250 245 else 251 246 package
+1 -6
pkgs/development/go-packages/generic/default.nix
··· 10 10 # We want parallel builds by default 11 11 , enableParallelBuilding ? true 12 12 13 - # Disabled flag 14 - , disabled ? false 15 - 16 13 # Go import path of the package 17 14 , goPackagePath 18 15 ··· 249 246 platforms = go.meta.platforms or lib.platforms.all; 250 247 } // meta; 251 248 }); 252 - in if disabled then 253 - throw "${package.name} not supported for go ${go.meta.branch}" 254 - else 249 + in 255 250 package
+2 -2
pkgs/development/haskell-modules/configuration-ghcjs.nix
··· 92 92 base template-haskell ghcjs-base split containers text ghc-prim 93 93 ]; 94 94 description = "FFI QuasiQuoter for GHCJS"; 95 - license = pkgs.stdenv.lib.licenses.mit; 95 + license = pkgs.lib.licenses.mit; 96 96 }) {}; 97 97 # experimental 98 98 ghcjs-vdom = self.callPackage ··· 112 112 base ghc-prim ghcjs-ffiqq ghcjs-base ghcjs-prim containers split 113 113 template-haskell 114 114 ]; 115 - license = pkgs.stdenv.lib.licenses.mit; 115 + license = pkgs.lib.licenses.mit; 116 116 description = "bindings for https://github.com/Matt-Esch/virtual-dom"; 117 117 }) {}; 118 118
+2 -2
pkgs/development/haskell-modules/configuration-nix.nix
··· 711 711 712 712 # mplayer-spot uses mplayer at runtime. 713 713 mplayer-spot = 714 - let path = pkgs.stdenv.lib.makeBinPath [ pkgs.mplayer ]; 714 + let path = pkgs.lib.makeBinPath [ pkgs.mplayer ]; 715 715 in overrideCabal (addBuildTool super.mplayer-spot pkgs.makeWrapper) (oldAttrs: { 716 716 postInstall = '' 717 717 wrapProgram $out/bin/mplayer-spot --prefix PATH : "${path}" ··· 723 723 primitive_0_7_1_0 = dontCheck super.primitive_0_7_1_0; 724 724 725 725 cut-the-crap = 726 - let path = pkgs.stdenv.lib.makeBinPath [ pkgs.ffmpeg_3 pkgs.youtube-dl ]; 726 + let path = pkgs.lib.makeBinPath [ pkgs.ffmpeg_3 pkgs.youtube-dl ]; 727 727 in overrideCabal (addBuildTool super.cut-the-crap pkgs.makeWrapper) (_drv: { 728 728 postInstall = '' 729 729 wrapProgram $out/bin/cut-the-crap \
+2 -2
pkgs/development/interpreters/erlang/R16B02-basho.nix
··· 59 59 knownVulnerabilities = [ "CVE-2017-1000385" ]; 60 60 61 61 platforms = ["x86_64-linux" "x86_64-darwin"]; 62 - license = pkgs.stdenv.lib.licenses.asl20; 63 - maintainers = with pkgs.stdenv.lib.maintainers; [ mdaiter ]; 62 + license = pkgs.lib.licenses.asl20; 63 + maintainers = with pkgs.lib.maintainers; [ mdaiter ]; 64 64 }; 65 65 }
+40
pkgs/development/libraries/argtable/default.nix
··· 1 + { stdenv 2 + , fetchFromGitHub 3 + , cmake 4 + }: 5 + 6 + stdenv.mkDerivation rec { 7 + pname = "argtable"; 8 + version = "3.1.5"; 9 + srcVersion = "v${version}.1c1bb23"; 10 + 11 + src = fetchFromGitHub { 12 + owner = "argtable"; 13 + repo = "argtable3"; 14 + rev = srcVersion; 15 + sha256 = "sha256-sL6mnxsuL1K0DY26jLF/2Czo0RxHYJ3xU3VyavISiMM="; 16 + }; 17 + 18 + nativeBuildInputs = [ cmake ]; 19 + 20 + postPatch = '' 21 + patchShebangs tools/build 22 + ''; 23 + 24 + meta = with stdenv.lib; { 25 + homepage = "https://argtable.org"; 26 + description = "A single-file, ANSI C command-line parsing library"; 27 + longDescription = '' 28 + Argtable is an open source ANSI C library that parses GNU-style 29 + command-line options. It simplifies command-line parsing by defining a 30 + declarative-style API that you can use to specify what your command-line 31 + syntax looks like. Argtable will automatically generate consistent error 32 + handling logic and textual descriptions of the command line syntax, which 33 + are essential but tedious to implement for a robust CLI program. 34 + ''; 35 + license = with licenses; bsd3; 36 + maintainers = with maintainers; [ AndersonTorres artuuge ]; 37 + platforms = with platforms; all; 38 + }; 39 + } 40 + # TODO [ AndersonTorres ]: a NixOS test suite
+12 -4
pkgs/development/libraries/libgda/default.nix
··· 1 - { stdenv, fetchurl, pkgconfig, intltool, itstool, libxml2, gtk3, openssl, gnome3, gobject-introspection, vala, libgee 2 - , overrideCC, gcc6 1 + { stdenv, fetchurl, pkg-config, intltool, itstool, libxml2, gtk3, openssl, gnome3, gobject-introspection, vala, libgee 2 + , overrideCC, gcc6, fetchpatch, autoreconfHook, gtk-doc, autoconf-archive, yelp-tools 3 3 , mysqlSupport ? false, libmysqlclient ? null 4 4 , postgresSupport ? false, postgresql ? null 5 5 }: ··· 15 15 url = "mirror://gnome/sources/${pname}/${stdenv.lib.versions.majorMinor version}/${pname}-${version}.tar.xz"; 16 16 sha256 = "1j1l4dwjgw6w4d1v4bl5a4kwyj7bcih8mj700ywm7xakh1xxyv3g"; 17 17 }; 18 + 19 + patches = [ 20 + # fix compile error with mysql 21 + (fetchpatch { 22 + url = "https://gitlab.gnome.org/GNOME/libgda/-/commit/9859479884fad5f39e6c37e8995e57c28b11b1b9.diff"; 23 + sha256 = "158sncc5bg9lkri1wb0i1ri1nhx4c34rzi47gbfkwphlp7qd4qqv"; 24 + }) 25 + ]; 26 + 18 27 configureFlags = with stdenv.lib; [ 19 - "--enable-gi-system-install=no" 20 28 "--with-mysql=${if mysqlSupport then "yes" else "no"}" 21 29 "--with-postgres=${if postgresSupport then "yes" else "no"}" 22 30 ··· 32 40 33 41 hardeningDisable = [ "format" ]; 34 42 35 - nativeBuildInputs = [ pkgconfig intltool itstool libxml2 gobject-introspection vala ]; 43 + nativeBuildInputs = [ pkg-config intltool itstool libxml2 gobject-introspection vala autoreconfHook gtk-doc autoconf-archive yelp-tools ]; 36 44 buildInputs = with stdenv.lib; [ gtk3 openssl libgee ] 37 45 ++ optional (mysqlSupport) libmysqlclient 38 46 ++ optional (postgresSupport) postgresql;
+51 -15
pkgs/development/libraries/libjson-rpc-cpp/default.nix
··· 1 - { stdenv, fetchFromGitHub, cmake, jsoncpp, argtable, curl, libmicrohttpd 2 - , doxygen, catch, pkg-config 1 + { stdenv 2 + , fetchFromGitHub 3 + , fetchpatch 4 + , pkg-config 5 + , cmake 6 + , argtable 7 + , catch2 8 + , curl 9 + , doxygen 10 + , hiredis 11 + , jsoncpp 12 + , libmicrohttpd 3 13 }: 4 14 5 15 stdenv.mkDerivation rec { 6 16 pname = "libjson-rpc-cpp"; 7 - version = "0.7.0"; 17 + version = "1.3.0"; 8 18 9 19 src = fetchFromGitHub { 10 20 owner = "cinemast"; 11 21 repo = "libjson-rpc-cpp"; 12 - sha256 = "07bg4nyvx0yyhy8c4x9i22kwqpx5jlv36dvpabgbb46ayyndhr7a"; 22 + sha256 = "sha256-EAakiqlfMprwLjloDekOssaB/EnAmn5njcwHGZtYs9w="; 13 23 rev = "v${version}"; 14 24 }; 15 25 16 - NIX_CFLAGS_COMPILE = "-I${catch}/include/catch"; 26 + NIX_CFLAGS_COMPILE = "-I${catch2}/include/catch2"; 27 + 28 + patches = [ 29 + (fetchpatch { 30 + name = "int-to-MHD_Result.patch"; 31 + url = "https://patch-diff.githubusercontent.com/raw/cinemast/libjson-rpc-cpp/pull/299.patch"; 32 + sha256 = "sha256-hiey6etzbOxhMElTMX7offKbey7c2OO/UWeN03k0AaM="; 33 + }) 34 + ]; 35 + 36 + nativeBuildInputs = [ pkg-config cmake doxygen ]; 37 + buildInputs = [ 38 + argtable 39 + catch2 40 + curl 41 + hiredis 42 + jsoncpp 43 + libmicrohttpd 44 + ]; 17 45 18 46 postPatch = '' 19 47 for f in cmake/FindArgtable.cmake \ ··· 26 54 sed -i -re 's#MATCHES "jsoncpp"#MATCHES ".*/jsoncpp/json$"#g' cmake/FindJsoncpp.cmake 27 55 ''; 28 56 29 - configurePhase = '' 57 + preConfigure = '' 30 58 mkdir -p Build/Install 31 59 pushd Build 60 + ''; 32 61 62 + # this hack is needed because the cmake scripts 63 + # require write permission to absolute paths 64 + configurePhase = '' 65 + runHook preConfigure 33 66 cmake .. -DCMAKE_INSTALL_PREFIX=$(pwd)/Install \ 34 67 -DCMAKE_BUILD_TYPE=Release 68 + runHook postConfigure 35 69 ''; 36 70 37 - installPhase = '' 38 - mkdir -p $out 39 - 71 + preInstall = '' 40 72 function fixRunPath { 41 73 p=$(patchelf --print-rpath $1) 42 74 q="$p:${stdenv.lib.makeLibraryPath [ jsoncpp argtable libmicrohttpd curl ]}:$out/lib" 43 75 patchelf --set-rpath $q $1 44 76 } 45 77 46 - make install 78 + mkdir -p $out 79 + ''; 47 80 48 - sed -i -re "s#-([LI]).*/Build/Install(.*)#-\1$out\2#g" Install/lib/pkgconfig/*.pc 49 - for f in Install/lib/*.so* $(find Install/bin -executable -type f); do 81 + postInstall = '' 82 + sed -i -re "s#-([LI]).*/Build/Install(.*)#-\1$out\2#g" Install/lib64/pkgconfig/*.pc 83 + for f in Install/lib64/*.so* $(find Install/bin -executable -type f); do 50 84 fixRunPath $f 51 85 done 52 - 53 86 cp -r Install/* $out 54 87 ''; 55 88 56 - nativeBuildInputs = [ cmake pkg-config ]; 57 - buildInputs = [ jsoncpp argtable curl libmicrohttpd doxygen catch ]; 89 + installPhase = '' 90 + runHook preInstall 91 + make install 92 + runHook postInstall 93 + ''; 58 94 59 95 meta = with stdenv.lib; { 60 96 description = "C++ framework for json-rpc (json remote procedure call)";
+10
pkgs/development/libraries/libmicrohttpd/0.9.72.nix
··· 1 + { stdenv, callPackage, fetchurl }: 2 + 3 + callPackage ./generic.nix ( rec { 4 + version = "0.9.72"; 5 + 6 + src = fetchurl { 7 + url = "mirror://gnu/libmicrohttpd/libmicrohttpd-${version}.tar.gz"; 8 + sha256 = "sha256-Cugl+ODX9BIB/USg3xz0VMHLC8UP6dWcJlUiYCZML/g="; 9 + }; 10 + })
+6 -2
pkgs/development/python-modules/asyncio-dgram/default.nix
··· 1 - { lib 1 + { stdenv 2 + , lib 2 3 , buildPythonPackage 3 4 , fetchFromGitHub 4 5 , pytestCheckHook ··· 16 17 sha256 = "1zkmjvq47zw2fsbnzhr5mh9rsazx0z1f8m528ash25jrxsza5crm"; 17 18 }; 18 19 20 + # OSError: AF_UNIX path too long 21 + doCheck = !stdenv.isDarwin; 22 + 19 23 checkInputs = [ 20 24 pytestCheckHook 21 - pytest-asyncio 25 + pytest-asyncio 22 26 ]; 23 27 24 28 disabledTests = [ "test_protocol_pause_resume" ];
+14 -10
pkgs/development/python-modules/clifford/default.nix
··· 22 22 inherit pname version; 23 23 sha256 = "ade11b20d0631dfc9c2f18ce0149f1e61e4baf114108b27cfd68e5c1619ecc0c"; 24 24 }; 25 - patches = [ (fetchpatch { 26 - # Compatibility with h5py 3. 27 - # Will be included in the next releasse after 1.3.1 28 - url = "https://github.com/pygae/clifford/pull/388/commits/955d141662c68d3d61aa50a162b39e656684c208.patch"; 29 - sha256 = "00m8ias58xycn5n78sy9wywf4wck1v0gb8gzmg40inzdiha93jyz"; 30 - }) ]; 25 + 26 + patches = [ 27 + (fetchpatch { 28 + # Compatibility with h5py 3. 29 + # Will be included in the next releasse after 1.3.1 30 + url = "https://github.com/pygae/clifford/pull/388/commits/955d141662c68d3d61aa50a162b39e656684c208.patch"; 31 + sha256 = "0pkpwnk0kfdxsbzsxqlqh8kgif17l5has0mg31g3kyp8lncj89b1"; 32 + }) 33 + ]; 31 34 32 35 propagatedBuildInputs = [ 33 36 future ··· 53 56 cd clifford/test 54 57 ''; 55 58 56 - pytestFlagsArray = [ 57 - "-m \"not veryslow\"" 58 - "--ignore=test_algebra_initialisation.py" # fails without JIT 59 - "--ignore=test_cga.py" 59 + disabledTests = [ 60 + "veryslow" 61 + "test_algebra_initialisation" 62 + "test_cga" 63 + "test_estimate_rotor_sequential[random_sphere]" 60 64 ]; 61 65 62 66 meta = with lib; {
+25
pkgs/development/python-modules/commandparse/default.nix
··· 1 + { lib 2 + , buildPythonPackage 3 + , fetchPypi 4 + }: 5 + 6 + buildPythonPackage rec { 7 + pname = "commandparse"; 8 + version = "1.1.1"; 9 + 10 + src = fetchPypi { 11 + inherit pname version; 12 + sha256 = "06mcxc0vs5qdcywalgyx5zm18z4xcsrg5g0wsqqv5qawkrvmvl53"; 13 + }; 14 + 15 + # tests only distributed upstream source, not PyPi 16 + doCheck = false; 17 + pythonImportsCheck = [ "commandparse" ]; 18 + 19 + meta = with lib; { 20 + description = "Python module to parse command based CLI application"; 21 + homepage = "https://github.com/flgy/commandparse"; 22 + license = with licenses; [ mit ]; 23 + maintainers = [ maintainers.fab ]; 24 + }; 25 + }
+4
pkgs/development/python-modules/nixpkgs/default.nix
··· 19 19 buildInputs = [ pbr ]; 20 20 propagatedBuildInputs = [ pythonix ]; 21 21 22 + # does not have any tests 23 + doCheck = false; 24 + pythonImportsCheck = [ "nixpkgs" ]; 25 + 22 26 meta = with stdenv.lib; { 23 27 description = "Allows to `from nixpkgs import` stuff in interactive Python sessions"; 24 28 homepage = "https://github.com/t184256/nixpkgs-python-importer";
+2
pkgs/development/python-modules/python-engineio/default.nix
··· 36 36 pytestCheckHook 37 37 ]; 38 38 39 + doCheck = !stdenv.isDarwin; 40 + 39 41 preCheck = stdenv.lib.optionalString stdenv.isLinux '' 40 42 echo "nameserver 127.0.0.1" > resolv.conf 41 43 export NIX_REDIRECTS=/etc/protocols=${iana-etc}/etc/protocols:/etc/resolv.conf=$(realpath resolv.conf) \
+3 -2
pkgs/development/python-modules/shiboken2/default.nix
··· 1 - { buildPythonPackage, python, fetchurl, stdenv, pyside2, 2 - cmake, qt5, llvmPackages }: 1 + { buildPythonPackage, python, fetchurl, stdenv, pyside2 2 + , cmake, qt5, llvmPackages }: 3 3 4 4 stdenv.mkDerivation { 5 5 pname = "shiboken2"; ··· 32 32 license = with licenses; [ gpl2 lgpl21 ]; 33 33 homepage = "https://wiki.qt.io/Qt_for_Python"; 34 34 maintainers = with maintainers; [ gebner ]; 35 + broken = stdenv.isDarwin; 35 36 }; 36 37 }
+2 -2
pkgs/development/tools/gotools/default.nix
··· 1 - { stdenv, go, buildGoModule, fetchgit }: 1 + { stdenv, buildGoModule, fetchgit }: 2 2 3 3 buildGoModule rec { 4 4 pname = "gotools-unstable"; ··· 40 40 ''; 41 41 42 42 excludedPackages = "\\(" 43 - + stdenv.lib.concatStringsSep "\\|" ([ "testdata" ] ++ stdenv.lib.optionals (stdenv.lib.versionAtLeast go.meta.branch "1.5") [ "vet" "cover" ]) 43 + + stdenv.lib.concatStringsSep "\\|" ([ "testdata" "vet" "cover" ]) 44 44 + "\\)"; 45 45 46 46 # Set GOTOOLDIR for derivations adding this to buildInputs
+1 -1
pkgs/development/tools/misc/ctags/wrapped.nix
··· 1 1 { pkgs, ctags }: 2 2 3 - with pkgs.stdenv.lib; 3 + with pkgs.lib; 4 4 5 5 # define some ctags wrappers adding support for some not that common languages 6 6 # customization:
+3 -3
pkgs/development/tools/misc/texlab/default.nix
··· 8 8 9 9 rustPlatform.buildRustPackage rec { 10 10 pname = "texlab"; 11 - version = "2.2.1"; 11 + version = "2.2.2"; 12 12 13 13 src = fetchFromGitHub { 14 14 owner = "latex-lsp"; 15 15 repo = pname; 16 16 rev = "v${version}"; 17 - sha256 = "1hiy8klig7j0if4iqbb0432iqsnds00aya6p4xmm913qfpsyh6cq"; 17 + sha256 = "06x7j4ppgw24xbsnyj1icaksngqbvq6mk8wfcqikzmvmifjspx9m"; 18 18 }; 19 19 20 - cargoSha256 = "0pf8j202rpglcxamsr8r3wwmgsdgih24m52vh1q85l93vj7jkm1v"; 20 + cargoSha256 = "0gzxylpn2hps0kxczd6wwcqhnvm6ir971bfvpgjr6rxi12hs47ky"; 21 21 22 22 nativeBuildInputs = [ installShellFiles ]; 23 23
+1 -1
pkgs/development/tools/poetry2nix/poetry2nix/overrides.nix
··· 407 407 export LLVM_CONFIG=${pkgs.llvm}/bin/llvm-config 408 408 ''; 409 409 410 - __impureHostDeps = pkgs.stdenv.lib.optionals pkgs.stdenv.isDarwin [ "/usr/lib/libm.dylib" ]; 410 + __impureHostDeps = pkgs.lib.optionals pkgs.stdenv.isDarwin [ "/usr/lib/libm.dylib" ]; 411 411 412 412 passthru = old.passthru // { llvm = pkgs.llvm; }; 413 413 }
+3
pkgs/games/anki/default.nix
··· 128 128 # UTF-8 locale needed for testing 129 129 LC_ALL = "en_US.UTF-8"; 130 130 131 + # tests fail with to many open files 132 + doCheck = !stdenv.isDarwin; 133 + 131 134 # - Anki writes some files to $HOME during tests 132 135 # - Skip tests using network 133 136 checkPhase = ''
+1 -1
pkgs/servers/http/nginx/modules.nix
··· 265 265 meta = { 266 266 description = "PageSpeed module for Nginx"; 267 267 homepage = "https://developers.google.com/speed/pagespeed/module/"; 268 - license = pkgs.stdenv.lib.licenses.asl20; 268 + license = pkgs.lib.licenses.asl20; 269 269 }; 270 270 } 271 271 ''
+4
pkgs/servers/uwsgi/default.nix
··· 3 3 , plugins ? [] 4 4 , pam, withPAM ? stdenv.isLinux 5 5 , systemd, withSystemd ? stdenv.isLinux 6 + , libcap, withCap ? stdenv.isLinux 6 7 , python2, python3, ncurses 7 8 , ruby, php, libmysqlclient 8 9 }: ··· 75 76 buildInputs = [ jansson pcre ] 76 77 ++ lib.optional withPAM pam 77 78 ++ lib.optional withSystemd systemd 79 + ++ lib.optional withCap libcap 78 80 ++ lib.concatMap (x: x.inputs) needed 79 81 ; 80 82 ··· 82 84 ( lib.optional withPAM "pam" 83 85 ++ lib.optional withSystemd "systemd_logger" 84 86 ); 87 + 88 + UWSGI_INCLUDES = lib.optionalString withCap "${libcap.dev}/include"; 85 89 86 90 passthru = { 87 91 inherit python2 python3;
+1 -1
pkgs/servers/zigbee2mqtt/default.nix
··· 15 15 16 16 passthru.tests.zigbee2mqtt = nixosTests.zigbee2mqtt; 17 17 18 - meta = with pkgs.stdenv.lib; { 18 + meta = with pkgs.lib; { 19 19 description = "Zigbee to MQTT bridge using zigbee-shepherd"; 20 20 license = licenses.gpl3; 21 21 homepage = https://github.com/Koenkk/zigbee2mqtt;
-41
pkgs/tools/misc/argtable/default.nix
··· 1 - { stdenv 2 - , fetchgit 3 - }: 4 - stdenv.mkDerivation { 5 - pname = "argtable"; 6 - version = "3.0.1"; 7 - 8 - src = fetchgit { 9 - url = "https://github.com/argtable/argtable3.git"; 10 - rev = "de93cfd85f755250285b337cba053a709a270721"; 11 - sha256 = "0fbvk78s3dwryrzgafdra0lb8w7lb873c6xgldl94ps9828x85i3"; 12 - }; 13 - 14 - buildPhase = '' 15 - gcc -shared -o libargtable3.so -fPIC argtable3.c 16 - 17 - pushd tests 18 - make 19 - popd 20 - ''; 21 - 22 - installPhase = '' 23 - mkdir -p $out/include 24 - cp argtable3.h $out/include 25 - 26 - mkdir -p $out/lib 27 - cp libargtable3.so $out/lib 28 - 29 - mkdir -p $out/src 30 - cp argtable3.c $out/src 31 - cp -r examples $out/src 32 - ln -s $out/include/argtable3.h $out/src/argtable3.h 33 - ''; 34 - 35 - meta = with stdenv.lib; { 36 - homepage = "https://www.argtable.org/"; 37 - description = "A Cross-Platform, Single-File, ANSI C Command-Line Parsing Library"; 38 - license = licenses.bsd3; 39 - maintainers = with maintainers; [ artuuge ]; 40 - }; 41 - }
+4 -1
pkgs/tools/networking/urlwatch/default.nix
··· 1 1 { stdenv, fetchFromGitHub, python3Packages }: 2 2 3 3 python3Packages.buildPythonApplication rec { 4 - name = "urlwatch-${version}"; 4 + pname = "urlwatch"; 5 5 version = "2.21"; 6 6 7 7 src = fetchFromGitHub { ··· 22 22 requests 23 23 pyppeteer 24 24 ]; 25 + 26 + # no tests 27 + doCheck = false; 25 28 26 29 meta = with stdenv.lib; { 27 30 description = "A tool for monitoring webpages for updates";
+32
pkgs/tools/security/badchars/default.nix
··· 1 + { lib 2 + , buildPythonApplication 3 + , fetchPypi 4 + }: 5 + 6 + buildPythonApplication rec { 7 + pname = "badchars"; 8 + version = "0.4.0"; 9 + 10 + src = fetchPypi { 11 + inherit pname version; 12 + sha256 = "1xqki8qnfwl97d60xj69alyzwa1mnfbwki25j0vhvhb05varaxz2"; 13 + }; 14 + 15 + postPatch = '' 16 + substituteInPlace setup.py --replace "argparse" "" 17 + ''; 18 + 19 + # no tests are available and it can't be imported (it's only a script, not a module) 20 + doCheck = false; 21 + 22 + meta = with lib; { 23 + description = "HEX badchar generator for different programming languages"; 24 + longDescription = '' 25 + A HEX bad char generator to instruct encoders such as shikata-ga-nai to 26 + transform those to other chars. 27 + ''; 28 + homepage = "https://github.com/cytopia/badchars"; 29 + license = with licenses; [ mit ]; 30 + maintainers = with maintainers; [ fab ]; 31 + }; 32 + }
+38
pkgs/tools/security/ldeep/default.nix
··· 1 + { lib 2 + , buildPythonApplication 3 + , fetchPypi 4 + , commandparse 5 + , dnspython 6 + , ldap3 7 + , termcolor 8 + , tqdm 9 + }: 10 + 11 + buildPythonApplication rec { 12 + pname = "ldeep"; 13 + version = "1.0.9"; 14 + 15 + src = fetchPypi { 16 + inherit pname version; 17 + sha256 = "0n38idkn9hy31m5xkrc36dmw364d137c7phssvj76gr2gqsrqjy3"; 18 + }; 19 + 20 + propagatedBuildInputs = [ 21 + commandparse 22 + dnspython 23 + ldap3 24 + termcolor 25 + tqdm 26 + ]; 27 + 28 + # no tests are present 29 + doCheck = false; 30 + pythonImportsCheck = [ "ldeep" ]; 31 + 32 + meta = with lib; { 33 + description = "In-depth LDAP enumeration utility"; 34 + homepage = "https://github.com/franc-pentest/ldeep"; 35 + license = with licenses; [ mit ]; 36 + maintainers = with maintainers; [ fab ]; 37 + }; 38 + }
+13 -4
pkgs/top-level/all-packages.nix
··· 905 905 906 906 apitrace = libsForQt514.callPackage ../applications/graphics/apitrace {}; 907 907 908 + argtable = callPackage ../development/libraries/argtable { }; 909 + 908 910 arguments = callPackage ../development/libraries/arguments { }; 909 911 910 912 argus = callPackage ../tools/networking/argus {}; 911 913 912 914 argus-clients = callPackage ../tools/networking/argus-clients {}; 913 - 914 - argtable = callPackage ../tools/misc/argtable {}; 915 915 916 916 argyllcms = callPackage ../tools/graphics/argyllcms {}; 917 917 ··· 1495 1495 bashplotlib = callPackage ../tools/misc/bashplotlib { }; 1496 1496 1497 1497 babeld = callPackage ../tools/networking/babeld { }; 1498 + 1499 + badchars = python3Packages.callPackage ../tools/security/badchars { }; 1498 1500 1499 1501 badvpn = callPackage ../tools/networking/badvpn {}; 1500 1502 ··· 5531 5533 lcdf-typetools = callPackage ../tools/misc/lcdf-typetools { }; 5532 5534 5533 5535 ldapvi = callPackage ../tools/misc/ldapvi { }; 5536 + 5537 + ldeep = python3Packages.callPackage ../tools/security/ldeep { }; 5534 5538 5535 5539 ldns = callPackage ../development/libraries/ldns { }; 5536 5540 ··· 14671 14675 14672 14676 libjreen = callPackage ../development/libraries/libjreen { }; 14673 14677 14674 - libjson-rpc-cpp = callPackage ../development/libraries/libjson-rpc-cpp { }; 14678 + libjson-rpc-cpp = callPackage ../development/libraries/libjson-rpc-cpp { 14679 + libmicrohttpd = libmicrohttpd_0_9_72; 14680 + }; 14675 14681 14676 14682 libkate = callPackage ../development/libraries/libkate { }; 14677 14683 ··· 14710 14716 14711 14717 libmicrohttpd_0_9_70 = callPackage ../development/libraries/libmicrohttpd/0.9.70.nix { }; 14712 14718 libmicrohttpd_0_9_71 = callPackage ../development/libraries/libmicrohttpd/0.9.71.nix { }; 14719 + libmicrohttpd_0_9_72 = callPackage ../development/libraries/libmicrohttpd/0.9.72.nix { }; 14713 14720 libmicrohttpd = libmicrohttpd_0_9_71; 14714 14721 14715 14722 libmikmod = callPackage ../development/libraries/libmikmod { ··· 16701 16708 vte_290 = callPackage ../development/libraries/vte/2.90.nix { }; 16702 16709 16703 16710 vtk_7 = libsForQt515.callPackage ../development/libraries/vtk/7.x.nix { 16711 + stdenv = gcc9Stdenv; 16704 16712 inherit (darwin) libobjc; 16705 16713 inherit (darwin.apple_sdk.libs) xpc; 16706 16714 inherit (darwin.apple_sdk.frameworks) Cocoa CoreServices DiskArbitration ··· 16708 16716 CoreText IOSurface ImageIO OpenGL GLUT; 16709 16717 }; 16710 16718 vtk_8 = libsForQt515.callPackage ../development/libraries/vtk/8.x.nix { 16719 + stdenv = gcc9Stdenv; 16711 16720 inherit (darwin) libobjc; 16712 16721 inherit (darwin.apple_sdk.libs) xpc; 16713 16722 inherit (darwin.apple_sdk.frameworks) Cocoa CoreServices DiskArbitration ··· 21425 21434 inherit 21426 21435 autoconf automake editorconfig-core-c git libffi libpng pkgconfig 21427 21436 poppler rtags w3m zlib substituteAll rustPlatform cmake llvmPackages 21428 - libtool zeromq openssl; 21437 + libtool zeromq openssl ott; 21429 21438 }; 21430 21439 }; 21431 21440
+2
pkgs/top-level/python-packages.nix
··· 1348 1348 1349 1349 colour = callPackage ../development/python-modules/colour { }; 1350 1350 1351 + commandparse = callPackage ../development/python-modules/commandparse { }; 1352 + 1351 1353 CommonMark = callPackage ../development/python-modules/commonmark { }; 1352 1354 1353 1355 compiledb = callPackage ../development/python-modules/compiledb { };