diff --git a/lib/systems/examples.nix b/lib/systems/examples.nix index d05c05910523..64f329f2a3db 100644 --- a/lib/systems/examples.nix +++ b/lib/systems/examples.nix @@ -341,32 +341,49 @@ rec { # Windows # - # 32 bit mingw-w64 - mingw32 = { + # mingw-w64 with MSVCRT for i686 + mingw-msvcrt-i686 = { config = "i686-w64-mingw32"; libc = "msvcrt"; # This distinguishes the mingw (non posix) toolchain }; - # 64 bit mingw-w64 - mingwW64 = { + # mingw-w64 with MSVCRT for x86_64 + mingw-msvcrt-x86_64 = { # That's the triplet they use in the mingw-w64 docs. config = "x86_64-w64-mingw32"; libc = "msvcrt"; # This distinguishes the mingw (non posix) toolchain }; - ucrt64 = { + # mingw-w64 with UCRT for x86_64, default compiler + mingw-ucrt-x86_64 = { config = "x86_64-w64-mingw32"; libc = "ucrt"; # This distinguishes the mingw (non posix) toolchain }; - # LLVM-based mingw-w64 for ARM - ucrtAarch64 = { + # mingw-w64 with UCRT for x86_64, LLVM + mingw-ucrt-x86_64-llvm = { + config = "x86_64-w64-mingw32"; + libc = "ucrt"; + rust.rustcTarget = "x86_64-pc-windows-gnullvm"; + useLLVM = true; + }; + + # mingw-w64 with ucrt for Aarch64, default compiler (which is LLVM + # because GCC does not support this platform yet). + mingw-ucrt-aarch64 = { config = "aarch64-w64-mingw32"; libc = "ucrt"; rust.rustcTarget = "aarch64-pc-windows-gnullvm"; useLLVM = true; }; + # mingw-64 back compat + # TODO: Warn after 26.05, and remove after 26.11. + mingw32 = mingw-msvcrt-i686; + mingwW64 = mingw-msvcrt-x86_64; + ucrt64 = mingw-ucrt-x86_64; + ucrtAarch64 = mingw-ucrt-aarch64; + # Target the MSVC ABI x86_64-windows = { config = "x86_64-pc-windows-msvc"; diff --git a/nixos/lib/eval-config-minimal.nix b/nixos/lib/eval-config-minimal.nix index f65c907290d6..846e0a0fa7d6 100644 --- a/nixos/lib/eval-config-minimal.nix +++ b/nixos/lib/eval-config-minimal.nix @@ -39,7 +39,7 @@ let inherit prefix modules; class = "nixos"; specialArgs = { - modulesPath = builtins.toString ../modules; + modulesPath = toString ../modules; } // specialArgs; }; diff --git a/nixos/lib/make-btrfs-fs.nix b/nixos/lib/make-btrfs-fs.nix index 1f3e821a405d..293e42ccae62 100644 --- a/nixos/lib/make-btrfs-fs.nix +++ b/nixos/lib/make-btrfs-fs.nix @@ -65,7 +65,7 @@ pkgs.stdenv.mkDerivation { return 1 fi - if [ ${builtins.toString compressImage} ]; then + if [ ${toString compressImage} ]; then echo "Compressing image" zstd -v --no-progress ./$img -o $out fi diff --git a/nixos/lib/make-ext4-fs.nix b/nixos/lib/make-ext4-fs.nix index 7b48f3c60a94..725213451b7c 100644 --- a/nixos/lib/make-ext4-fs.nix +++ b/nixos/lib/make-ext4-fs.nix @@ -101,7 +101,7 @@ pkgs.stdenv.mkDerivation { resize2fs $img $new_size - if [ ${builtins.toString compressImage} ]; then + if [ ${toString compressImage} ]; then echo "Compressing image" zstd -T$NIX_BUILD_CORES -v --no-progress ./$img -o $out fi diff --git a/nixos/lib/systemd-lib.nix b/nixos/lib/systemd-lib.nix index 2d5dbdfcbf36..9db4c6fb8c47 100644 --- a/nixos/lib/systemd-lib.nix +++ b/nixos/lib/systemd-lib.nix @@ -138,7 +138,7 @@ rec { toIntBaseDetected = value: assert (match "[0-9]+|0x[0-9a-fA-F]+" value) != null; - (builtins.fromTOML "v=${value}").v; + (fromTOML "v=${value}").v; hexChars = stringToCharacters "0123456789abcdefABCDEF"; diff --git a/nixos/lib/testing/driver.nix b/nixos/lib/testing/driver.nix index fa2ac2c6eef3..5845ebe2695a 100644 --- a/nixos/lib/testing/driver.nix +++ b/nixos/lib/testing/driver.nix @@ -67,8 +67,8 @@ let ${lib.optionalString (!config.skipTypeCheck) '' # prepend type hints so the test script can be type checked with mypy cat "${../test-script-prepend.py}" >> testScriptWithTypes - echo "${builtins.toString machineNames}" >> testScriptWithTypes - echo "${builtins.toString vlanNames}" >> testScriptWithTypes + echo "${toString machineNames}" >> testScriptWithTypes + echo "${toString vlanNames}" >> testScriptWithTypes echo -n "$testScript" >> testScriptWithTypes echo "Running type check (enable/disable: config.skipTypeCheck)" diff --git a/nixos/modules/config/fanout.nix b/nixos/modules/config/fanout.nix index 1a63ac0705f6..551d005f47d9 100644 --- a/nixos/modules/config/fanout.nix +++ b/nixos/modules/config/fanout.nix @@ -8,7 +8,7 @@ let cfg = config.services.fanout; mknodCmds = n: - lib.lists.imap0 (i: s: "mknod /dev/fanout${builtins.toString i} c $MAJOR ${builtins.toString i}") ( + lib.lists.imap0 (i: s: "mknod /dev/fanout${toString i} c $MAJOR ${toString i}") ( lib.lists.replicate n "" ); in @@ -33,7 +33,7 @@ in boot.kernelModules = [ "fanout" ]; boot.extraModprobeConfig = '' - options fanout buffersize=${builtins.toString cfg.bufferSize} + options fanout buffersize=${toString cfg.bufferSize} ''; systemd.services.fanout = { diff --git a/nixos/modules/config/i18n.nix b/nixos/modules/config/i18n.nix index 196160ee481a..e9955859bffd 100644 --- a/nixos/modules/config/i18n.nix +++ b/nixos/modules/config/i18n.nix @@ -16,7 +16,7 @@ let (lib.mapAttrs (n: v: (sanitizeUTF8Capitalization v))) (lib.mapAttrsToList (LCRole: lang: lang + "/" + (config.i18n.localeCharsets.${LCRole} or "UTF-8"))) ] - ++ (builtins.map sanitizeUTF8Capitalization ( + ++ (map sanitizeUTF8Capitalization ( lib.optionals (builtins.isList config.i18n.extraLocales) config.i18n.extraLocales )) ++ (lib.optional (builtins.isString config.i18n.extraLocales) config.i18n.extraLocales); diff --git a/nixos/modules/config/zram.nix b/nixos/modules/config/zram.nix index 15f626c3f09c..1f13e31df96b 100644 --- a/nixos/modules/config/zram.nix +++ b/nixos/modules/config/zram.nix @@ -126,7 +126,7 @@ in services.zram-generator.enable = true; services.zram-generator.settings = lib.listToAttrs ( - builtins.map (dev: { + map (dev: { name = dev; value = let diff --git a/nixos/modules/hardware/ckb-next.nix b/nixos/modules/hardware/ckb-next.nix index c65055d8369e..552eac502759 100644 --- a/nixos/modules/hardware/ckb-next.nix +++ b/nixos/modules/hardware/ckb-next.nix @@ -37,7 +37,7 @@ in wantedBy = [ "multi-user.target" ]; serviceConfig = { ExecStart = "${cfg.package}/bin/ckb-next-daemon ${ - lib.optionalString (cfg.gid != null) "--gid=${builtins.toString cfg.gid}" + lib.optionalString (cfg.gid != null) "--gid=${toString cfg.gid}" }"; Restart = "on-failure"; }; diff --git a/nixos/modules/hardware/openrazer.nix b/nixos/modules/hardware/openrazer.nix index 7572da06a4eb..f01c9bc66ef3 100644 --- a/nixos/modules/hardware/openrazer.nix +++ b/nixos/modules/hardware/openrazer.nix @@ -22,8 +22,8 @@ let sync_effects_enabled = ${toPyBoolStr cfg.syncEffectsEnabled} devices_off_on_screensaver = ${toPyBoolStr cfg.devicesOffOnScreensaver} battery_notifier = ${toPyBoolStr cfg.batteryNotifier.enable} - battery_notifier_freq = ${builtins.toString cfg.batteryNotifier.frequency} - battery_notifier_percent = ${builtins.toString cfg.batteryNotifier.percentage} + battery_notifier_freq = ${toString cfg.batteryNotifier.frequency} + battery_notifier_percent = ${toString cfg.batteryNotifier.percentage} [Statistics] key_statistics = ${toPyBoolStr cfg.keyStatistics} diff --git a/nixos/modules/installer/cd-dvd/iso-image.nix b/nixos/modules/installer/cd-dvd/iso-image.nix index 93936e85ce2f..cf96b1abe880 100644 --- a/nixos/modules/installer/cd-dvd/iso-image.nix +++ b/nixos/modules/installer/cd-dvd/iso-image.nix @@ -174,7 +174,7 @@ let baseIsolinuxCfg = '' SERIAL 0 115200 - TIMEOUT ${builtins.toString syslinuxTimeout} + TIMEOUT ${toString syslinuxTimeout} UI vesamenu.c32 MENU BACKGROUND /isolinux/background.png diff --git a/nixos/modules/misc/mandoc.nix b/nixos/modules/misc/mandoc.nix index b459b28dad49..694f3137478e 100644 --- a/nixos/modules/misc/mandoc.nix +++ b/nixos/modules/misc/mandoc.nix @@ -17,7 +17,7 @@ let if lib.isString value || lib.isPath value then "output ${name} ${value}" else if lib.isInt value then - "output ${name} ${builtins.toString value}" + "output ${name} ${toString value}" else if lib.isBool value then lib.optionalString value "output ${name}" else if value == null then diff --git a/nixos/modules/misc/nixpkgs-flake.nix b/nixos/modules/misc/nixpkgs-flake.nix index 912f7a11fa36..10549999fd7b 100644 --- a/nixos/modules/misc/nixpkgs-flake.nix +++ b/nixos/modules/misc/nixpkgs-flake.nix @@ -21,7 +21,7 @@ in default = null; defaultText = "if (using nixpkgsFlake.lib.nixosSystem) then self.outPath else null"; - example = ''builtins.fetchTarball { name = "source"; sha256 = "${lib.fakeHash}"; url = "https://github.com/nixos/nixpkgs/archive/somecommit.tar.gz"; }''; + example = ''fetchTarball { name = "source"; sha256 = "${lib.fakeHash}"; url = "https://github.com/nixos/nixpkgs/archive/somecommit.tar.gz"; }''; description = '' The path to the nixpkgs sources used to build the system. This is automatically set up to be @@ -30,7 +30,7 @@ in This can also be optionally set if the NixOS system is not built with a flake but still uses pinned sources: set this to the store path for the nixpkgs sources used to build the system, - as may be obtained by `builtins.fetchTarball`, for example. + as may be obtained by `fetchTarball`, for example. Note: the name of the store path must be "source" due to . diff --git a/nixos/modules/programs/atop.nix b/nixos/modules/programs/atop.nix index 34e48fbd34b9..3475a1154e69 100644 --- a/nixos/modules/programs/atop.nix +++ b/nixos/modules/programs/atop.nix @@ -107,7 +107,7 @@ in environment.etc = lib.mkIf (cfg.settings != { }) { atoprc.text = lib.concatStrings ( lib.mapAttrsToList (n: v: '' - ${n} ${builtins.toString v} + ${n} ${toString v} '') cfg.settings ); }; diff --git a/nixos/modules/programs/bash/undistract-me.nix b/nixos/modules/programs/bash/undistract-me.nix index a68738512efb..6d42db2c14a2 100644 --- a/nixos/modules/programs/bash/undistract-me.nix +++ b/nixos/modules/programs/bash/undistract-me.nix @@ -27,7 +27,7 @@ in config = lib.mkIf cfg.enable { programs.bash.promptPluginInit = '' - export LONG_RUNNING_COMMAND_TIMEOUT=${builtins.toString cfg.timeout} + export LONG_RUNNING_COMMAND_TIMEOUT=${toString cfg.timeout} export UDM_PLAY_SOUND=${if cfg.playSound then "1" else "0"} . "${pkgs.undistract-me}/etc/profile.d/undistract-me.sh" ''; diff --git a/nixos/modules/programs/benchexec.nix b/nixos/modules/programs/benchexec.nix index 339953c1737a..322da3450f92 100644 --- a/nixos/modules/programs/benchexec.nix +++ b/nixos/modules/programs/benchexec.nix @@ -71,7 +71,7 @@ in # See . systemd.services = builtins.listToAttrs ( map (user: { - name = "user@${builtins.toString (uid user)}"; + name = "user@${toString (uid user)}"; value = { serviceConfig.Delegate = "yes"; overrideStrategy = "asDropin"; diff --git a/nixos/modules/programs/firefox.nix b/nixos/modules/programs/firefox.nix index a970c7e08fe4..2012fe157e18 100644 --- a/nixos/modules/programs/firefox.nix +++ b/nixos/modules/programs/firefox.nix @@ -305,7 +305,7 @@ in }) cfg.preferences ); ExtensionSettings = builtins.listToAttrs ( - builtins.map ( + map ( lang: lib.attrsets.nameValuePair "langpack-${lang}@firefox.mozilla.org" { installation_mode = "normal_installed"; diff --git a/nixos/modules/programs/firejail.nix b/nixos/modules/programs/firejail.nix index 8276f2394fd9..ffdc68b0fa92 100644 --- a/nixos/modules/programs/firejail.nix +++ b/nixos/modules/programs/firejail.nix @@ -34,14 +34,13 @@ let extraArgs = [ ]; }; args = lib.escapeShellArgs ( - opts.extraArgs - ++ (lib.optional (opts.profile != null) "--profile=${builtins.toString opts.profile}") + opts.extraArgs ++ (lib.optional (opts.profile != null) "--profile=${toString opts.profile}") ); in '' cat <<_EOF >$out/bin/${command} #! ${pkgs.runtimeShell} -e - exec /run/wrappers/bin/firejail ${args} -- ${builtins.toString opts.executable} "\$@" + exec /run/wrappers/bin/firejail ${args} -- ${toString opts.executable} "\$@" _EOF chmod 0755 $out/bin/${command} diff --git a/nixos/modules/programs/fish.nix b/nixos/modules/programs/fish.nix index 98915f530e82..93983970958e 100644 --- a/nixos/modules/programs/fish.nix +++ b/nixos/modules/programs/fish.nix @@ -295,7 +295,7 @@ in pkgs.buildEnv { name = "system_fish-completions"; ignoreCollisions = true; - paths = builtins.map generateCompletions config.environment.systemPackages; + paths = map generateCompletions config.environment.systemPackages; }; }) diff --git a/nixos/modules/programs/fuse.nix b/nixos/modules/programs/fuse.nix index 886ea3e54f00..e7e317d7ef9b 100644 --- a/nixos/modules/programs/fuse.nix +++ b/nixos/modules/programs/fuse.nix @@ -58,7 +58,7 @@ in environment.etc."fuse.conf".text = '' ${lib.optionalString (!cfg.userAllowOther) "#"}user_allow_other - mount_max = ${builtins.toString cfg.mountMax} + mount_max = ${toString cfg.mountMax} ''; }; diff --git a/nixos/modules/programs/gamescope.nix b/nixos/modules/programs/gamescope.nix index 8295eeee26ba..910a75354ea6 100644 --- a/nixos/modules/programs/gamescope.nix +++ b/nixos/modules/programs/gamescope.nix @@ -10,13 +10,13 @@ let gamescope = let wrapperArgs = - lib.optional (cfg.args != [ ]) ''--add-flags "${builtins.toString cfg.args}"'' + lib.optional (cfg.args != [ ]) ''--add-flags "${toString cfg.args}"'' ++ builtins.attrValues (builtins.mapAttrs (var: val: "--set-default ${var} ${val}") cfg.env); in pkgs.runCommand "gamescope" { nativeBuildInputs = [ pkgs.makeBinaryWrapper ]; } '' mkdir -p $out/bin makeWrapper ${cfg.package}/bin/gamescope $out/bin/gamescope --inherit-argv0 \ - ${builtins.toString wrapperArgs} + ${toString wrapperArgs} ln -s ${cfg.package}/bin/gamescopectl $out/bin/gamescopectl ''; in diff --git a/nixos/modules/programs/htop.nix b/nixos/modules/programs/htop.nix index 358b7c0eae36..873266a8a002 100644 --- a/nixos/modules/programs/htop.nix +++ b/nixos/modules/programs/htop.nix @@ -12,13 +12,13 @@ let fmt = value: if builtins.isList value then - builtins.concatStringsSep " " (builtins.map fmt value) + builtins.concatStringsSep " " (map fmt value) else if builtins.isString value then value else if builtins.isBool value then if value then "1" else "0" else if builtins.isInt value then - builtins.toString value + toString value else throw "Unrecognized type ${builtins.typeOf value} in htop settings"; diff --git a/nixos/modules/programs/less.nix b/nixos/modules/programs/less.nix index dc1643b8a1a6..57db01bfab61 100644 --- a/nixos/modules/programs/less.nix +++ b/nixos/modules/programs/less.nix @@ -124,7 +124,7 @@ in environment.systemPackages = [ cfg.package ]; environment.variables = { - LESSKEYIN_SYSTEM = builtins.toString lessKey; + LESSKEYIN_SYSTEM = toString lessKey; } // lib.optionalAttrs (cfg.lessopen != null) { LESSOPEN = cfg.lessopen; diff --git a/nixos/modules/programs/liboping.nix b/nixos/modules/programs/liboping.nix index 1bab0dcda5b2..1bb203ca810b 100644 --- a/nixos/modules/programs/liboping.nix +++ b/nixos/modules/programs/liboping.nix @@ -15,7 +15,7 @@ in config = lib.mkIf cfg.enable { environment.systemPackages = with pkgs; [ liboping ]; security.wrappers = lib.mkMerge ( - builtins.map + map (exec: { "${exec}" = { owner = "root"; diff --git a/nixos/modules/programs/light.nix b/nixos/modules/programs/light.nix index 406b9f105c10..7c859aa1bbfc 100644 --- a/nixos/modules/programs/light.nix +++ b/nixos/modules/programs/light.nix @@ -71,8 +71,8 @@ in bindings = let light = "${pkgs.light}/bin/light"; - step = builtins.toString cfg.brightnessKeys.step; - minBrightness = builtins.toString cfg.brightnessKeys.minBrightness; + step = toString cfg.brightnessKeys.step; + minBrightness = toString cfg.brightnessKeys.minBrightness; in [ { diff --git a/nixos/modules/programs/neovim.nix b/nixos/modules/programs/neovim.nix index f1e3cfd4ea49..8630855be714 100644 --- a/nixos/modules/programs/neovim.nix +++ b/nixos/modules/programs/neovim.nix @@ -171,12 +171,12 @@ in builtins.attrValues ( builtins.mapAttrs (name: value: { name = "xdg/nvim/${name}"; - value = builtins.removeAttrs ( + value = removeAttrs ( value // { target = "xdg/nvim/${value.target}"; } - ) (lib.optionals (builtins.isNull value.source) [ "source" ]); + ) (lib.optionals (isNull value.source) [ "source" ]); }) cfg.runtime ) ); diff --git a/nixos/modules/programs/nncp.nix b/nixos/modules/programs/nncp.nix index 66761c27152c..1e8a345aaa1e 100644 --- a/nixos/modules/programs/nncp.nix +++ b/nixos/modules/programs/nncp.nix @@ -81,7 +81,7 @@ in script = '' umask 127 rm -f ${nncpCfgFile} - for f in ${jsonCfgFile} ${builtins.toString config.programs.nncp.secrets} + for f in ${jsonCfgFile} ${toString config.programs.nncp.secrets} do ${lib.getExe pkgs.hjson-go} -c <"$f" done |${lib.getExe pkgs.jq} --slurp 'reduce .[] as $x ({}; . * $x)' >${nncpCfgFile} diff --git a/nixos/modules/programs/proxychains.nix b/nixos/modules/programs/proxychains.nix index 6a3e29487be0..f0c1ff977b23 100644 --- a/nixos/modules/programs/proxychains.nix +++ b/nixos/modules/programs/proxychains.nix @@ -10,18 +10,16 @@ let configFile = '' ${cfg.chain.type}_chain - ${lib.optionalString ( - cfg.chain.type == "random" - ) "chain_len = ${builtins.toString cfg.chain.length}"} + ${lib.optionalString (cfg.chain.type == "random") "chain_len = ${toString cfg.chain.length}"} ${lib.optionalString cfg.proxyDNS "proxy_dns"} ${lib.optionalString cfg.quietMode "quiet_mode"} - remote_dns_subnet ${builtins.toString cfg.remoteDNSSubnet} - tcp_read_time_out ${builtins.toString cfg.tcpReadTimeOut} - tcp_connect_time_out ${builtins.toString cfg.tcpConnectTimeOut} + remote_dns_subnet ${toString cfg.remoteDNSSubnet} + tcp_read_time_out ${toString cfg.tcpReadTimeOut} + tcp_connect_time_out ${toString cfg.tcpConnectTimeOut} localnet ${cfg.localnet} [ProxyList] ${builtins.concatStringsSep "\n" ( - lib.mapAttrsToList (k: v: "${v.type} ${v.host} ${builtins.toString v.port}") ( + lib.mapAttrsToList (k: v: "${v.type} ${v.host} ${toString v.port}") ( lib.filterAttrs (k: v: v.enable) cfg.proxies ) )} diff --git a/nixos/modules/programs/spacefm.nix b/nixos/modules/programs/spacefm.nix index 47f0d6022902..2eeb0464e98c 100644 --- a/nixos/modules/programs/spacefm.nix +++ b/nixos/modules/programs/spacefm.nix @@ -54,7 +54,7 @@ in environment.systemPackages = [ pkgs.spaceFM ]; environment.etc."spacefm/spacefm.conf".text = lib.concatStrings ( - lib.mapAttrsToList (n: v: "${n}=${builtins.toString v}\n") cfg.settings + lib.mapAttrsToList (n: v: "${n}=${toString v}\n") cfg.settings ); }; } diff --git a/nixos/modules/programs/ssh.nix b/nixos/modules/programs/ssh.nix index 508d1961c770..1f8b676e1863 100644 --- a/nixos/modules/programs/ssh.nix +++ b/nixos/modules/programs/ssh.nix @@ -33,7 +33,7 @@ let knownHostsFiles = [ "/etc/ssh/ssh_known_hosts" ] - ++ builtins.map pkgs.copyPathToStore cfg.knownHostsFiles; + ++ map pkgs.copyPathToStore cfg.knownHostsFiles; in { diff --git a/nixos/modules/programs/steam.nix b/nixos/modules/programs/steam.nix index 5a791d0cea0f..6fa66f681457 100644 --- a/nixos/modules/programs/steam.nix +++ b/nixos/modules/programs/steam.nix @@ -19,7 +19,7 @@ let in pkgs.writeShellScriptBin "steam-gamescope" '' ${builtins.concatStringsSep "\n" exports} - gamescope --steam ${builtins.toString cfg.gamescopeSession.args} -- steam ${builtins.toString cfg.gamescopeSession.steamArgs} + gamescope --steam ${toString cfg.gamescopeSession.args} -- steam ${toString cfg.gamescopeSession.steamArgs} ''; gamescopeSessionFile = diff --git a/nixos/modules/programs/tsm-client.nix b/nixos/modules/programs/tsm-client.nix index 504b426c83f3..8765c809fd1a 100644 --- a/nixos/modules/programs/tsm-client.nix +++ b/nixos/modules/programs/tsm-client.nix @@ -286,7 +286,7 @@ let "" # just output key if value is `true` else if isInt value then - " ${builtins.toString value}" + " ${toString value}" else if path.check value then " \"${value}\"" # enclose path in ".." diff --git a/nixos/modules/programs/xfs_quota.nix b/nixos/modules/programs/xfs_quota.nix index b8f284e4ea1d..640d28824762 100644 --- a/nixos/modules/programs/xfs_quota.nix +++ b/nixos/modules/programs/xfs_quota.nix @@ -85,13 +85,13 @@ in environment.etc.projects.source = pkgs.writeText "etc-project" ( builtins.concatStringsSep "\n" ( - lib.mapAttrsToList (name: opts: "${builtins.toString opts.id}:${opts.path}") cfg.projects + lib.mapAttrsToList (name: opts: "${toString opts.id}:${opts.path}") cfg.projects ) ); environment.etc.projid.source = pkgs.writeText "etc-projid" ( builtins.concatStringsSep "\n" ( - lib.mapAttrsToList (name: opts: "${name}:${builtins.toString opts.id}") cfg.projects + lib.mapAttrsToList (name: opts: "${name}:${toString opts.id}") cfg.projects ) ); diff --git a/nixos/modules/programs/xss-lock.nix b/nixos/modules/programs/xss-lock.nix index 4aea57a1046f..f5130f1a98e6 100644 --- a/nixos/modules/programs/xss-lock.nix +++ b/nixos/modules/programs/xss-lock.nix @@ -41,7 +41,7 @@ in "${pkgs.xss-lock}/bin/xss-lock" "--session \${XDG_SESSION_ID}" ] - ++ (builtins.map lib.escapeShellArg cfg.extraOptions) + ++ (map lib.escapeShellArg cfg.extraOptions) ++ [ "--" cfg.lockerCommand diff --git a/nixos/modules/programs/yubikey-touch-detector.nix b/nixos/modules/programs/yubikey-touch-detector.nix index 2986c1344327..4c9da9133bd6 100644 --- a/nixos/modules/programs/yubikey-touch-detector.nix +++ b/nixos/modules/programs/yubikey-touch-detector.nix @@ -49,9 +49,9 @@ in path = [ pkgs.gnupg ]; environment = { - YUBIKEY_TOUCH_DETECTOR_LIBNOTIFY = builtins.toString cfg.libnotify; - YUBIKEY_TOUCH_DETECTOR_NOSOCKET = builtins.toString (!cfg.unixSocket); - YUBIKEY_TOUCH_DETECTOR_VERBOSE = builtins.toString cfg.verbose; + YUBIKEY_TOUCH_DETECTOR_LIBNOTIFY = toString cfg.libnotify; + YUBIKEY_TOUCH_DETECTOR_NOSOCKET = toString (!cfg.unixSocket); + YUBIKEY_TOUCH_DETECTOR_VERBOSE = toString cfg.verbose; }; wantedBy = [ "graphical-session.target" ]; diff --git a/nixos/modules/programs/zsh/zsh.nix b/nixos/modules/programs/zsh/zsh.nix index b46099de5255..63ff34aa286a 100644 --- a/nixos/modules/programs/zsh/zsh.nix +++ b/nixos/modules/programs/zsh/zsh.nix @@ -254,8 +254,8 @@ in # Setup command line history. # Don't export these, otherwise other shells (bash) will try to use same HISTFILE. - SAVEHIST=${builtins.toString cfg.histSize} - HISTSIZE=${builtins.toString cfg.histSize} + SAVEHIST=${toString cfg.histSize} + HISTSIZE=${toString cfg.histSize} HISTFILE=${cfg.histFile} # Configure sane keyboard defaults. diff --git a/nixos/modules/security/acme/default.nix b/nixos/modules/security/acme/default.nix index c03dd38ce472..e16d38afe93d 100644 --- a/nixos/modules/security/acme/default.nix +++ b/nixos/modules/security/acme/default.nix @@ -302,7 +302,7 @@ let # We need to collect all the ACME webroots to grant them write # access in the systemd service. webroots = lib.remove null ( - lib.unique (builtins.map (certAttrs: certAttrs.webroot) (lib.attrValues config.security.acme.certs)) + lib.unique (map (certAttrs: certAttrs.webroot) (lib.attrValues config.security.acme.certs)) ); certificateKey = if data.csrKey != null then "${data.csrKey}" else "certificates/${keyName}.key"; diff --git a/nixos/modules/security/auditd.nix b/nixos/modules/security/auditd.nix index af6f6c8120db..ba556da99c0c 100644 --- a/nixos/modules/security/auditd.nix +++ b/nixos/modules/security/auditd.nix @@ -90,7 +90,7 @@ let else if lib.isList v then lib.concatStringsSep " " (map prepareConfigValue v) else - builtins.toString v; + toString v; prepareConfigText = conf: lib.concatLines ( diff --git a/nixos/modules/security/wrappers/default.nix b/nixos/modules/security/wrappers/default.nix index 8798047a6d06..20177350a740 100644 --- a/nixos/modules/security/wrappers/default.nix +++ b/nixos/modules/security/wrappers/default.nix @@ -168,7 +168,7 @@ let chmod "u${if setuid then "+" else "-"}s,g${if setgid then "+" else "-"}s,${permissions}" "$wrapperDir/${program}" ''; - mkWrappedPrograms = builtins.map ( + mkWrappedPrograms = map ( opts: if opts.capabilities != "" then mkSetcapProgram opts else mkSetuidProgram opts ) (lib.attrValues wrappers); in diff --git a/nixos/modules/services/audio/lavalink.nix b/nixos/modules/services/audio/lavalink.nix index 8cb37017bf96..ce1fad7755bb 100644 --- a/nixos/modules/services/audio/lavalink.nix +++ b/nixos/modules/services/audio/lavalink.nix @@ -237,9 +237,9 @@ in ); pluginExtraConfigs = builtins.listToAttrs ( - builtins.map ( - pluginConfig: lib.attrsets.nameValuePair pluginConfig.configName pluginConfig.extraConfig - ) (lib.lists.filter (pluginCfg: pluginCfg.configName != null) cfg.plugins) + map (pluginConfig: lib.attrsets.nameValuePair pluginConfig.configName pluginConfig.extraConfig) ( + lib.lists.filter (pluginCfg: pluginCfg.configName != null) cfg.plugins + ) ); config = lib.attrsets.recursiveUpdate cfg.extraConfig { @@ -250,9 +250,9 @@ in plugins = pluginExtraConfigs; lavalink.plugins = ( - builtins.map ( + map ( pluginConfig: - builtins.removeAttrs pluginConfig [ + removeAttrs pluginConfig [ "name" "extraConfig" "hash" diff --git a/nixos/modules/services/audio/mpd.nix b/nixos/modules/services/audio/mpd.nix index d21dcdac9b03..1bf0723126ef 100644 --- a/nixos/modules/services/audio/mpd.nix +++ b/nixos/modules/services/audio/mpd.nix @@ -27,7 +27,7 @@ let ) ) a; nonBlockSettings = lib.filterAttrs (n: v: !(builtins.isAttrs v || builtins.isList v)) cfg.settings; - pureBlockSettings = builtins.removeAttrs cfg.settings (builtins.attrNames nonBlockSettings); + pureBlockSettings = removeAttrs cfg.settings (builtins.attrNames nonBlockSettings); blocks = pureBlockSettings // lib.optionalAttrs cfg.fluidsynth { diff --git a/nixos/modules/services/audio/pulseaudio.nix b/nixos/modules/services/audio/pulseaudio.nix index 8f1bfb98cd08..d6afa095fc3e 100644 --- a/nixos/modules/services/audio/pulseaudio.nix +++ b/nixos/modules/services/audio/pulseaudio.nix @@ -282,11 +282,9 @@ in (lib.mkIf (cfg.extraModules != [ ]) { services.pulseaudio.daemon.config.dl-search-path = let - overriddenModules = builtins.map ( - drv: drv.override { pulseaudio = overriddenPackage; } - ) cfg.extraModules; + overriddenModules = map (drv: drv.override { pulseaudio = overriddenPackage; }) cfg.extraModules; modulePaths = - builtins.map (drv: "${drv}/lib/pulseaudio/modules") + map (drv: "${drv}/lib/pulseaudio/modules") # User-provided extra modules take precedence (overriddenModules ++ [ overriddenPackage ]); in diff --git a/nixos/modules/services/audio/squeezelite.nix b/nixos/modules/services/audio/squeezelite.nix index 525285d00ca5..05a5323f4ebe 100644 --- a/nixos/modules/services/audio/squeezelite.nix +++ b/nixos/modules/services/audio/squeezelite.nix @@ -51,7 +51,7 @@ in serviceConfig = { DynamicUser = true; ExecStart = "${bin} -N ${dataDir}/player-name ${cfg.extraArguments}"; - StateDirectory = builtins.baseNameOf dataDir; + StateDirectory = baseNameOf dataDir; SupplementaryGroups = "audio"; }; }; diff --git a/nixos/modules/services/backup/syncoid.nix b/nixos/modules/services/backup/syncoid.nix index 7529bb453df6..beaa18c29680 100644 --- a/nixos/modules/services/backup/syncoid.nix +++ b/nixos/modules/services/backup/syncoid.nix @@ -50,7 +50,7 @@ let (lib.concatStringsSep "," permissions) dataset ]} - ${lib.optionalString ((builtins.dirOf dataset) != ".") '' + ${lib.optionalString ((dirOf dataset) != ".") '' else ${lib.escapeShellArgs [ "/run/booted-system/sw/bin/zfs" @@ -58,7 +58,7 @@ let cfg.user (lib.concatStringsSep "," permissions) # Remove the last part of the path - (builtins.dirOf dataset) + (dirOf dataset) ]} ''} fi @@ -82,14 +82,14 @@ let (lib.concatStringsSep "," permissions) dataset ]} - ${lib.optionalString ((builtins.dirOf dataset) != ".") ( + ${lib.optionalString ((dirOf dataset) != ".") ( lib.escapeShellArgs [ "/run/booted-system/sw/bin/zfs" "unallow" cfg.user (lib.concatStringsSep "," permissions) # Remove the last part of the path - (builtins.dirOf dataset) + (dirOf dataset) ] )} ''}"; diff --git a/nixos/modules/services/cluster/hadoop/conf.nix b/nixos/modules/services/cluster/hadoop/conf.nix index 54524e5cccca..adc7cefd0d2d 100644 --- a/nixos/modules/services/cluster/hadoop/conf.nix +++ b/nixos/modules/services/cluster/hadoop/conf.nix @@ -9,7 +9,7 @@ let lib.optionalString (value != null) '' ${name} - ${builtins.toString value} + ${toString value} ''; siteXml = @@ -22,7 +22,7 @@ let ''; cfgLine = name: value: '' - ${name}=${builtins.toString value} + ${name}=${toString value} ''; cfgFile = fileName: properties: diff --git a/nixos/modules/services/cluster/rancher/default.nix b/nixos/modules/services/cluster/rancher/default.nix index 31415945aab6..3ed0f75d081e 100644 --- a/nixos/modules/services/cluster/rancher/default.nix +++ b/nixos/modules/services/cluster/rancher/default.nix @@ -169,7 +169,7 @@ let # source is a store path containing the complete manifest file source = mkManifestSource "auto-deploy-chart-${name}" ( lib.singleton (mkHelmChartCR name value) - ++ builtins.map (x: fromYaml (mkExtraDeployManifest x)) value.extraDeploy + ++ map (x: fromYaml (mkExtraDeployManifest x)) value.extraDeploy ); }; @@ -384,7 +384,7 @@ let target = lib.mkDefault (mkManifestTarget name); source = lib.mkIf (config.content != null) ( let - name' = "${name}-manifest-" + builtins.baseNameOf name; + name' = "${name}-manifest-" + baseNameOf name; mkSource = mkManifestSource name'; in lib.mkDerivedConfig options.content mkSource diff --git a/nixos/modules/services/continuous-integration/buildkite-agents.nix b/nixos/modules/services/continuous-integration/buildkite-agents.nix index f4c868ed6a2f..6c020f8d98dd 100644 --- a/nixos/modules/services/continuous-integration/buildkite-agents.nix +++ b/nixos/modules/services/continuous-integration/buildkite-agents.nix @@ -213,7 +213,7 @@ in tagStr = name: value: if lib.isList value then - lib.concatStringsSep "," (builtins.map (v: "${name}=${v}") value) + lib.concatStringsSep "," (map (v: "${name}=${v}") value) else "${name}=${value}"; tagsStr = lib.concatStringsSep "," (lib.mapAttrsToList tagStr cfg.tags); diff --git a/nixos/modules/services/continuous-integration/radicle/adapters/native.nix b/nixos/modules/services/continuous-integration/radicle/adapters/native.nix index 5ac5d02fbbe6..8e2a19f447d6 100644 --- a/nixos/modules/services/continuous-integration/radicle/adapters/native.nix +++ b/nixos/modules/services/continuous-integration/radicle/adapters/native.nix @@ -129,7 +129,7 @@ in systemd.tmpfiles.settings.radicle-native-ci = lib.listToAttrs ( map ( instance: - lib.nameValuePair (builtins.dirOf instance.settings.log) { + lib.nameValuePair (dirOf instance.settings.log) { d = { user = config.users.users.radicle.name; group = config.users.groups.radicle.name; diff --git a/nixos/modules/services/databases/foundationdb.nix b/nixos/modules/services/databases/foundationdb.nix index dd55e0e0dd2b..f7beb7289a52 100644 --- a/nixos/modules/services/databases/foundationdb.nix +++ b/nixos/modules/services/databases/foundationdb.nix @@ -442,7 +442,7 @@ in cf=/etc/foundationdb/fdb.cluster desc=$(tr -dc A-Za-z0-9 /dev/null | head -c8) rand=$(tr -dc A-Za-z0-9 /dev/null | head -c8) - echo ''${desc}:''${rand}@${initialIpAddr}:${builtins.toString cfg.listenPortStart} > $cf + echo ''${desc}:''${rand}@${initialIpAddr}:${toString cfg.listenPortStart} > $cf chmod 0664 $cf touch "${cfg.dataDir}/.first_startup" fi diff --git a/nixos/modules/services/databases/hbase-standalone.nix b/nixos/modules/services/databases/hbase-standalone.nix index 57d5e0536bcd..1bd3fa392fec 100644 --- a/nixos/modules/services/databases/hbase-standalone.nix +++ b/nixos/modules/services/databases/hbase-standalone.nix @@ -15,7 +15,7 @@ let lib.mapAttrsToList (name: value: '' ${name} - ${builtins.toString value} + ${toString value} '') configAttr )); diff --git a/nixos/modules/services/databases/postgresql.nix b/nixos/modules/services/databases/postgresql.nix index e046a7aa886a..7984be73913a 100644 --- a/nixos/modules/services/databases/postgresql.nix +++ b/nixos/modules/services/databases/postgresql.nix @@ -52,7 +52,7 @@ let else if isString value then "'${lib.replaceStrings [ "'" ] [ "''" ] value}'" else - builtins.toString value; + toString value; # The main PostgreSQL configuration file. configFile = pkgs.writeTextDir "postgresql.conf" ( @@ -83,7 +83,7 @@ let else if builtins.isString v then "${directive} '${v}'" else - "${directive} ${builtins.toString v}" + "${directive} ${toString v}" ) user.ensureClauses; generateAlterRoleSQL = @@ -882,7 +882,7 @@ in }; path = [ cfg.finalPackage ]; - environment.PGPORT = builtins.toString cfg.settings.port; + environment.PGPORT = toString cfg.settings.port; # Wait for PostgreSQL to be ready to accept connections. script = '' diff --git a/nixos/modules/services/databases/tigerbeetle.nix b/nixos/modules/services/databases/tigerbeetle.nix index 514652a6c8d1..9500557e30bb 100644 --- a/nixos/modules/services/databases/tigerbeetle.nix +++ b/nixos/modules/services/databases/tigerbeetle.nix @@ -91,7 +91,7 @@ in systemd.services.tigerbeetle = let - replicaDataPath = "/var/lib/tigerbeetle/${builtins.toString cfg.clusterId}_${builtins.toString cfg.replicaIndex}.tigerbeetle"; + replicaDataPath = "/var/lib/tigerbeetle/${toString cfg.clusterId}_${toString cfg.replicaIndex}.tigerbeetle"; in { description = "TigerBeetle server"; @@ -101,7 +101,7 @@ in preStart = '' if ! test -e "${replicaDataPath}"; then - ${lib.getExe cfg.package} format --cluster="${builtins.toString cfg.clusterId}" --replica="${builtins.toString cfg.replicaIndex}" --replica-count="${builtins.toString cfg.replicaCount}" "${replicaDataPath}" + ${lib.getExe cfg.package} format --cluster="${toString cfg.clusterId}" --replica="${toString cfg.replicaIndex}" --replica-count="${toString cfg.replicaCount}" "${replicaDataPath}" fi ''; diff --git a/nixos/modules/services/desktop-managers/pantheon.nix b/nixos/modules/services/desktop-managers/pantheon.nix index 974ad1a1be41..7f7cd2593393 100644 --- a/nixos/modules/services/desktop-managers/pantheon.nix +++ b/nixos/modules/services/desktop-managers/pantheon.nix @@ -208,6 +208,22 @@ in "org.gnome.SettingsDaemon.XSettings.service" ]; + # https://github.com/elementary/settings-daemon/issues/217 + systemd.user.services.elementary-settings-daemon = { + description = "elementary Settings Daemon"; + wantedBy = [ "gnome-session-initialized.target" ]; + after = [ "gnome-session-initialized.target" ]; + + # The daemon might launch external applications via g_app_info_launch. + environment.PATH = lib.mkForce null; + + serviceConfig = { + Slice = "session.slice"; + ExecStart = "${pkgs.pantheon.elementary-settings-daemon}/bin/io.elementary.settings-daemon"; + Restart = "on-failure"; + }; + }; + # Global environment environment.systemPackages = (with pkgs.pantheon; [ diff --git a/nixos/modules/services/games/quake3-server.nix b/nixos/modules/services/games/quake3-server.nix index 98e74eb71f69..a0090f68afc9 100644 --- a/nixos/modules/services/games/quake3-server.nix +++ b/nixos/modules/services/games/quake3-server.nix @@ -16,7 +16,7 @@ let cfg = config.services.quake3-server; configFile = pkgs.writeText "q3ds-extra.cfg" '' - set net_port ${builtins.toString cfg.port} + set net_port ${toString cfg.port} ${cfg.extraConfig} ''; diff --git a/nixos/modules/services/games/xonotic.nix b/nixos/modules/services/games/xonotic.nix index 4d181830aaeb..59d89d889c3b 100644 --- a/nixos/modules/services/games/xonotic.nix +++ b/nixos/modules/services/games/xonotic.nix @@ -22,7 +22,7 @@ let value = ( if lib.isList option then - builtins.concatStringsSep " " (builtins.map (x: toValue x) option) + builtins.concatStringsSep " " (map (x: toValue x) option) else toValue option ); diff --git a/nixos/modules/services/hardware/arsenik.nix b/nixos/modules/services/hardware/arsenik.nix index 915c54a9e408..aa6ad4795f8b 100644 --- a/nixos/modules/services/hardware/arsenik.nix +++ b/nixos/modules/services/hardware/arsenik.nix @@ -114,9 +114,9 @@ in enable = true; keyboards.arsenik.config = '' (defvar - tap_timeout ${builtins.toString cfg.tap_timeout} - hold_timeout ${builtins.toString cfg.hold_timeout} - long_hold_timeout ${builtins.toString cfg.long_hold_timeout} + tap_timeout ${toString cfg.tap_timeout} + hold_timeout ${toString cfg.hold_timeout} + long_hold_timeout ${toString cfg.long_hold_timeout} ) (include ${src}/defsrc/${defsrc}.kbd) (include ${src}/deflayer/${base}.kbd) diff --git a/nixos/modules/services/hardware/bitbox-bridge.nix b/nixos/modules/services/hardware/bitbox-bridge.nix index 483453de339e..e7300803efe6 100644 --- a/nixos/modules/services/hardware/bitbox-bridge.nix +++ b/nixos/modules/services/hardware/bitbox-bridge.nix @@ -56,7 +56,7 @@ in serviceConfig = { Type = "simple"; - ExecStart = "${cfg.package}/bin/bitbox-bridge -p ${builtins.toString cfg.port}"; + ExecStart = "${cfg.package}/bin/bitbox-bridge -p ${toString cfg.port}"; User = "bitbox"; }; }; diff --git a/nixos/modules/services/hardware/display.nix b/nixos/modules/services/hardware/display.nix index 043db0a5b0cd..8971075af0c8 100644 --- a/nixos/modules/services/hardware/display.nix +++ b/nixos/modules/services/hardware/display.nix @@ -124,7 +124,7 @@ in builtins.stringLength name <= 12 ) "Modeline name must be 12 characters or less" ''Modeline "${name}" ${value}'' )) - (builtins.map (line: "${line}\n")) + (map (line: "${line}\n")) (lib.strings.concatStringsSep "") ]; }; diff --git a/nixos/modules/services/hardware/trezord.nix b/nixos/modules/services/hardware/trezord.nix index d9f342d6ea46..c29d206046bb 100644 --- a/nixos/modules/services/hardware/trezord.nix +++ b/nixos/modules/services/hardware/trezord.nix @@ -57,7 +57,7 @@ in path = [ ]; serviceConfig = { Type = "simple"; - ExecStart = "${pkgs.trezord}/bin/trezord-go ${lib.optionalString cfg.emulator.enable "-e ${builtins.toString cfg.emulator.port}"}"; + ExecStart = "${pkgs.trezord}/bin/trezord-go ${lib.optionalString cfg.emulator.enable "-e ${toString cfg.emulator.port}"}"; User = "trezord"; }; }; diff --git a/nixos/modules/services/logging/promtail.nix b/nixos/modules/services/logging/promtail.nix index f346070441b3..e2bf483f426c 100644 --- a/nixos/modules/services/logging/promtail.nix +++ b/nixos/modules/services/logging/promtail.nix @@ -85,7 +85,7 @@ in RestrictSUIDSGID = true; PrivateMounts = true; CacheDirectory = "promtail"; - ReadWritePaths = lib.optional allowPositionsFile (builtins.dirOf positionsFile); + ReadWritePaths = lib.optional allowPositionsFile (dirOf positionsFile); User = "promtail"; Group = "promtail"; diff --git a/nixos/modules/services/logging/vector.nix b/nixos/modules/services/logging/vector.nix index 057754c5d0aa..2abafca39a6f 100644 --- a/nixos/modules/services/logging/vector.nix +++ b/nixos/modules/services/logging/vector.nix @@ -74,7 +74,7 @@ in { ExecStart = "${lib.getExe cfg.package} --config ${ if cfg.validateConfig then (validatedConfig conf) else conf - } --graceful-shutdown-limit-secs ${builtins.toString cfg.gracefulShutdownLimitSecs}"; + } --graceful-shutdown-limit-secs ${toString cfg.gracefulShutdownLimitSecs}"; DynamicUser = true; Restart = "always"; StateDirectory = "vector"; diff --git a/nixos/modules/services/mail/cyrus-imap.nix b/nixos/modules/services/mail/cyrus-imap.nix index 9ee7cf8ee44b..3f60093544d5 100644 --- a/nixos/modules/services/mail/cyrus-imap.nix +++ b/nixos/modules/services/mail/cyrus-imap.nix @@ -39,7 +39,7 @@ let p: q: if (q != null) then if builtins.isInt q then - "${p}=${builtins.toString q}" + "${p}=${toString q}" else "${p}=\"${if builtins.isList q then (concatStringsSep " " q) else q}\"" else @@ -336,7 +336,7 @@ in startLimitIntervalSec = 60; environment = { CYRUS_VERBOSE = mkIf cfg.debug "1"; - LISTENQUEUE = builtins.toString cfg.listenQueue; + LISTENQUEUE = toString cfg.listenQueue; }; serviceConfig = { User = if (cfg.user == null) then "cyrus" else cfg.user; diff --git a/nixos/modules/services/mail/postfix-tlspol.nix b/nixos/modules/services/mail/postfix-tlspol.nix index b1288d30fb28..23753897b229 100644 --- a/nixos/modules/services/mail/postfix-tlspol.nix +++ b/nixos/modules/services/mail/postfix-tlspol.nix @@ -55,7 +55,7 @@ in Due to hardening on the systemd unit the socket can never be created world readable/writable. ::: ''; - apply = value: (builtins.fromTOML "v=0o${value}").v; + apply = value: (fromTOML "v=0o${value}").v; }; log-level = mkOption { diff --git a/nixos/modules/services/mail/stalwart-mail.nix b/nixos/modules/services/mail/stalwart-mail.nix index 059addd617ba..ed7edefac66f 100644 --- a/nixos/modules/services/mail/stalwart-mail.nix +++ b/nixos/modules/services/mail/stalwart-mail.nix @@ -17,7 +17,7 @@ let splitAddress = addr: lib.splitString ":" addr; extractPort = addr: lib.toInt (builtins.foldl' (a: b: b) "" (splitAddress addr)); in - builtins.map (address: extractPort address) (parseAddresses listeners); + map (address: extractPort address) (parseAddresses listeners); in { diff --git a/nixos/modules/services/matrix/dendrite.nix b/nixos/modules/services/matrix/dendrite.nix index 259a0c24903c..2c31266457df 100644 --- a/nixos/modules/services/matrix/dendrite.nix +++ b/nixos/modules/services/matrix/dendrite.nix @@ -325,10 +325,10 @@ in "--config /run/dendrite/dendrite.yaml" ] ++ lib.optionals (cfg.httpPort != null) [ - "--http-bind-address :${builtins.toString cfg.httpPort}" + "--http-bind-address :${toString cfg.httpPort}" ] ++ lib.optionals (cfg.httpsPort != null) [ - "--https-bind-address :${builtins.toString cfg.httpsPort}" + "--https-bind-address :${toString cfg.httpsPort}" "--tls-cert ${cfg.tlsCert}" "--tls-key ${cfg.tlsKey}" ] diff --git a/nixos/modules/services/matrix/synapse-auto-compressor.nix b/nixos/modules/services/matrix/synapse-auto-compressor.nix index 3c91e3873b00..6dcb3af8d600 100644 --- a/nixos/modules/services/matrix/synapse-auto-compressor.nix +++ b/nixos/modules/services/matrix/synapse-auto-compressor.nix @@ -136,7 +136,7 @@ in "-n" cfg.settings.chunks_to_compress "-l" - (lib.concatStringsSep "," (builtins.map builtins.toString cfg.settings.levels)) + (lib.concatStringsSep "," (map toString cfg.settings.levels)) ]; LockPersonality = true; MemoryDenyWriteExecute = true; diff --git a/nixos/modules/services/matrix/synapse.nix b/nixos/modules/services/matrix/synapse.nix index 58eb20815a98..e3477ba9ba35 100644 --- a/nixos/modules/services/matrix/synapse.nix +++ b/nixos/modules/services/matrix/synapse.nix @@ -68,7 +68,7 @@ let ${lib.concatMapStringsSep " " (x: "-c ${x}") ([ configFile ] ++ cfg.extraConfigFiles)} \ "${listenerProtocol}://${ if (isIpv6 bindAddress) then "[${bindAddress}]" else "${bindAddress}" - }:${builtins.toString clientListener.port}/" + }:${toString clientListener.port}/" ''; defaultExtras = [ diff --git a/nixos/modules/services/misc/autofs.nix b/nixos/modules/services/misc/autofs.nix index e258fb20b7ea..d7586ddb4c9a 100644 --- a/nixos/modules/services/misc/autofs.nix +++ b/nixos/modules/services/misc/autofs.nix @@ -96,7 +96,7 @@ in serviceConfig = { Type = "forking"; PIDFile = "/run/autofs.pid"; - ExecStart = "${pkgs.autofs5}/bin/automount ${lib.optionalString cfg.debug "-d"} -p /run/autofs.pid -t ${builtins.toString cfg.timeout} ${autoMaster}"; + ExecStart = "${pkgs.autofs5}/bin/automount ${lib.optionalString cfg.debug "-d"} -p /run/autofs.pid -t ${toString cfg.timeout} ${autoMaster}"; ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; }; }; diff --git a/nixos/modules/services/misc/devpi-server.nix b/nixos/modules/services/misc/devpi-server.nix index 2c3f31c47e0c..6d132a38bb71 100644 --- a/nixos/modules/services/misc/devpi-server.nix +++ b/nixos/modules/services/misc/devpi-server.nix @@ -94,7 +94,7 @@ in "--request-timeout=5" "--serverdir=${serverDir}" "--host=${cfg.host}" - "--port=${builtins.toString cfg.port}" + "--port=${toString cfg.port}" ] ++ lib.optionals (!isNull cfg.secretFile) [ "--secretfile=${runtimeDir}/${secretsFileName}" diff --git a/nixos/modules/services/misc/docker-registry.nix b/nixos/modules/services/misc/docker-registry.nix index f4abe2c8bf86..7fc777d5942e 100644 --- a/nixos/modules/services/misc/docker-registry.nix +++ b/nixos/modules/services/misc/docker-registry.nix @@ -18,7 +18,7 @@ let } // (lib.optionalAttrs (cfg.storagePath != null) { filesystem.rootdirectory = cfg.storagePath; }); http = { - addr = "${cfg.listenAddress}:${builtins.toString cfg.port}"; + addr = "${cfg.listenAddress}:${toString cfg.port}"; headers.X-Content-Type-Options = [ "nosniff" ]; }; health.storagedriver = { diff --git a/nixos/modules/services/misc/duckling.nix b/nixos/modules/services/misc/duckling.nix index 70e9066eb338..777dac70b121 100644 --- a/nixos/modules/services/misc/duckling.nix +++ b/nixos/modules/services/misc/duckling.nix @@ -29,7 +29,7 @@ in after = [ "network.target" ]; environment = { - PORT = builtins.toString cfg.port; + PORT = toString cfg.port; }; serviceConfig = { diff --git a/nixos/modules/services/misc/etebase-server.nix b/nixos/modules/services/misc/etebase-server.nix index ecd620cff6cc..efd9bd3237ea 100644 --- a/nixos/modules/services/misc/etebase-server.nix +++ b/nixos/modules/services/misc/etebase-server.nix @@ -188,7 +188,7 @@ in "d '${cfg.dataDir}' - ${cfg.user} ${config.users.users.${cfg.user}.group} - -" ] ++ lib.optionals (cfg.unixSocket != null) [ - "d '${builtins.dirOf cfg.unixSocket}' - ${cfg.user} ${config.users.users.${cfg.user}.group} - -" + "d '${dirOf cfg.unixSocket}' - ${cfg.user} ${config.users.users.${cfg.user}.group} - -" ]; systemd.services.etebase-server = { diff --git a/nixos/modules/services/misc/gitlab.nix b/nixos/modules/services/misc/gitlab.nix index e34d23b187b7..988fc1fcc677 100644 --- a/nixos/modules/services/misc/gitlab.nix +++ b/nixos/modules/services/misc/gitlab.nix @@ -961,7 +961,7 @@ in puma.workers = mkOption { type = types.int; default = 2; - apply = x: builtins.toString x; + apply = x: toString x; description = '' The number of worker processes Puma should spawn. This controls the amount of parallel Ruby code can be @@ -977,7 +977,7 @@ in puma.threadsMin = mkOption { type = types.int; default = 0; - apply = x: builtins.toString x; + apply = x: toString x; description = '' The minimum number of threads Puma should use per worker. @@ -992,7 +992,7 @@ in puma.threadsMax = mkOption { type = types.int; default = 4; - apply = x: builtins.toString x; + apply = x: toString x; description = '' The maximum number of threads Puma should use per worker. This limits how many threads Puma will automatically @@ -1033,7 +1033,7 @@ in sidekiq.memoryKiller.maxMemory = mkOption { type = types.int; default = 2000; - apply = x: builtins.toString (x * 1024); + apply = x: toString (x * 1024); description = '' The maximum amount of memory, in MiB, a Sidekiq worker is allowed to consume before being killed. @@ -1043,7 +1043,7 @@ in sidekiq.memoryKiller.graceTime = mkOption { type = types.int; default = 900; - apply = x: builtins.toString x; + apply = x: toString x; description = '' The time MemoryKiller waits after noticing excessive memory consumption before killing Sidekiq. @@ -1053,7 +1053,7 @@ in sidekiq.memoryKiller.shutdownWait = mkOption { type = types.int; default = 30; - apply = x: builtins.toString x; + apply = x: toString x; description = '' The time allowed for all jobs to finish before Sidekiq is killed forcefully. diff --git a/nixos/modules/services/misc/guix/default.nix b/nixos/modules/services/misc/guix/default.nix index b447dfe31cf7..492d58444d0d 100644 --- a/nixos/modules/services/misc/guix/default.nix +++ b/nixos/modules/services/misc/guix/default.nix @@ -409,7 +409,7 @@ in ''; script = '' exec ${lib.getExe' package "guix"} publish \ - --user=${cfg.publish.user} --port=${builtins.toString cfg.publish.port} \ + --user=${cfg.publish.user} --port=${toString cfg.publish.port} \ ${lib.escapeShellArgs cfg.publish.extraArgs} ''; diff --git a/nixos/modules/services/misc/llama-cpp.nix b/nixos/modules/services/misc/llama-cpp.nix index 90d6cedda0f9..fbbd8125db36 100644 --- a/nixos/modules/services/misc/llama-cpp.nix +++ b/nixos/modules/services/misc/llama-cpp.nix @@ -70,7 +70,7 @@ in serviceConfig = { Type = "idle"; KillSignal = "SIGINT"; - ExecStart = "${cfg.package}/bin/llama-server --log-disable --host ${cfg.host} --port ${builtins.toString cfg.port} -m ${cfg.model} ${utils.escapeSystemdExecArgs cfg.extraFlags}"; + ExecStart = "${cfg.package}/bin/llama-server --log-disable --host ${cfg.host} --port ${toString cfg.port} -m ${cfg.model} ${utils.escapeSystemdExecArgs cfg.extraFlags}"; Restart = "on-failure"; RestartSec = 300; diff --git a/nixos/modules/services/misc/paisa.nix b/nixos/modules/services/misc/paisa.nix index c4d8fe6c238e..11cb83f1817d 100644 --- a/nixos/modules/services/misc/paisa.nix +++ b/nixos/modules/services/misc/paisa.nix @@ -14,7 +14,7 @@ let settings = if (cfg.settings != null) then - builtins.removeAttrs + removeAttrs ( cfg.settings // { diff --git a/nixos/modules/services/misc/pinchflat.nix b/nixos/modules/services/misc/pinchflat.nix index e33fb88cef63..21b78ecde68e 100644 --- a/nixos/modules/services/misc/pinchflat.nix +++ b/nixos/modules/services/misc/pinchflat.nix @@ -129,7 +129,7 @@ in config = mkIf cfg.enable { assertions = [ { - assertion = cfg.selfhosted || !builtins.isNull cfg.secretsFile; + assertion = cfg.selfhosted || !isNull cfg.secretsFile; message = "Either `selfhosted` must be true, or a `secretsFile` must be configured."; } ]; @@ -146,7 +146,7 @@ in StateDirectory = baseNameOf stateDir; Environment = [ - "PORT=${builtins.toString cfg.port}" + "PORT=${toString cfg.port}" "MEDIA_PATH=${cfg.mediaDir}" "CONFIG_PATH=${stateDir}" "DATABASE_PATH=${stateDir}/db/pinchflat.db" @@ -160,7 +160,7 @@ in ] ++ optional cfg.selfhosted [ "RUN_CONTEXT=selfhosted" ] ++ optional (!isNull config.time.timeZone) "TZ=${config.time.timeZone}" - ++ attrValues (mapAttrs (name: value: name + "=" + builtins.toString value) cfg.extraConfig); + ++ attrValues (mapAttrs (name: value: name + "=" + toString value) cfg.extraConfig); EnvironmentFile = optional (cfg.secretsFile != null) cfg.secretsFile; ExecStartPre = "${lib.getExe' cfg.package "migrate"}"; ExecStart = "${getExe cfg.package} start"; diff --git a/nixos/modules/services/misc/plex.nix b/nixos/modules/services/misc/plex.nix index b058732e4792..bf1d02a53fe9 100644 --- a/nixos/modules/services/misc/plex.nix +++ b/nixos/modules/services/misc/plex.nix @@ -181,8 +181,8 @@ in environment = { # Configuration for our FHS userenv script PLEX_DATADIR = cfg.dataDir; - PLEX_PLUGINS = lib.concatMapStringsSep ":" builtins.toString cfg.extraPlugins; - PLEX_SCANNERS = lib.concatMapStringsSep ":" builtins.toString cfg.extraScanners; + PLEX_PLUGINS = lib.concatMapStringsSep ":" toString cfg.extraPlugins; + PLEX_SCANNERS = lib.concatMapStringsSep ":" toString cfg.extraScanners; # The following variables should be set by the FHS userenv script: # PLEX_MEDIA_SERVER_APPLICATION_SUPPORT_DIR diff --git a/nixos/modules/services/misc/renovate.nix b/nixos/modules/services/misc/renovate.nix index 4ecf440a7638..9df1a4f1e70b 100644 --- a/nixos/modules/services/misc/renovate.nix +++ b/nixos/modules/services/misc/renovate.nix @@ -169,7 +169,7 @@ in script = '' ${lib.concatStringsSep "\n" ( - builtins.map (name: '' + map (name: '' ${name}="$(systemd-creds cat 'SECRET-${name}')" export ${name} '') (lib.attrNames cfg.credentials) diff --git a/nixos/modules/services/misc/rshim.nix b/nixos/modules/services/misc/rshim.nix index 37bcb40e16e7..d161e75752bb 100644 --- a/nixos/modules/services/misc/rshim.nix +++ b/nixos/modules/services/misc/rshim.nix @@ -13,8 +13,8 @@ let ] ++ lib.optionals (cfg.backend != null) [ "--backend ${cfg.backend}" ] ++ lib.optionals (cfg.device != null) [ "--device ${cfg.device}" ] - ++ lib.optionals (cfg.index != null) [ "--index ${builtins.toString cfg.index}" ] - ++ [ "--log-level ${builtins.toString cfg.log-level}" ]; + ++ lib.optionals (cfg.index != null) [ "--index ${toString cfg.index}" ] + ++ [ "--log-level ${toString cfg.log-level}" ]; in { options.services.rshim = { diff --git a/nixos/modules/services/misc/taskchampion-sync-server.nix b/nixos/modules/services/misc/taskchampion-sync-server.nix index 272cea170a4f..6c37d70cf96d 100644 --- a/nixos/modules/services/misc/taskchampion-sync-server.nix +++ b/nixos/modules/services/misc/taskchampion-sync-server.nix @@ -85,10 +85,10 @@ in DynamicUser = false; ExecStart = '' ${lib.getExe cfg.package} \ - --listen "${cfg.host}:${builtins.toString cfg.port}" \ + --listen "${cfg.host}:${toString cfg.port}" \ --data-dir ${cfg.dataDir} \ - --snapshot-versions ${builtins.toString cfg.snapshot.versions} \ - --snapshot-days ${builtins.toString cfg.snapshot.days} \ + --snapshot-versions ${toString cfg.snapshot.versions} \ + --snapshot-days ${toString cfg.snapshot.days} \ ${lib.concatMapStringsSep " " (id: "--allow-client-id ${id}") cfg.allowClientIds} ''; }; diff --git a/nixos/modules/services/misc/tee-supplicant/default.nix b/nixos/modules/services/misc/tee-supplicant/default.nix index 185253e2c44d..1553db8ed198 100644 --- a/nixos/modules/services/misc/tee-supplicant/default.nix +++ b/nixos/modules/services/misc/tee-supplicant/default.nix @@ -25,7 +25,7 @@ let # This is safe since we are using it as the path value, so the context # will still ensure that this nix store path exists on the running # system. - taFile = builtins.baseNameOf (builtins.unsafeDiscardStringContext ta); + taFile = baseNameOf (builtins.unsafeDiscardStringContext ta); in { name = "lib/${taDir}/${taFile}"; diff --git a/nixos/modules/services/misc/ytdl-sub.nix b/nixos/modules/services/misc/ytdl-sub.nix index ef1165b8019d..213cd7549969 100644 --- a/nixos/modules/services/misc/ytdl-sub.nix +++ b/nixos/modules/services/misc/ytdl-sub.nix @@ -11,6 +11,7 @@ let settingsFormat = pkgs.formats.yaml { }; in + { meta.maintainers = with lib.maintainers; [ defelo ]; @@ -46,6 +47,14 @@ in example = "0/6:0"; }; + readWritePaths = lib.mkOption { + type = lib.types.listOf lib.types.path; + description = '' + List of paths that ytdl-sub can write to. + ''; + default = [ ]; + }; + config = lib.mkOption { type = settingsFormat.type; description = "Configuration for ytdl-sub. See for more information."; @@ -127,6 +136,7 @@ in ProtectKernelTunables = true; ProtectProc = "invisible"; ProtectSystem = "strict"; + ReadWritePaths = instance.readWritePaths; RestrictAddressFamilies = [ "AF_INET" "AF_INET6" @@ -148,8 +158,6 @@ in }; }; - users.groups = lib.mkIf (cfg.group == "ytdl-sub") { - ytdl-sub = { }; - }; + users.groups = lib.mkIf (cfg.group == "ytdl-sub") { ytdl-sub = { }; }; }; } diff --git a/nixos/modules/services/monitoring/grafana-image-renderer.nix b/nixos/modules/services/monitoring/grafana-image-renderer.nix index 759006ec52b8..aa43e38c621e 100644 --- a/nixos/modules/services/monitoring/grafana-image-renderer.nix +++ b/nixos/modules/services/monitoring/grafana-image-renderer.nix @@ -25,7 +25,7 @@ let generate = lib.flip lib.pipe [ # Remove legacy option prefixes that only exist for backwards-compat - (lib.flip builtins.removeAttrs [ + (lib.flip removeAttrs [ "service" "rendering" "assertions" diff --git a/nixos/modules/services/monitoring/grafana.nix b/nixos/modules/services/monitoring/grafana.nix index 8c58b0ba70d0..76a4ea088f31 100644 --- a/nixos/modules/services/monitoring/grafana.nix +++ b/nixos/modules/services/monitoring/grafana.nix @@ -13,7 +13,7 @@ let opt = options.services.grafana; provisioningSettingsFormat = pkgs.formats.yaml { }; declarativePlugins = pkgs.linkFarm "grafana-plugins" ( - builtins.map (pkg: { + map (pkg: { name = pkg.pname; path = pkg; }) cfg.declarativePlugins diff --git a/nixos/modules/services/monitoring/parsedmarc.nix b/nixos/modules/services/monitoring/parsedmarc.nix index 1d6a7c1f567f..4e52894b6425 100644 --- a/nixos/modules/services/monitoring/parsedmarc.nix +++ b/nixos/modules/services/monitoring/parsedmarc.nix @@ -404,7 +404,7 @@ in "batch_size" ]; in - builtins.map deprecationWarning (builtins.filter hasImapOpt movedOptions); + map deprecationWarning (builtins.filter hasImapOpt movedOptions); services.elasticsearch.enable = lib.mkDefault cfg.provision.elasticsearch; diff --git a/nixos/modules/services/monitoring/prometheus/default.nix b/nixos/modules/services/monitoring/prometheus/default.nix index 35fb022631e0..4ad13d9eac08 100644 --- a/nixos/modules/services/monitoring/prometheus/default.nix +++ b/nixos/modules/services/monitoring/prometheus/default.nix @@ -92,7 +92,7 @@ let cfg.extraFlags ++ [ "--config.file=${if cfg.enableReload then "/etc/prometheus/prometheus.yaml" else prometheusYml}" - "--web.listen-address=${cfg.listenAddress}:${builtins.toString cfg.port}" + "--web.listen-address=${cfg.listenAddress}:${toString cfg.port}" ] ++ ( if (cfg.enableAgentMode) then diff --git a/nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix b/nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix index 4cb11fbaa45a..ff7fe89208fd 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/dmarc.nix @@ -14,7 +14,7 @@ let inherit (cfg) folders port; listen_addr = cfg.listenAddress; storage_path = "$STATE_DIRECTORY"; - imap = (builtins.removeAttrs cfg.imap [ "passwordFile" ]) // { + imap = (removeAttrs cfg.imap [ "passwordFile" ]) // { password = "$IMAP_PASSWORD"; use_ssl = true; }; diff --git a/nixos/modules/services/monitoring/prometheus/exporters/sabnzbd.nix b/nixos/modules/services/monitoring/prometheus/exporters/sabnzbd.nix index 900074c60821..6107677c5575 100644 --- a/nixos/modules/services/monitoring/prometheus/exporters/sabnzbd.nix +++ b/nixos/modules/services/monitoring/prometheus/exporters/sabnzbd.nix @@ -48,7 +48,7 @@ in }) servers.apiKeyFile; in { - serviceConfig.LoadCredential = builtins.map ({ name, path }: "${name}:${path}") credentials; + serviceConfig.LoadCredential = map ({ name, path }: "${name}:${path}") credentials; environment = { METRICS_PORT = toString cfg.port; @@ -59,7 +59,7 @@ in script = let apiKeys = lib.concatStringsSep "," ( - builtins.map (cred: "$(< $CREDENTIALS_DIRECTORY/${cred.name})") credentials + map (cred: "$(< $CREDENTIALS_DIRECTORY/${cred.name})") credentials ); in '' diff --git a/nixos/modules/services/monitoring/prometheus/sachet.nix b/nixos/modules/services/monitoring/prometheus/sachet.nix index 799a6859a7e7..c0b47c9e4f4f 100644 --- a/nixos/modules/services/monitoring/prometheus/sachet.nix +++ b/nixos/modules/services/monitoring/prometheus/sachet.nix @@ -72,7 +72,7 @@ in ]; script = '' ${pkgs.envsubst}/bin/envsubst -i "${configFile}" > /tmp/sachet.yaml - exec ${pkgs.prometheus-sachet}/bin/sachet -config /tmp/sachet.yaml -listen-address ${cfg.address}:${builtins.toString cfg.port} + exec ${pkgs.prometheus-sachet}/bin/sachet -config /tmp/sachet.yaml -listen-address ${cfg.address}:${toString cfg.port} ''; serviceConfig = { diff --git a/nixos/modules/services/network-filesystems/kubo.nix b/nixos/modules/services/network-filesystems/kubo.nix index 56d29c5a0a90..a94d3a366b83 100644 --- a/nixos/modules/services/network-filesystems/kubo.nix +++ b/nixos/modules/services/network-filesystems/kubo.nix @@ -25,7 +25,7 @@ let # Remove the PeerID (an attribute of "Identity") of the temporary Kubo repo. # The "Pinning" section contains the "RemoteServices" section, which would prevent # the daemon from starting as that setting can't be changed via ipfs config replace. - defaultConfig = builtins.removeAttrs rawDefaultConfig [ + defaultConfig = removeAttrs rawDefaultConfig [ "Identity" "Pinning" ]; diff --git a/nixos/modules/services/network-filesystems/openafs/server.nix b/nixos/modules/services/network-filesystems/openafs/server.nix index a9656bafb26d..43370bea3809 100644 --- a/nixos/modules/services/network-filesystems/openafs/server.nix +++ b/nixos/modules/services/network-filesystems/openafs/server.nix @@ -303,12 +303,12 @@ in warnings = lib.optional ((builtins.attrNames cfg.cellServDB) != [ cfg.cellName ]) '' - config.services.openafsServer.cellServDB should normally only contain servers for one cell. It currently contains servers for ${builtins.toString (builtins.attrNames cfg.cellServDB)}. + config.services.openafsServer.cellServDB should normally only contain servers for one cell. It currently contains servers for ${toString (builtins.attrNames cfg.cellServDB)}. '' ++ lib.optional (useBuCellServDB && (builtins.attrNames cfg.backup.cellServDB) != [ cfg.cellName ]) '' - config.services.openafsServer.backup.cellServDB should normally only contain servers for one cell. It currently contains servers for ${builtins.toString (builtins.attrNames cfg.cellServDB)}. + config.services.openafsServer.backup.cellServDB should normally only contain servers for one cell. It currently contains servers for ${toString (builtins.attrNames cfg.cellServDB)}. ''; assertions = [ diff --git a/nixos/modules/services/networking/aria2.nix b/nixos/modules/services/networking/aria2.nix index 24fe3452927e..18edd9efe960 100644 --- a/nixos/modules/services/networking/aria2.nix +++ b/nixos/modules/services/networking/aria2.nix @@ -15,13 +15,7 @@ let portRangesToString = ranges: lib.concatStringsSep "," ( - map ( - x: - if x.from == x.to then - builtins.toString x.from - else - builtins.toString x.from + "-" + builtins.toString x.to - ) ranges + map (x: if x.from == x.to then toString x.from else toString x.from + "-" + toString x.to) ranges ); customToKeyValue = lib.generators.toKeyValue { diff --git a/nixos/modules/services/networking/chisel-server.nix b/nixos/modules/services/networking/chisel-server.nix index b2f07c8d1688..949bbe21bc3c 100644 --- a/nixos/modules/services/networking/chisel-server.nix +++ b/nixos/modules/services/networking/chisel-server.nix @@ -63,7 +63,7 @@ in "${pkgs.chisel}/bin/chisel server " + lib.concatStringsSep " " ( lib.optional (cfg.host != null) "--host ${cfg.host}" - ++ lib.optional (cfg.port != null) "--port ${builtins.toString cfg.port}" + ++ lib.optional (cfg.port != null) "--port ${toString cfg.port}" ++ lib.optional (cfg.authfile != null) "--authfile ${cfg.authfile}" ++ lib.optional (cfg.keepalive != null) "--keepalive ${cfg.keepalive}" ++ lib.optional (cfg.backend != null) "--backend ${cfg.backend}" diff --git a/nixos/modules/services/networking/ddclient.nix b/nixos/modules/services/networking/ddclient.nix index 826e387383a6..db7cadd89abd 100644 --- a/nixos/modules/services/networking/ddclient.nix +++ b/nixos/modules/services/networking/ddclient.nix @@ -7,7 +7,7 @@ let cfg = config.services.ddclient; dataDir = "/var/lib/ddclient"; - StateDirectory = builtins.baseNameOf dataDir; + StateDirectory = baseNameOf dataDir; RuntimeDirectory = StateDirectory; configFile' = pkgs.writeText "ddclient.conf" '' diff --git a/nixos/modules/services/networking/fedimintd.nix b/nixos/modules/services/networking/fedimintd.nix index a2155319f96f..6b617cbe72e9 100644 --- a/nixos/modules/services/networking/fedimintd.nix +++ b/nixos/modules/services/networking/fedimintd.nix @@ -333,7 +333,7 @@ in ]; RestrictNamespaces = true; RestrictRealtime = true; - SocketBindAllow = "udp:${builtins.toString cfg.api_iroh.port}"; + SocketBindAllow = "udp:${toString cfg.api_iroh.port}"; SystemCallArchitectures = "native"; SystemCallFilter = [ "@system-service" @@ -359,14 +359,14 @@ in enableACME = mkOverride 99 true; forceSSL = mkOverride 99 true; locations.${cfg.nginx.path_ws} = { - proxyPass = "http://127.0.0.1:${builtins.toString cfg.api_ws.port}/"; + proxyPass = "http://127.0.0.1:${toString cfg.api_ws.port}/"; proxyWebsockets = true; extraConfig = '' proxy_pass_header Authorization; ''; }; locations.${cfg.nginx.path_ui} = { - proxyPass = "http://127.0.0.1:${builtins.toString cfg.ui.port}/"; + proxyPass = "http://127.0.0.1:${toString cfg.ui.port}/"; extraConfig = '' proxy_pass_header Authorization; ''; diff --git a/nixos/modules/services/networking/firewalld/service.nix b/nixos/modules/services/networking/firewalld/service.nix index 92db5b251d10..c228875bf283 100644 --- a/nixos/modules/services/networking/firewalld/service.nix +++ b/nixos/modules/services/networking/firewalld/service.nix @@ -105,12 +105,12 @@ in (toXmlAttrs { inherit (value) version; }) { inherit (value) short description; - port = builtins.map toXmlAttrs value.ports; - protocol = builtins.map (mkXmlAttr "value") value.protocols; - source-port = builtins.map toXmlAttrs value.sourcePorts; + port = map toXmlAttrs value.ports; + protocol = map (mkXmlAttr "value") value.protocols; + source-port = map toXmlAttrs value.sourcePorts; destination = toXmlAttrs value.destination; - include = builtins.map (mkXmlAttr "service") value.includes; - helper = builtins.map (mkXmlAttr "name") value.helpers; + include = map (mkXmlAttr "service") value.includes; + helper = map (mkXmlAttr "name") value.helpers; } ] ); diff --git a/nixos/modules/services/networking/firewalld/zone.nix b/nixos/modules/services/networking/firewalld/zone.nix index 574c45304dd8..a38c1d934b81 100644 --- a/nixos/modules/services/networking/firewalld/zone.nix +++ b/nixos/modules/services/networking/firewalld/zone.nix @@ -249,7 +249,7 @@ in source = format.generate "firewalld-zone-${name}.xml" { zone = let - mkXmlAttrList = name: builtins.map (mkXmlAttr name); + mkXmlAttrList = name: map (mkXmlAttr name); mkXmlTag = value: if value then "" else null; in filterNullAttrs ( @@ -259,17 +259,17 @@ in (mkXmlAttr "egress-priority" value.egressPriority) { interface = mkXmlAttrList "name" value.interfaces; - source = builtins.map toXmlAttrs value.sources; + source = map toXmlAttrs value.sources; icmp-block-inversion = mkXmlTag value.icmpBlockInversion; forward = mkXmlTag value.forward; inherit (value) short description; service = mkXmlAttrList "name" value.services; - port = builtins.map toXmlAttrs value.ports; + port = map toXmlAttrs value.ports; protocol = mkXmlAttrList "value" value.protocols; icmp-block = mkXmlAttrList "name" value.icmpBlocks; masquerade = mkXmlTag value.masquerade; - forward-port = builtins.map toXmlAttrs (builtins.map filterNullAttrs value.forwardPorts); - source-port = builtins.map toXmlAttrs value.sourcePorts; + forward-port = map toXmlAttrs (map filterNullAttrs value.forwardPorts); + source-port = map toXmlAttrs value.sourcePorts; rule = value.rules; } ] diff --git a/nixos/modules/services/networking/harmonia.nix b/nixos/modules/services/networking/harmonia.nix index 8f495bb0cca1..b8717e5fb0b6 100644 --- a/nixos/modules/services/networking/harmonia.nix +++ b/nixos/modules/services/networking/harmonia.nix @@ -10,7 +10,7 @@ let signKeyPaths = cfg.signKeyPaths ++ lib.optional (cfg.signKeyPath != null) cfg.signKeyPath; credentials = lib.imap0 (i: signKeyPath: { - id = "sign-key-${builtins.toString i}"; + id = "sign-key-${toString i}"; path = signKeyPath; }) signKeyPaths; in @@ -82,7 +82,7 @@ in DeviceAllow = [ "" ]; UMask = "0066"; RuntimeDirectory = "harmonia"; - LoadCredential = builtins.map (credential: "${credential.id}:${credential.path}") credentials; + LoadCredential = map (credential: "${credential.id}:${credential.path}") credentials; SystemCallFilter = [ "@system-service" "~@privileged" diff --git a/nixos/modules/services/networking/ifstate.nix b/nixos/modules/services/networking/ifstate.nix index 772fe831a860..051322fc1ce5 100644 --- a/nixos/modules/services/networking/ifstate.nix +++ b/nixos/modules/services/networking/ifstate.nix @@ -31,7 +31,7 @@ let inherit (pkgs.formats.yaml { }) type; }; - initrdInterfaceTypes = builtins.map (interface: interface.link.kind) ( + initrdInterfaceTypes = map (interface: interface.link.kind) ( builtins.attrValues initrdCfg.settings.interfaces ); # IfState interface kind to kernel modules mapping @@ -228,7 +228,7 @@ in type: if builtins.hasAttr type interfaceKernelModules then interfaceKernelModules."${type}" else [ ]; in - lib.flatten (builtins.map enableModule initrdInterfaceTypes); + lib.flatten (map enableModule initrdInterfaceTypes); systemd = { storePaths = [ diff --git a/nixos/modules/services/networking/iodine.nix b/nixos/modules/services/networking/iodine.nix index 763bce1a905d..ca5385072022 100644 --- a/nixos/modules/services/networking/iodine.nix +++ b/nixos/modules/services/networking/iodine.nix @@ -140,7 +140,7 @@ in after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; script = "exec ${pkgs.iodine}/bin/iodine -f -u ${iodinedUser} ${cfg.extraConfig} ${ - lib.optionalString (cfg.passwordFile != "") "< \"${builtins.toString cfg.passwordFile}\"" + lib.optionalString (cfg.passwordFile != "") "< \"${toString cfg.passwordFile}\"" } ${cfg.relay} ${cfg.server}"; serviceConfig = { RestartSec = "30s"; @@ -177,9 +177,7 @@ in after = [ "network.target" ]; wantedBy = [ "multi-user.target" ]; script = "exec ${pkgs.iodine}/bin/iodined -f -u ${iodinedUser} ${cfg.server.extraConfig} ${ - lib.optionalString ( - cfg.server.passwordFile != "" - ) "< \"${builtins.toString cfg.server.passwordFile}\"" + lib.optionalString (cfg.server.passwordFile != "") "< \"${toString cfg.server.passwordFile}\"" } ${cfg.server.ip} ${cfg.server.domain}"; serviceConfig = { # Filesystem access diff --git a/nixos/modules/services/networking/meshtasticd.nix b/nixos/modules/services/networking/meshtasticd.nix index d72affb8b6df..3afa29a0c0b8 100644 --- a/nixos/modules/services/networking/meshtasticd.nix +++ b/nixos/modules/services/networking/meshtasticd.nix @@ -115,7 +115,7 @@ in AmbientCapabilities = [ "CAP_NET_BIND_SERVICE" ]; - ExecStart = "${lib.getExe cfg.package} --port=${builtins.toString cfg.port} --fsdir=${cfg.dataDir} --config=${configFile} --verbose"; + ExecStart = "${lib.getExe cfg.package} --port=${toString cfg.port} --fsdir=${cfg.dataDir} --config=${configFile} --verbose"; Restart = "always"; RestartSec = "3"; }; diff --git a/nixos/modules/services/networking/nat-iptables.nix b/nixos/modules/services/networking/nat-iptables.nix index 16cd8c4686b5..650b71b038cf 100644 --- a/nixos/modules/services/networking/nat-iptables.nix +++ b/nixos/modules/services/networking/nat-iptables.nix @@ -88,13 +88,11 @@ let ${concatMapStrings (fwd: '' ${iptables} -w -t nat -A nixos-nat-pre \ -i ${toString cfg.externalInterface} -p ${fwd.proto} \ - ${ - optionalString (externalIp != null) "-d ${externalIp}" - } --dport ${builtins.toString fwd.sourcePort} \ + ${optionalString (externalIp != null) "-d ${externalIp}"} --dport ${toString fwd.sourcePort} \ -j DNAT --to-destination ${fwd.destination} ${iptables} -w -t filter -A nixos-filter-forward \ -i ${toString cfg.externalInterface} -p ${fwd.proto} \ - --dport ${builtins.toString fwd.sourcePort} -j ACCEPT + --dport ${toString fwd.sourcePort} -j ACCEPT ${concatMapStrings ( loopbackip: @@ -112,14 +110,14 @@ let # Allow connections to ${loopbackip}:${toString fwd.sourcePort} from the host itself ${iptables} -w -t nat -A nixos-nat-out \ -d ${loopbackip} -p ${fwd.proto} \ - --dport ${builtins.toString fwd.sourcePort} \ + --dport ${toString fwd.sourcePort} \ -j DNAT --to-destination ${fwd.destination} # Allow connections to ${loopbackip}:${toString fwd.sourcePort} from other hosts behind NAT ${concatMapStrings (range: '' ${iptables} -w -t nat -A nixos-nat-pre \ -d ${loopbackip} -p ${fwd.proto} -s '${range}' \ - --dport ${builtins.toString fwd.sourcePort} \ + --dport ${toString fwd.sourcePort} \ -j DNAT --to-destination ${fwd.destination} ${iptables} -w -t nat -A nixos-nat-post \ -d ${destinationIP} -p ${fwd.proto} \ @@ -132,7 +130,7 @@ let ${concatMapStrings (iface: '' ${iptables} -w -t nat -A nixos-nat-pre \ -d ${loopbackip} -p ${fwd.proto} -i '${iface}' \ - --dport ${builtins.toString fwd.sourcePort} \ + --dport ${toString fwd.sourcePort} \ -j DNAT --to-destination ${fwd.destination} ${iptables} -w -t nat -A nixos-nat-post \ -d ${destinationIP} -p ${fwd.proto} \ diff --git a/nixos/modules/services/networking/nebula.nix b/nixos/modules/services/networking/nebula.nix index d309054f50b0..12743329ff59 100644 --- a/nixos/modules/services/networking/nebula.nix +++ b/nixos/modules/services/networking/nebula.nix @@ -51,7 +51,7 @@ let lib.warnIf ((settings.lighthouse.am_lighthouse || settings.relay.am_relay) && settings.listen.port == 0) '' - Nebula network '${netName}' is configured as a lighthouse or relay, and its port is ${builtins.toString settings.listen.port}. + Nebula network '${netName}' is configured as a lighthouse or relay, and its port is ${toString settings.listen.port}. You will likely experience connectivity issues: https://nebula.defined.net/docs/config/listen/#listenport '' settings diff --git a/nixos/modules/services/networking/netbird.nix b/nixos/modules/services/networking/netbird.nix index 250d7b2b7685..7c7641b4c4ed 100644 --- a/nixos/modules/services/networking/netbird.nix +++ b/nixos/modules/services/networking/netbird.nix @@ -206,7 +206,7 @@ in NB_SERVICE = client.service.name; NB_WIREGUARD_PORT = toString client.port; } // optionalAttrs (client.dns-resolver.address != null) { - NB_DNS_RESOLVER_ADDRESS = "''${client.dns-resolver.address}:''${builtins.toString client.dns-resolver.port}"; + NB_DNS_RESOLVER_ADDRESS = "''${client.dns-resolver.address}:''${toString client.dns-resolver.port}"; } ''; description = '' @@ -356,7 +356,7 @@ in WgIface = client.interface; WgPort = client.port; } // optionalAttrs (client.dns-resolver.address != null) { - CustomDNSAddress = "''${client.dns-resolver.address}:''${builtins.toString client.dns-resolver.port}"; + CustomDNSAddress = "''${client.dns-resolver.address}:''${toString client.dns-resolver.port}"; } ''; description = '' @@ -447,7 +447,7 @@ in NB_WIREGUARD_PORT = toString client.port; } // optionalAttrs (client.dns-resolver.address != null) { - NB_DNS_RESOLVER_ADDRESS = "${client.dns-resolver.address}:${builtins.toString client.dns-resolver.port}"; + NB_DNS_RESOLVER_ADDRESS = "${client.dns-resolver.address}:${toString client.dns-resolver.port}"; }; config.config = { @@ -456,7 +456,7 @@ in WgPort = client.port; } // optionalAttrs (client.dns-resolver.address != null) { - CustomDNSAddress = "${client.dns-resolver.address}:${builtins.toString client.dns-resolver.port}"; + CustomDNSAddress = "${client.dns-resolver.address}:${toString client.dns-resolver.port}"; }; } ) diff --git a/nixos/modules/services/networking/netbird/management.nix b/nixos/modules/services/networking/netbird/management.nix index 1026cf4fc9c1..8d65e2e20aa6 100644 --- a/nixos/modules/services/networking/netbird/management.nix +++ b/nixos/modules/services/networking/netbird/management.nix @@ -48,7 +48,7 @@ let Turns = [ { Proto = "udp"; - URI = "turn:${cfg.turnDomain}:${builtins.toString cfg.turnPort}"; + URI = "turn:${cfg.turnDomain}:${toString cfg.turnPort}"; Username = "netbird"; Password = "netbird"; } @@ -79,7 +79,7 @@ let }; HttpConfig = { - Address = "127.0.0.1:${builtins.toString cfg.port}"; + Address = "127.0.0.1:${toString cfg.port}"; IdpSignKeyRefreshEnabled = true; OIDCConfigEndpoint = cfg.oidcConfigEndpoint; }; @@ -263,7 +263,7 @@ in StoreConfig = { Engine = "sqlite"; }; HttpConfig = { - Address = "127.0.0.1:''${builtins.toString cfg.port}"; + Address = "127.0.0.1:''${toString cfg.port}"; IdpSignKeyRefreshEnabled = true; OIDCConfigEndpoint = cfg.oidcConfigEndpoint; }; @@ -457,7 +457,7 @@ in virtualHosts.${cfg.domain} = { locations = { - "/api".proxyPass = "http://localhost:${builtins.toString cfg.port}"; + "/api".proxyPass = "http://localhost:${toString cfg.port}"; "/management.ManagementService/".extraConfig = '' # This is necessary so that grpc connections do not get closed early @@ -466,7 +466,7 @@ in grpc_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - grpc_pass grpc://localhost:${builtins.toString cfg.port}; + grpc_pass grpc://localhost:${toString cfg.port}; grpc_read_timeout 1d; grpc_send_timeout 1d; grpc_socket_keepalive on; diff --git a/nixos/modules/services/networking/netbird/server.nix b/nixos/modules/services/networking/netbird/server.nix index 78498102a452..aa3127f1d67b 100644 --- a/nixos/modules/services/networking/netbird/server.nix +++ b/nixos/modules/services/networking/netbird/server.nix @@ -62,7 +62,7 @@ in TURNConfig.Turns = mkDefault [ { Proto = "udp"; - URI = "turn:${turnDomain}:${builtins.toString turnPort}"; + URI = "turn:${turnDomain}:${toString turnPort}"; Username = "netbird"; Password = if (cfg.coturn.password != null) then diff --git a/nixos/modules/services/networking/netbird/signal.nix b/nixos/modules/services/networking/netbird/signal.nix index ac13bdb6d6ba..7063696f28ab 100644 --- a/nixos/modules/services/networking/netbird/signal.nix +++ b/nixos/modules/services/networking/netbird/signal.nix @@ -145,7 +145,7 @@ in grpc_set_header X-Forwarded-For $proxy_add_x_forwarded_for; - grpc_pass grpc://localhost:${builtins.toString cfg.port}; + grpc_pass grpc://localhost:${toString cfg.port}; grpc_read_timeout 1d; grpc_send_timeout 1d; grpc_socket_keepalive on; diff --git a/nixos/modules/services/networking/nghttpx/default.nix b/nixos/modules/services/networking/nghttpx/default.nix index 40eba4849adc..e7fd446e6b0f 100644 --- a/nixos/modules/services/networking/nghttpx/default.nix +++ b/nixos/modules/services/networking/nghttpx/default.nix @@ -10,10 +10,7 @@ let # renderHost :: Either ServerOptions Path -> String renderHost = server: - if builtins.isString server then - "unix://${server}" - else - "${server.host},${builtins.toString server.port}"; + if builtins.isString server then "unix://${server}" else "${server.host},${toString server.port}"; # Filter out submodule parameters whose value is null or false or is # the key _module. @@ -43,7 +40,7 @@ let else if builtins.isString v then "${n}=${v}" else - "${n}=${builtins.toString v}" + "${n}=${toString v}" ) (filterParams backend.params); # NB: params are delimited by a ";" which is the same delimiter @@ -86,11 +83,11 @@ let ${lib.concatMapStringsSep "\n" renderFrontend cfg.frontends} ${lib.concatMapStringsSep "\n" renderBackend cfg.backends} - backlog=${builtins.toString cfg.backlog} + backlog=${toString cfg.backlog} backend-address-family=${cfg.backend-address-family} - workers=${builtins.toString cfg.workers} - rlimit-nofile=${builtins.toString cfg.rlimit-nofile} + workers=${toString cfg.workers} + rlimit-nofile=${toString cfg.rlimit-nofile} ${lib.optionalString cfg.single-thread "single-thread=yes"} ${lib.optionalString cfg.single-process "single-process=yes"} diff --git a/nixos/modules/services/networking/nm-file-secret-agent.nix b/nixos/modules/services/networking/nm-file-secret-agent.nix index 669a6e208deb..7078b998d575 100644 --- a/nixos/modules/services/networking/nm-file-secret-agent.nix +++ b/nixos/modules/services/networking/nm-file-secret-agent.nix @@ -11,7 +11,7 @@ let enabled = (lib.length cfg.ensureProfiles.secrets.entries) > 0; nmFileSecretAgentConfig = { - entry = builtins.map ( + entry = map ( i: { key = i.key; diff --git a/nixos/modules/services/networking/ntp/chrony.nix b/nixos/modules/services/networking/ntp/chrony.nix index f852d7a8210a..a76a642805bc 100644 --- a/nixos/modules/services/networking/ntp/chrony.nix +++ b/nixos/modules/services/networking/ntp/chrony.nix @@ -28,7 +28,7 @@ let ${lib.optionalString (cfg.enableRTCTrimming) "rtcfile ${rtcFile}"} ${lib.optionalString (cfg.enableNTS) "ntsdumpdir ${stateDir}"} - ${lib.optionalString (cfg.enableRTCTrimming) "rtcautotrim ${builtins.toString cfg.autotrimThreshold}"} + ${lib.optionalString (cfg.enableRTCTrimming) "rtcautotrim ${toString cfg.autotrimThreshold}"} ${lib.optionalString (!config.time.hardwareClockInLocalTime) "rtconutc"} ${cfg.extraConfig} @@ -236,7 +236,7 @@ in }; serviceConfig = { Type = "notify"; - ExecStart = "${chronyPkg}/bin/chronyd ${builtins.toString chronyFlags}"; + ExecStart = "${chronyPkg}/bin/chronyd ${toString chronyFlags}"; # Proc filesystem ProcSubset = "pid"; diff --git a/nixos/modules/services/networking/ntp/ntpd.nix b/nixos/modules/services/networking/ntp/ntpd.nix index 71c98e4cecf9..be1293d11ac8 100644 --- a/nixos/modules/services/networking/ntp/ntpd.nix +++ b/nixos/modules/services/networking/ntp/ntpd.nix @@ -159,7 +159,7 @@ in before = [ "time-sync.target" ]; serviceConfig = { - ExecStart = "@${ntp}/bin/ntpd ntpd -g ${builtins.toString ntpFlags}"; + ExecStart = "@${ntp}/bin/ntpd ntpd -g ${toString ntpFlags}"; Type = "forking"; # Hardening options diff --git a/nixos/modules/services/networking/prosody.nix b/nixos/modules/services/networking/prosody.nix index a388ad670304..b2f480920db5 100644 --- a/nixos/modules/services/networking/prosody.nix +++ b/nixos/modules/services/networking/prosody.nix @@ -551,7 +551,7 @@ let }; disco_items = { - ${lib.concatStringsSep "\n" (builtins.map (x: ''{ "${x.url}", "${x.description}"};'') discoItems)} + ${lib.concatStringsSep "\n" (map (x: ''{ "${x.url}", "${x.description}"};'') discoItems)} }; allow_registration = ${toLua cfg.allowRegistration} diff --git a/nixos/modules/services/networking/pyload.nix b/nixos/modules/services/networking/pyload.nix index 144f97148ef9..858c97fdf54e 100644 --- a/nixos/modules/services/networking/pyload.nix +++ b/nixos/modules/services/networking/pyload.nix @@ -86,7 +86,7 @@ in environment = { HOME = stateDir; PYLOAD__WEBUI__HOST = cfg.listenAddress; - PYLOAD__WEBUI__PORT = builtins.toString cfg.port; + PYLOAD__WEBUI__PORT = toString cfg.port; }; serviceConfig = { diff --git a/nixos/modules/services/networking/searx.nix b/nixos/modules/services/networking/searx.nix index 8603084f0658..8f09ad170ac7 100644 --- a/nixos/modules/services/networking/searx.nix +++ b/nixos/modules/services/networking/searx.nix @@ -14,7 +14,7 @@ let cfg = config.services.searx; settingsFile = pkgs.writeText "settings.yml" ( - builtins.toJSON (builtins.removeAttrs cfg.settings [ "redis" ]) + builtins.toJSON (removeAttrs cfg.settings [ "redis" ]) ); faviconsSettingsFile = (pkgs.formats.toml { }).generate "favicons.toml" cfg.faviconsSettings; diff --git a/nixos/modules/services/networking/snowflake-proxy.nix b/nixos/modules/services/networking/snowflake-proxy.nix index a8e86bcde0d4..48ea5d961c7c 100644 --- a/nixos/modules/services/networking/snowflake-proxy.nix +++ b/nixos/modules/services/networking/snowflake-proxy.nix @@ -56,7 +56,7 @@ in "${pkgs.snowflake}/bin/proxy " + concatStringsSep " " ( optional (cfg.broker != null) "-broker ${cfg.broker}" - ++ optional (cfg.capacity != null) "-capacity ${builtins.toString cfg.capacity}" + ++ optional (cfg.capacity != null) "-capacity ${toString cfg.capacity}" ++ optional (cfg.relay != null) "-relay ${cfg.relay}" ++ optional (cfg.stun != null) "-stun ${cfg.stun}" ++ cfg.extraFlags diff --git a/nixos/modules/services/networking/syncthing.nix b/nixos/modules/services/networking/syncthing.nix index 9cb19e4ff527..1ceffbf96277 100644 --- a/nixos/modules/services/networking/syncthing.nix +++ b/nixos/modules/services/networking/syncthing.nix @@ -200,7 +200,7 @@ let jsonPreSecretsFile = pkgs.writeTextFile { name = "${conf_type}-${new_cfg.id}-conf-pre-secrets.json"; # Remove the ignorePatterns attribute, it is handled separately - text = builtins.toJSON (builtins.removeAttrs new_cfg [ "ignorePatterns" ]); + text = builtins.toJSON (removeAttrs new_cfg [ "ignorePatterns" ]); }; injectSecretsJqCmd = { diff --git a/nixos/modules/services/networking/tailscale.nix b/nixos/modules/services/networking/tailscale.nix index a4c13522ca04..0d3e5ae78429 100644 --- a/nixos/modules/services/networking/tailscale.nix +++ b/nixos/modules/services/networking/tailscale.nix @@ -147,7 +147,7 @@ in after = lib.mkIf (config.networking.networkmanager.enable) [ "NetworkManager-wait-online.service" ]; wantedBy = [ "multi-user.target" ]; path = [ - (builtins.dirOf config.security.wrapperDir) # for `su` to use taildrive with correct access rights + (dirOf config.security.wrapperDir) # for `su` to use taildrive with correct access rights pkgs.procps # for collecting running services (opt-in feature) pkgs.getent # for `getent` to look up user shells pkgs.kmod # required to pass tailscale's v6nat check diff --git a/nixos/modules/services/networking/thelounge.nix b/nixos/modules/services/networking/thelounge.nix index a8104c2e1b88..a9d4447cda32 100644 --- a/nixos/modules/services/networking/thelounge.nix +++ b/nixos/modules/services/networking/thelounge.nix @@ -14,7 +14,7 @@ let "module.exports = " + builtins.toJSON ({ inherit (cfg) public port; } // cfg.extraConfig); pluginManifest = { dependencies = builtins.listToAttrs ( - builtins.map (pkg: { + map (pkg: { name = getName pkg; value = getVersion pkg; }) cfg.plugins diff --git a/nixos/modules/services/networking/unbound.nix b/nixos/modules/services/networking/unbound.nix index 219ca9fc13a9..af8664fd3137 100644 --- a/nixos/modules/services/networking/unbound.nix +++ b/nixos/modules/services/networking/unbound.nix @@ -31,10 +31,10 @@ let throw (traceSeq v "services.unbound.settings: unexpected type"); confNoServer = concatStringsSep "\n" ( - (mapAttrsToList (toConf "") (builtins.removeAttrs cfg.settings [ "server" ])) ++ [ "" ] + (mapAttrsToList (toConf "") (removeAttrs cfg.settings [ "server" ])) ++ [ "" ] ); confServer = concatStringsSep "\n" ( - mapAttrsToList (toConf " ") (builtins.removeAttrs cfg.settings.server [ "define-tag" ]) + mapAttrsToList (toConf " ") (removeAttrs cfg.settings.server [ "define-tag" ]) ); confFileUnchecked = pkgs.writeText "unbound.conf" '' diff --git a/nixos/modules/services/networking/vsftpd.nix b/nixos/modules/services/networking/vsftpd.nix index c42ef15df740..3a129f1a610e 100644 --- a/nixos/modules/services/networking/vsftpd.nix +++ b/nixos/modules/services/networking/vsftpd.nix @@ -321,7 +321,7 @@ in tmpfiles.rules = optional cfg.anonymousUser #Type Path Mode User Gr Age Arg - "d '${builtins.toString cfg.anonymousUserHome}' 0555 'ftp' 'ftp' - -"; + "d '${toString cfg.anonymousUserHome}' 0555 'ftp' 'ftp' - -"; services.vsftpd = { description = "Vsftpd Server"; diff --git a/nixos/modules/services/networking/whoogle-search.nix b/nixos/modules/services/networking/whoogle-search.nix index d06121c7a26f..2b37b3308433 100644 --- a/nixos/modules/services/networking/whoogle-search.nix +++ b/nixos/modules/services/networking/whoogle-search.nix @@ -53,7 +53,7 @@ in ExecStart = "${lib.getExe pkgs.whoogle-search}" + " --host '${cfg.listenAddress}'" - + " --port '${builtins.toString cfg.port}'"; + + " --port '${toString cfg.port}'"; ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID"; StateDirectory = "whoogle-search"; StateDirectoryMode = "0750"; diff --git a/nixos/modules/services/networking/wireguard-networkd.nix b/nixos/modules/services/networking/wireguard-networkd.nix index 3528b5cdfd54..c91454f1e605 100644 --- a/nixos/modules/services/networking/wireguard-networkd.nix +++ b/nixos/modules/services/networking/wireguard-networkd.nix @@ -31,10 +31,7 @@ let fwMarkFromHexOrNum = fwMark: - if (lib.hasPrefix "0x" fwMark) then - lib.fromHexString fwMark - else - (builtins.fromTOML "v=${fwMark}").v; + if (lib.hasPrefix "0x" fwMark) then lib.fromHexString fwMark else (fromTOML "v=${fwMark}").v; privateKeyCredential = interfaceName: escapeCredentialName "wireguard-${interfaceName}-private-key"; presharedKeyCredential = diff --git a/nixos/modules/services/printing/cups-pdf.nix b/nixos/modules/services/printing/cups-pdf.nix index 25c5fb8a89b1..a5fd0c3c1f6d 100644 --- a/nixos/modules/services/printing/cups-pdf.nix +++ b/nixos/modules/services/printing/cups-pdf.nix @@ -134,7 +134,7 @@ let }; config.confFileText = lib.pipe config.settings [ (lib.filterAttrs (key: value: value != null)) - (lib.mapAttrs (key: builtins.toString)) + (lib.mapAttrs (key: toString)) (lib.mapAttrsToList (key: value: "${key} ${value}\n")) lib.concatStrings ]; diff --git a/nixos/modules/services/printing/cupsd.nix b/nixos/modules/services/printing/cupsd.nix index 0b08ce76c9ec..d98642621477 100644 --- a/nixos/modules/services/printing/cupsd.nix +++ b/nixos/modules/services/printing/cupsd.nix @@ -140,7 +140,7 @@ let splitAddress = addr: strings.splitString ":" addr; extractPort = addr: builtins.foldl' (a: b: b) "" (splitAddress addr); in - builtins.map (address: strings.toInt (extractPort address)) addresses; + map (address: strings.toInt (extractPort address)) addresses; in diff --git a/nixos/modules/services/search/meilisearch.nix b/nixos/modules/services/search/meilisearch.nix index 326e89e62fc1..17b6931fcc87 100644 --- a/nixos/modules/services/search/meilisearch.nix +++ b/nixos/modules/services/search/meilisearch.nix @@ -11,7 +11,7 @@ let # These secrets are used in the config file and can be set to paths. secrets-with-path = - builtins.map + map ( { environment, name }: { @@ -43,11 +43,11 @@ let master-key-placeholder = "@MASTER_KEY@"; configFile = settingsFormat.generate "config.toml" ( - builtins.removeAttrs ( + removeAttrs ( if cfg.masterKeyFile != null then cfg.settings // { master_key = master-key-placeholder; } else - builtins.removeAttrs cfg.settings [ "master_key" ] + removeAttrs cfg.settings [ "master_key" ] ) (map (secret: secret.name) secrets-with-path) ); @@ -139,7 +139,7 @@ in type = lib.types.submodule { freeformType = settingsFormat.type; - imports = builtins.map (secret: { + imports = map (secret: { # give them proper types, just so they're easier to consume from this file options.${secret.name} = lib.mkOption { # but they should not show up in documentation as special in any way. @@ -202,7 +202,7 @@ in ]; environment = builtins.listToAttrs ( - builtins.map (secret: { + map (secret: { name = secret.environment; value = lib.mkIf (secret.setting != null) "%d/${secret.name}"; }) secrets-with-path @@ -216,7 +216,7 @@ in [ (lib.mkIf (cfg.masterKeyFile != null) [ "master_key:${cfg.masterKeyFile}" ]) ] - ++ builtins.map ( + ++ map ( secret: lib.mkIf (secret.setting != null) [ "${secret.name}:${secret.setting}" ] ) secrets-with-path ); diff --git a/nixos/modules/services/security/crowdsec.nix b/nixos/modules/services/security/crowdsec.nix index 324dfd140df5..9a1e255441c7 100644 --- a/nixos/modules/services/security/crowdsec.nix +++ b/nixos/modules/services/security/crowdsec.nix @@ -875,7 +875,7 @@ in // builtins.listToAttrs ( map (scenarioFile: { inherit cfg; - name = lib.strings.normalizePath "${localScenariosDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf scenarioFile)}"; + name = lib.strings.normalizePath "${localScenariosDir}/${builtins.unsafeDiscardStringContext (baseNameOf scenarioFile)}"; value = { link = { type = "L+"; @@ -887,7 +887,7 @@ in // builtins.listToAttrs ( map (parser: { inherit cfg; - name = lib.strings.normalizePath "${localParsersS00RawDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf parser)}"; + name = lib.strings.normalizePath "${localParsersS00RawDir}/${builtins.unsafeDiscardStringContext (baseNameOf parser)}"; value = { link = { type = "L+"; @@ -899,7 +899,7 @@ in // builtins.listToAttrs ( map (parser: { inherit cfg; - name = lib.strings.normalizePath "${localParsersS01ParseDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf parser)}"; + name = lib.strings.normalizePath "${localParsersS01ParseDir}/${builtins.unsafeDiscardStringContext (baseNameOf parser)}"; value = { link = { type = "L+"; @@ -911,7 +911,7 @@ in // builtins.listToAttrs ( map (parser: { inherit cfg; - name = lib.strings.normalizePath "${localParsersS02EnrichDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf parser)}"; + name = lib.strings.normalizePath "${localParsersS02EnrichDir}/${builtins.unsafeDiscardStringContext (baseNameOf parser)}"; value = { link = { type = "L+"; @@ -923,7 +923,7 @@ in // builtins.listToAttrs ( map (postoverflow: { inherit cfg; - name = lib.strings.normalizePath "${localPostOverflowsS01WhitelistDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf postoverflow)}"; + name = lib.strings.normalizePath "${localPostOverflowsS01WhitelistDir}/${builtins.unsafeDiscardStringContext (baseNameOf postoverflow)}"; value = { link = { type = "L+"; @@ -935,7 +935,7 @@ in // builtins.listToAttrs ( map (context: { inherit cfg; - name = lib.strings.normalizePath "${localContextsDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf context)}"; + name = lib.strings.normalizePath "${localContextsDir}/${builtins.unsafeDiscardStringContext (baseNameOf context)}"; value = { link = { type = "L+"; @@ -947,7 +947,7 @@ in // builtins.listToAttrs ( map (notification: { inherit cfg; - name = lib.strings.normalizePath "${notificationsDir}/${builtins.unsafeDiscardStringContext (builtins.baseNameOf notification)}"; + name = lib.strings.normalizePath "${notificationsDir}/${builtins.unsafeDiscardStringContext (baseNameOf notification)}"; value = { link = { type = "L+"; diff --git a/nixos/modules/services/security/fail2ban.nix b/nixos/modules/services/security/fail2ban.nix index e71d04fdef9a..c0a992376f51 100644 --- a/nixos/modules/services/security/fail2ban.nix +++ b/nixos/modules/services/security/fail2ban.nix @@ -452,7 +452,7 @@ in # Block SSH if there are too many failing connection attempts. (lib.mkIf config.services.openssh.enable { sshd.settings.port = lib.mkDefault ( - lib.concatMapStringsSep "," builtins.toString config.services.openssh.ports + lib.concatMapStringsSep "," toString config.services.openssh.ports ); }) ]; diff --git a/nixos/modules/services/security/kanidm.nix b/nixos/modules/services/security/kanidm.nix index 20e1fdd0f2a1..7483e1463e06 100644 --- a/nixos/modules/services/security/kanidm.nix +++ b/nixos/modules/services/security/kanidm.nix @@ -65,13 +65,12 @@ let # Merge bind mount paths and remove paths where a prefix is already mounted. # This makes sure that if e.g. the tls_chain is in the nix store and /nix/store is already in the mount # paths, no new bind mount is added. Adding subpaths caused problems on ofborg. - hasPrefixInList = - list: newPath: any (path: hasPrefix (builtins.toString path) (builtins.toString newPath)) list; + hasPrefixInList = list: newPath: any (path: hasPrefix (toString path) (toString newPath)) list; mergePaths = foldl' ( merged: newPath: let # If the new path is a prefix to some existing path, we need to filter it out - filteredPaths = filter (p: !hasPrefix (builtins.toString newPath) (builtins.toString p)) merged; + filteredPaths = filter (p: !hasPrefix (toString newPath) (toString p)) merged; # If a prefix of the new path is already in the list, do not add it filteredNew = optional (!hasPrefixInList filteredPaths newPath) newPath; in diff --git a/nixos/modules/services/security/oauth2-proxy-nginx.nix b/nixos/modules/services/security/oauth2-proxy-nginx.nix index 97e50f1c6fbb..d174bedbf5fb 100644 --- a/nixos/modules/services/security/oauth2-proxy-nginx.nix +++ b/nixos/modules/services/security/oauth2-proxy-nginx.nix @@ -113,10 +113,7 @@ in let maybeQueryArg = name: value: - if value == null then - null - else - "${name}=${lib.concatStringsSep "," (builtins.map lib.escapeURL value)}"; + if value == null then null else "${name}=${lib.concatStringsSep "," (map lib.escapeURL value)}"; allArgs = lib.mapAttrsToList maybeQueryArg conf; cleanArgs = builtins.filter (x: x != null) allArgs; cleanArgsStr = lib.concatStringsSep "&" cleanArgs; diff --git a/nixos/modules/services/security/sks.nix b/nixos/modules/services/security/sks.nix index fbe1a7b86f91..e93408be1cf2 100644 --- a/nixos/modules/services/security/sks.nix +++ b/nixos/modules/services/security/sks.nix @@ -114,7 +114,7 @@ in systemd.services = let hkpAddress = "'" + (builtins.concatStringsSep " " cfg.hkpAddress) + "'"; - hkpPort = builtins.toString cfg.hkpPort; + hkpPort = toString cfg.hkpPort; in { sks-db = { diff --git a/nixos/modules/services/system/nix-daemon-firewall.nix b/nixos/modules/services/system/nix-daemon-firewall.nix index 9c3945d3c9ef..d3f89cc50c06 100644 --- a/nixos/modules/services/system/nix-daemon-firewall.nix +++ b/nixos/modules/services/system/nix-daemon-firewall.nix @@ -117,14 +117,14 @@ in # TCP ${lib.optionalString (cfg.allowedTCPPorts != [ ]) '' - tcp dport { ${lib.concatStringsSep ", " (map builtins.toString cfg.allowedTCPPorts)} } accept + tcp dport { ${lib.concatStringsSep ", " (map toString cfg.allowedTCPPorts)} } accept ip protocol tcp counter drop ip6 nexthdr tcp counter drop ''} # UDP ${lib.optionalString (cfg.allowedUDPPorts != [ ]) '' - udp dport { ${lib.concatStringsSep ", " (map builtins.toString cfg.allowedUDPPorts)} } accept + udp dport { ${lib.concatStringsSep ", " (map toString cfg.allowedUDPPorts)} } accept ip protocol udp counter drop ip6 nexthdr udp counter drop ''} diff --git a/nixos/modules/services/web-apps/akkoma.nix b/nixos/modules/services/web-apps/akkoma.nix index 250f799718ab..c351c87e72a8 100644 --- a/nixos/modules/services/web-apps/akkoma.nix +++ b/nixos/modules/services/web-apps/akkoma.nix @@ -965,12 +965,12 @@ in type = types.nonEmptyStr; default = if versionOlder config.system.stateVersion "24.05" then - "${httpConf.scheme}://${httpConf.host}:${builtins.toString httpConf.port}/media/" + "${httpConf.scheme}://${httpConf.host}:${toString httpConf.port}/media/" else null; defaultText = literalExpression '' if lib.versionOlder config.system.stateVersion "24.05" - then "$\{httpConf.scheme}://$\{httpConf.host}:$\{builtins.toString httpConf.port}/media/" + then "$\{httpConf.scheme}://$\{httpConf.host}:$\{toString httpConf.port}/media/" else null; ''; description = '' @@ -1019,12 +1019,12 @@ in type = types.nullOr types.nonEmptyStr; default = if versionOlder config.system.stateVersion "24.05" then - "${httpConf.scheme}://${httpConf.host}:${builtins.toString httpConf.port}" + "${httpConf.scheme}://${httpConf.host}:${toString httpConf.port}" else null; defaultText = literalExpression '' if lib.versionOlder config.system.stateVersion "24.05" - then "$\{httpConf.scheme}://$\{httpConf.host}:$\{builtins.toString httpConf.port}" + then "$\{httpConf.scheme}://$\{httpConf.host}:$\{toString httpConf.port}" else null; ''; description = '' diff --git a/nixos/modules/services/web-apps/artalk.nix b/nixos/modules/services/web-apps/artalk.nix index 34ae4d2e3a77..31de9b6a42fe 100644 --- a/nixos/modules/services/web-apps/artalk.nix +++ b/nixos/modules/services/web-apps/artalk.nix @@ -116,7 +116,7 @@ in User = cfg.user; Group = cfg.group; Type = "simple"; - ExecStart = "${lib.getExe cfg.package} server --config ${cfg.configFile} --workdir ${cfg.workdir} --host ${cfg.settings.host} --port ${builtins.toString cfg.settings.port}"; + ExecStart = "${lib.getExe cfg.package} server --config ${cfg.configFile} --workdir ${cfg.workdir} --host ${cfg.settings.host} --port ${toString cfg.settings.port}"; Restart = "on-failure"; RestartSec = "5s"; ConfigurationDirectory = [ "artalk" ]; diff --git a/nixos/modules/services/web-apps/cryptpad.nix b/nixos/modules/services/web-apps/cryptpad.nix index cc24766b4763..ddb7ad88119a 100644 --- a/nixos/modules/services/web-apps/cryptpad.nix +++ b/nixos/modules/services/web-apps/cryptpad.nix @@ -186,8 +186,8 @@ in RestrictSUIDSGID = true; RuntimeDirectoryMode = "700"; SocketBindAllow = [ - "tcp:${builtins.toString cfg.settings.httpPort}" - "tcp:${builtins.toString cfg.settings.websocketPort}" + "tcp:${toString cfg.settings.httpPort}" + "tcp:${toString cfg.settings.websocketPort}" ]; SocketBindDeny = [ "any" ]; StateDirectoryMode = "0700"; @@ -277,13 +277,13 @@ in enableACME = lib.mkDefault true; forceSSL = true; locations."/" = { - proxyPass = "http://${cfg.settings.httpAddress}:${builtins.toString cfg.settings.httpPort}"; + proxyPass = "http://${cfg.settings.httpAddress}:${toString cfg.settings.httpPort}"; extraConfig = '' client_max_body_size 150m; ''; }; locations."/cryptpad_websocket" = { - proxyPass = "http://${cfg.settings.httpAddress}:${builtins.toString cfg.settings.websocketPort}"; + proxyPass = "http://${cfg.settings.httpAddress}:${toString cfg.settings.websocketPort}"; proxyWebsockets = true; }; }; diff --git a/nixos/modules/services/web-apps/dex.nix b/nixos/modules/services/web-apps/dex.nix index 10fc56d1a855..68c047465081 100644 --- a/nixos/modules/services/web-apps/dex.nix +++ b/nixos/modules/services/web-apps/dex.nix @@ -13,7 +13,7 @@ let client: if client ? secretFile then ( - (builtins.removeAttrs client [ "secretFile" ]) + (removeAttrs client [ "secretFile" ]) // { secret = client.secretFile; } @@ -21,10 +21,10 @@ let else client; filteredSettings = mapAttrs ( - n: v: if n == "staticClients" then (builtins.map fixClient v) else v + n: v: if n == "staticClients" then (map fixClient v) else v ) cfg.settings; secretFiles = flatten ( - builtins.map (c: optional (c ? secretFile) c.secretFile) (cfg.settings.staticClients or [ ]) + map (c: optional (c ? secretFile) c.secretFile) (cfg.settings.staticClients or [ ]) ); settingsFormat = pkgs.formats.yaml { }; diff --git a/nixos/modules/services/web-apps/discourse.nix b/nixos/modules/services/web-apps/discourse.nix index 8a9bdedb67bb..db5e98b32eab 100644 --- a/nixos/modules/services/web-apps/discourse.nix +++ b/nixos/modules/services/web-apps/discourse.nix @@ -755,8 +755,8 @@ in cfg.package.rake ]; environment = cfg.package.runtimeEnv // { - UNICORN_TIMEOUT = builtins.toString cfg.unicornTimeout; - UNICORN_SIDEKIQS = builtins.toString cfg.sidekiqProcesses; + UNICORN_TIMEOUT = toString cfg.unicornTimeout; + UNICORN_SIDEKIQS = toString cfg.sidekiqProcesses; MALLOC_ARENA_MAX = "2"; }; diff --git a/nixos/modules/services/web-apps/filebrowser.nix b/nixos/modules/services/web-apps/filebrowser.nix index 749bdfc21227..0d0ce139cb10 100644 --- a/nixos/modules/services/web-apps/filebrowser.nix +++ b/nixos/modules/services/web-apps/filebrowser.nix @@ -140,7 +140,7 @@ in inherit (cfg) user group; mode = "0700"; }; - "${builtins.dirOf cfg.settings.database}".d = { + "${dirOf cfg.settings.database}".d = { inherit (cfg) user group; mode = "0700"; }; diff --git a/nixos/modules/services/web-apps/haven.nix b/nixos/modules/services/web-apps/haven.nix index d67a201b43f4..10ca23d895dd 100644 --- a/nixos/modules/services/web-apps/haven.nix +++ b/nixos/modules/services/web-apps/haven.nix @@ -6,7 +6,7 @@ }: let # Load default values from package. See https://github.com/bitvora/haven/blob/master/.env.example - defaultSettings = builtins.fromTOML (builtins.readFile "${cfg.package}/share/haven/.env.example"); + defaultSettings = fromTOML (builtins.readFile "${cfg.package}/share/haven/.env.example"); import_relays_file = "${pkgs.writeText "import_relays.json" (builtins.toJSON cfg.importRelays)}"; blastr_relays_file = "${pkgs.writeText "blastr_relays.json" (builtins.toJSON cfg.blastrRelays)}"; diff --git a/nixos/modules/services/web-apps/healthchecks.nix b/nixos/modules/services/web-apps/healthchecks.nix index eec40a8a07f9..80f10b4af6af 100644 --- a/nixos/modules/services/web-apps/healthchecks.nix +++ b/nixos/modules/services/web-apps/healthchecks.nix @@ -19,7 +19,7 @@ let PYTHONPATH = pkg.pythonPath; STATIC_ROOT = cfg.dataDir + "/static"; } - // lib.filterAttrs (_: v: !builtins.isNull v) cfg.settings; + // lib.filterAttrs (_: v: !isNull v) cfg.settings; environmentFile = pkgs.writeText "healthchecks-environment" ( lib.generators.toKeyValue { } environment diff --git a/nixos/modules/services/web-apps/ifm.nix b/nixos/modules/services/web-apps/ifm.nix index 77ee0010c694..2b081a137f6d 100644 --- a/nixos/modules/services/web-apps/ifm.nix +++ b/nixos/modules/services/web-apps/ifm.nix @@ -65,7 +65,7 @@ in StandardOutput = "journal"; BindPaths = "${cfg.dataDir}:/data"; PrivateTmp = true; - ExecStart = "${lib.getExe pkgs.ifm-web} ${lib.escapeShellArg cfg.listenAddress} ${builtins.toString cfg.port} /data"; + ExecStart = "${lib.getExe pkgs.ifm-web} ${lib.escapeShellArg cfg.listenAddress} ${toString cfg.port} /data"; }; }; }; diff --git a/nixos/modules/services/web-apps/immich-public-proxy.nix b/nixos/modules/services/web-apps/immich-public-proxy.nix index 817c79bd534c..6f4bb22d5c4d 100644 --- a/nixos/modules/services/web-apps/immich-public-proxy.nix +++ b/nixos/modules/services/web-apps/immich-public-proxy.nix @@ -53,7 +53,7 @@ in wantedBy = [ "multi-user.target" ]; environment = { IMMICH_URL = cfg.immichUrl; - IPP_PORT = builtins.toString cfg.port; + IPP_PORT = toString cfg.port; IPP_CONFIG = "${format.generate "config.json" cfg.settings}"; }; serviceConfig = { diff --git a/nixos/modules/services/web-apps/invidious.nix b/nixos/modules/services/web-apps/invidious.nix index 29ec8c8ef9b1..6293f69acbc3 100644 --- a/nixos/modules/services/web-apps/invidious.nix +++ b/nixos/modules/services/web-apps/invidious.nix @@ -127,7 +127,7 @@ let serviceConfig = { systemd.services = builtins.listToAttrs ( builtins.genList (scaleIndex: { - name = "invidious" + lib.optionalString (scaleIndex > 0) "-${builtins.toString scaleIndex}"; + name = "invidious" + lib.optionalString (scaleIndex > 0) "-${toString scaleIndex}"; value = mkInvidiousService scaleIndex; }) cfg.serviceScale ); diff --git a/nixos/modules/services/web-apps/jirafeau.nix b/nixos/modules/services/web-apps/jirafeau.nix index 6065432b8976..c1accf047c10 100644 --- a/nixos/modules/services/web-apps/jirafeau.nix +++ b/nixos/modules/services/web-apps/jirafeau.nix @@ -19,7 +19,7 @@ let $cfg['admin_password'] = '${cfg.adminPasswordSha256}'; $cfg['web_root'] = 'http://${withTrailingSlash cfg.hostName}'; $cfg['var_root'] = '${withTrailingSlash cfg.dataDir}'; - $cfg['maximal_upload_size'] = ${builtins.toString cfg.maxUploadSizeMegabytes}; + $cfg['maximal_upload_size'] = ${toString cfg.maxUploadSizeMegabytes}; $cfg['installation_done'] = true; ${cfg.extraConfig} diff --git a/nixos/modules/services/web-apps/keycloak.nix b/nixos/modules/services/web-apps/keycloak.nix index 66a501c5c267..31ee97320492 100644 --- a/nixos/modules/services/web-apps/keycloak.nix +++ b/nixos/modules/services/web-apps/keycloak.nix @@ -701,7 +701,7 @@ in mkTarget = file: let - baseName = builtins.baseNameOf file; + baseName = baseNameOf file; name = if lib.hasSuffix ".json" baseName then baseName else "${baseName}.json"; in "/run/keycloak/data/import/${name}"; diff --git a/nixos/modules/services/web-apps/komga.nix b/nixos/modules/services/web-apps/komga.nix index eac2e0a23ecb..4ae3c07ffe10 100644 --- a/nixos/modules/services/web-apps/komga.nix +++ b/nixos/modules/services/web-apps/komga.nix @@ -111,7 +111,7 @@ in inherit (cfg) user group; }; "${cfg.stateDir}/application.yml"."L+" = { - argument = builtins.toString (settingsFormat.generate "application.yml" cfg.settings); + argument = toString (settingsFormat.generate "application.yml" cfg.settings); }; }; diff --git a/nixos/modules/services/web-apps/librechat.nix b/nixos/modules/services/web-apps/librechat.nix index a1cfd2e67559..95f684a491f6 100644 --- a/nixos/modules/services/web-apps/librechat.nix +++ b/nixos/modules/services/web-apps/librechat.nix @@ -205,7 +205,7 @@ in Type = "simple"; User = cfg.user; Group = cfg.group; - StateDirectory = builtins.baseNameOf cfg.dataDir; + StateDirectory = baseNameOf cfg.dataDir; WorkingDirectory = cfg.dataDir; LoadCredential = getLoadCredentialList; EnvironmentFile = cfg.credentialsFile; diff --git a/nixos/modules/services/web-apps/mastodon.nix b/nixos/modules/services/web-apps/mastodon.nix index 9d71b8112cf4..8021abb42ede 100644 --- a/nixos/modules/services/web-apps/mastodon.nix +++ b/nixos/modules/services/web-apps/mastodon.nix @@ -160,7 +160,7 @@ let name: processCfg: lib.nameValuePair "mastodon-sidekiq-${name}" ( let - jobClassArgs = toString (builtins.map (c: "-q ${c}") processCfg.jobClasses); + jobClassArgs = toString (map (c: "-q ${c}") processCfg.jobClasses); jobClassLabel = toString ([ "" ] ++ processCfg.jobClasses); threads = toString (if processCfg.threads == null then cfg.sidekiqThreads else processCfg.threads); in diff --git a/nixos/modules/services/web-apps/mealie.nix b/nixos/modules/services/web-apps/mealie.nix index 1b22fcfd35c8..e692865cb6c2 100644 --- a/nixos/modules/services/web-apps/mealie.nix +++ b/nixos/modules/services/web-apps/mealie.nix @@ -96,7 +96,7 @@ in DynamicUser = true; User = "mealie"; ExecStartPre = "${pkg}/libexec/init_db"; - ExecStart = "${lib.getExe pkg} -b ${cfg.listenAddress}:${builtins.toString cfg.port} ${lib.escapeShellArgs cfg.extraOptions}"; + ExecStart = "${lib.getExe pkg} -b ${cfg.listenAddress}:${toString cfg.port} ${lib.escapeShellArgs cfg.extraOptions}"; EnvironmentFile = lib.mkIf (cfg.credentialsFile != null) cfg.credentialsFile; StateDirectory = "mealie"; StandardOutput = "journal"; diff --git a/nixos/modules/services/web-apps/movim.nix b/nixos/modules/services/web-apps/movim.nix index 766798dd0602..8ba9c66c6750 100644 --- a/nixos/modules/services/web-apps/movim.nix +++ b/nixos/modules/services/web-apps/movim.nix @@ -111,7 +111,7 @@ let inherit (cfg.precompressStaticFiles) brotli gzip; findTextFileNames = lib.concatStringsSep " -o " ( - builtins.map (n: ''-iname "*.${n}"'') [ + map (n: ''-iname "*.${n}"'') [ "css" "ini" "js" @@ -129,7 +129,7 @@ let echo -n "Precompressing static files with Brotli …" find ${appDir}/public -type f ${findTextFileNames} -print0 \ | xargs -0 -P$NIX_BUILD_CORES -n1 -I{} \ - ${lib.getExe brotli.package} --keep --quality=${builtins.toString brotli.compressionLevel} --output={}.br {} + ${lib.getExe brotli.package} --keep --quality=${toString brotli.compressionLevel} --output={}.br {} echo " done." '' ) @@ -138,7 +138,7 @@ let echo -n "Precompressing static files with Gzip …" find ${appDir}/public -type f ${findTextFileNames} -print0 \ | xargs -0 -P$NIX_BUILD_CORES -n1 -I{} \ - ${lib.getExe gzip.package} -c -${builtins.toString gzip.compressionLevel} {} > {}.gz + ${lib.getExe gzip.package} -c -${toString gzip.compressionLevel} {} > {}.gz echo " done." '' ) @@ -653,7 +653,7 @@ in "/ws/" = { "proxy.preserve-host" = "ON"; "proxy.tunnel" = "ON"; - "proxy.reverse.url" = "http://${cfg.settings.DAEMON_INTERFACE}:${builtins.toString cfg.port}/"; + "proxy.reverse.url" = "http://${cfg.settings.DAEMON_INTERFACE}:${toString cfg.port}/"; }; "/" = { "file.dir" = "${package}/share/php/movim/public"; @@ -764,7 +764,7 @@ in }; "/ws/" = { priority = 900; - proxyPass = "http://${cfg.settings.DAEMON_INTERFACE}:${builtins.toString cfg.port}/"; + proxyPass = "http://${cfg.settings.DAEMON_INTERFACE}:${toString cfg.port}/"; proxyWebsockets = true; recommendedProxySettings = true; extraConfig = # nginx @@ -922,7 +922,7 @@ in ++ lib.optional (webServerService != null) webServerService; environment = { PUBLIC_URL = "//${cfg.domain}"; - WS_PORT = builtins.toString cfg.port; + WS_PORT = toString cfg.port; }; serviceConfig = { diff --git a/nixos/modules/services/web-apps/nextcloud.nix b/nixos/modules/services/web-apps/nextcloud.nix index 6e50d5e517a1..418198375bb8 100644 --- a/nixos/modules/services/web-apps/nextcloud.nix +++ b/nixos/modules/services/web-apps/nextcloud.nix @@ -1713,7 +1713,7 @@ in fastcgi_pass unix:${fpm.socket}; fastcgi_intercept_errors on; fastcgi_request_buffering ${if cfg.nginx.enableFastcgiRequestBuffering then "on" else "off"}; - fastcgi_read_timeout ${builtins.toString cfg.fastcgiTimeout}s; + fastcgi_read_timeout ${toString cfg.fastcgiTimeout}s; ''; }; "~ \\.(?:css|js|mjs|svg|gif|ico|jpg|jpeg|png|webp|wasm|tflite|map|html|ttf|bcmap|mp4|webm|ogg|flac)$".extraConfig = diff --git a/nixos/modules/services/web-apps/outline.nix b/nixos/modules/services/web-apps/outline.nix index e07c6492addc..3617aeff7272 100644 --- a/nixos/modules/services/web-apps/outline.nix +++ b/nixos/modules/services/web-apps/outline.nix @@ -696,12 +696,12 @@ in REDIS_URL = if cfg.redisUrl == "local" then localRedisUrl else cfg.redisUrl; URL = cfg.publicUrl; - PORT = builtins.toString cfg.port; + PORT = toString cfg.port; CDN_URL = cfg.cdnUrl; - FORCE_HTTPS = builtins.toString cfg.forceHttps; - ENABLE_UPDATES = builtins.toString cfg.enableUpdateCheck; - WEB_CONCURRENCY = builtins.toString cfg.concurrency; + FORCE_HTTPS = toString cfg.forceHttps; + ENABLE_UPDATES = toString cfg.enableUpdateCheck; + WEB_CONCURRENCY = toString cfg.concurrency; DEBUG = cfg.debugOutput; GOOGLE_ANALYTICS_ID = lib.optionalString (cfg.googleAnalyticsId != null) cfg.googleAnalyticsId; SENTRY_DSN = lib.optionalString (cfg.sentryDsn != null) cfg.sentryDsn; @@ -709,13 +709,13 @@ in TEAM_LOGO = lib.optionalString (cfg.logo != null) cfg.logo; DEFAULT_LANGUAGE = cfg.defaultLanguage; - RATE_LIMITER_ENABLED = builtins.toString cfg.rateLimiter.enable; - RATE_LIMITER_REQUESTS = builtins.toString cfg.rateLimiter.requests; - RATE_LIMITER_DURATION_WINDOW = builtins.toString cfg.rateLimiter.durationWindow; + RATE_LIMITER_ENABLED = toString cfg.rateLimiter.enable; + RATE_LIMITER_REQUESTS = toString cfg.rateLimiter.requests; + RATE_LIMITER_DURATION_WINDOW = toString cfg.rateLimiter.durationWindow; FILE_STORAGE = cfg.storage.storageType; - FILE_STORAGE_IMPORT_MAX_SIZE = builtins.toString cfg.maximumImportSize; - FILE_STORAGE_UPLOAD_MAX_SIZE = builtins.toString cfg.storage.uploadMaxSize; + FILE_STORAGE_IMPORT_MAX_SIZE = toString cfg.maximumImportSize; + FILE_STORAGE_UPLOAD_MAX_SIZE = toString cfg.storage.uploadMaxSize; FILE_STORAGE_LOCAL_ROOT_DIR = cfg.storage.localRootDir; } @@ -724,7 +724,7 @@ in AWS_REGION = cfg.storage.region; AWS_S3_UPLOAD_BUCKET_URL = cfg.storage.uploadBucketUrl; AWS_S3_UPLOAD_BUCKET_NAME = cfg.storage.uploadBucketName; - AWS_S3_FORCE_PATH_STYLE = builtins.toString cfg.storage.forcePathStyle; + AWS_S3_FORCE_PATH_STYLE = toString cfg.storage.forcePathStyle; AWS_S3_ACL = cfg.storage.acl; }) @@ -757,7 +757,7 @@ in (lib.mkIf (cfg.slackIntegration != null) { SLACK_APP_ID = cfg.slackIntegration.appId; - SLACK_MESSAGE_ACTIONS = builtins.toString cfg.slackIntegration.messageActions; + SLACK_MESSAGE_ACTIONS = toString cfg.slackIntegration.messageActions; }) (lib.mkIf (cfg.discordAuthentication != null) { @@ -768,12 +768,12 @@ in (lib.mkIf (cfg.smtp != null) { SMTP_HOST = cfg.smtp.host; - SMTP_PORT = builtins.toString cfg.smtp.port; + SMTP_PORT = toString cfg.smtp.port; SMTP_USERNAME = cfg.smtp.username; SMTP_FROM_EMAIL = cfg.smtp.fromEmail; SMTP_REPLY_EMAIL = cfg.smtp.replyEmail; SMTP_TLS_CIPHERS = cfg.smtp.tlsCiphers; - SMTP_SECURE = builtins.toString cfg.smtp.secure; + SMTP_SECURE = toString cfg.smtp.secure; }) ]; diff --git a/nixos/modules/services/web-apps/pgpkeyserver-lite.nix b/nixos/modules/services/web-apps/pgpkeyserver-lite.nix index 6e7fbf7e1353..67a4dcc0a7dc 100644 --- a/nixos/modules/services/web-apps/pgpkeyserver-lite.nix +++ b/nixos/modules/services/web-apps/pgpkeyserver-lite.nix @@ -61,7 +61,7 @@ in services.nginx.virtualHosts = let - hkpPort = builtins.toString cfg.hkpPort; + hkpPort = toString cfg.hkpPort; in { ${cfg.hostname} = { diff --git a/nixos/modules/services/web-apps/pict-rs.nix b/nixos/modules/services/web-apps/pict-rs.nix index 446360bc792b..ca58264404e3 100644 --- a/nixos/modules/services/web-apps/pict-rs.nix +++ b/nixos/modules/services/web-apps/pict-rs.nix @@ -87,7 +87,7 @@ in snippet should work: services.pict-rs.package = - (import (builtins.fetchTarball { + (import (fetchTarball { url = "https://github.com/NixOS/nixpkgs/archive/9b19f5e77dd906cb52dade0b7bd280339d2a1f3d.tar.gz"; sha256 = "sha256:0939vbhln9d33xkqw63nsk908k03fxihj85zaf70i3il9z42q8mc"; }) pkgs.config).pict-rs; diff --git a/nixos/modules/services/web-apps/plantuml-server.nix b/nixos/modules/services/web-apps/plantuml-server.nix index 39d5ffc92496..5045da9a89d5 100644 --- a/nixos/modules/services/web-apps/plantuml-server.nix +++ b/nixos/modules/services/web-apps/plantuml-server.nix @@ -108,7 +108,7 @@ in wantedBy = [ "multi-user.target" ]; environment = { - PLANTUML_LIMIT_SIZE = builtins.toString cfg.plantumlLimitSize; + PLANTUML_LIMIT_SIZE = toString cfg.plantumlLimitSize; GRAPHVIZ_DOT = "${cfg.graphvizPackage}/bin/dot"; PLANTUML_STATS = if cfg.plantumlStats then "on" else "off"; HTTP_AUTHORIZATION = cfg.httpAuthorization; @@ -120,7 +120,7 @@ in jetty.home=${cfg.packages.jetty} \ jetty.base=${cfg.package} \ jetty.http.host=${cfg.listenHost} \ - jetty.http.port=${builtins.toString cfg.listenPort} + jetty.http.port=${toString cfg.listenPort} ''; serviceConfig = { diff --git a/nixos/modules/services/web-apps/privatebin.nix b/nixos/modules/services/web-apps/privatebin.nix index 0d780a39a8fc..d498ffe3af71 100644 --- a/nixos/modules/services/web-apps/privatebin.nix +++ b/nixos/modules/services/web-apps/privatebin.nix @@ -17,9 +17,9 @@ let else if v == false then ''false'' else if builtins.isInt v then - ''${builtins.toString v}'' + ''${toString v}'' else if builtins.isPath v then - ''"${builtins.toString v}"'' + ''"${toString v}"'' else if builtins.isString v then ''"${v}"'' else @@ -167,7 +167,7 @@ in "pm.max_spare_servers" = lib.mkDefault 4; "pm.max_requests" = lib.mkDefault 500; }; - phpEnv.CONFIG_PATH = lib.strings.removeSuffix "/conf.php" (builtins.toString privatebinSettings); + phpEnv.CONFIG_PATH = lib.strings.removeSuffix "/conf.php" (toString privatebinSettings); }; services.nginx = lib.mkIf cfg.enableNginx { diff --git a/nixos/modules/services/web-apps/reposilite.nix b/nixos/modules/services/web-apps/reposilite.nix index 420f5eb923d8..d26034fc90ac 100644 --- a/nixos/modules/services/web-apps/reposilite.nix +++ b/nixos/modules/services/web-apps/reposilite.nix @@ -18,7 +18,7 @@ let if useEmbeddedDb then "${cfg.database.type} ${cfg.database.path}" else - "${cfg.database.type} ${cfg.database.host}:${builtins.toString cfg.database.port} ${cfg.database.dbname} ${cfg.database.user} $(<${cfg.database.passwordFile})"; + "${cfg.database.type} ${cfg.database.host}:${toString cfg.database.port} ${cfg.database.dbname} ${cfg.database.user} $(<${cfg.database.passwordFile})"; certDir = config.security.acme.certs.${cfg.useACMEHost}.directory; @@ -412,8 +412,8 @@ in ''; serviceConfig = lib.mkMerge [ - (lib.mkIf (builtins.dirOf cfg.workingDirectory == "/var/lib") { - StateDirectory = builtins.baseNameOf cfg.workingDirectory; + (lib.mkIf (dirOf cfg.workingDirectory == "/var/lib") { + StateDirectory = baseNameOf cfg.workingDirectory; StateDirectoryMode = "700"; }) { diff --git a/nixos/modules/services/web-apps/sillytavern.nix b/nixos/modules/services/web-apps/sillytavern.nix index 8983eca8055a..71045501193c 100644 --- a/nixos/modules/services/web-apps/sillytavern.nix +++ b/nixos/modules/services/web-apps/sillytavern.nix @@ -105,7 +105,7 @@ in Type = "simple"; ExecStart = let - f = x: name: lib.optional (x != null) "--${name}=${builtins.toString x}"; + f = x: name: lib.optional (x != null) "--${name}=${toString x}"; in lib.concatStringsSep " " ( [ diff --git a/nixos/modules/services/web-apps/weblate.nix b/nixos/modules/services/web-apps/weblate.nix index 2219c0d59a58..13b7bd85a7f7 100644 --- a/nixos/modules/services/web-apps/weblate.nix +++ b/nixos/modules/services/web-apps/weblate.nix @@ -96,7 +96,7 @@ let + lib.optionalString cfg.smtp.enable '' EMAIL_HOST = "${cfg.smtp.host}" EMAIL_USE_TLS = True - EMAIL_PORT = ${builtins.toString cfg.smtp.port} + EMAIL_PORT = ${toString cfg.smtp.port} SERVER_EMAIL = "${cfg.smtp.from}" DEFAULT_FROM_EMAIL = "${cfg.smtp.from}" '' diff --git a/nixos/modules/services/web-apps/windmill.nix b/nixos/modules/services/web-apps/windmill.nix index ee337acd5ed1..c94b706d2ed1 100644 --- a/nixos/modules/services/web-apps/windmill.nix +++ b/nixos/modules/services/web-apps/windmill.nix @@ -223,7 +223,7 @@ in }; environment = { - PORT = builtins.toString cfg.serverPort; + PORT = toString cfg.serverPort; WM_BASE_URL = cfg.baseUrl; RUST_LOG = cfg.logLevel; MODE = "server"; diff --git a/nixos/modules/services/web-servers/caddy/default.nix b/nixos/modules/services/web-servers/caddy/default.nix index 2277105069f8..83491c1f789e 100644 --- a/nixos/modules/services/web-servers/caddy/default.nix +++ b/nixos/modules/services/web-servers/caddy/default.nix @@ -183,12 +183,12 @@ in adapter = mkOption { default = - if ((cfg.configFile != configFile) || (builtins.baseNameOf cfg.configFile) == "Caddyfile") then + if ((cfg.configFile != configFile) || (baseNameOf cfg.configFile) == "Caddyfile") then "caddyfile" else null; defaultText = literalExpression '' - if ((cfg.configFile != configFile) || (builtins.baseNameOf cfg.configFile) == "Caddyfile") then "caddyfile" else null + if ((cfg.configFile != configFile) || (baseNameOf cfg.configFile) == "Caddyfile") then "caddyfile" else null ''; example = literalExpression "nginx"; type = with types; nullOr str; diff --git a/nixos/modules/services/web-servers/h2o/default.nix b/nixos/modules/services/web-servers/h2o/default.nix index 331c31fefc9b..72306ebd003d 100644 --- a/nixos/modules/services/web-servers/h2o/default.nix +++ b/nixos/modules/services/web-servers/h2o/default.nix @@ -121,7 +121,7 @@ let acmeChallengePath = "/.well-known/acme-challenge"; in { - "${names.server}:${builtins.toString acmePort}" = { + "${names.server}:${toString acmePort}" = { listen.port = acmePort; paths."${acmeChallengePath}/" = { "file.dir" = value.acme.root + acmeChallengePath; @@ -132,17 +132,17 @@ let httpSettings = lib.optionalAttrs (value.tls == null || value.tls.policy == "add") { - "${names.server}:${builtins.toString port.HTTP}" = value.settings // { + "${names.server}:${toString port.HTTP}" = value.settings // { listen.port = port.HTTP; }; } // lib.optionalAttrs (value.tls != null && value.tls.policy == "force") { - "${names.server}:${builtins.toString port.HTTP}" = { + "${names.server}:${toString port.HTTP}" = { listen.port = port.HTTP; paths."/" = { redirect = { status = value.tls.redirectCode; - url = "https://${names.server}:${builtins.toString port.TLS}"; + url = "https://${names.server}:${toString port.TLS}"; }; }; }; @@ -159,7 +159,7 @@ let ] ) { - "${names.server}:${builtins.toString port.TLS}" = + "${names.server}:${toString port.TLS}" = let tlsRecommendations = lib.attrByPath [ "tls" "recommendations" ] cfg.defaultTLSRecommendations value; @@ -208,7 +208,7 @@ let let headerSet = value.settings."header.set" or [ ]; recs = mozTLSRecs.${tlsRecommendations}; - hsts = "Strict-Transport-Security: max-age=${builtins.toString recs.hsts_min_age}; includeSubDomains; preload"; + hsts = "Strict-Transport-Security: max-age=${toString recs.hsts_min_age}; includeSubDomains; preload"; in { "header.set" = @@ -409,7 +409,7 @@ in ''; } ] - ++ builtins.map ( + ++ map ( name: mkCertOwnershipAssertion { cert = certs.${name}; @@ -436,11 +436,11 @@ in wantedBy = [ "multi-user.target" ]; wants = lib.concatLists (map (certName: [ "acme-${certName}.service" ]) acmeCertNames.all); # Since H2O will be hosting the challenges, H2O must be started - before = builtins.map (certName: "acme-order-renew-${certName}.service") acmeCertNames.all; + before = map (certName: "acme-order-renew-${certName}.service") acmeCertNames.all; after = [ "network.target" ] - ++ builtins.map (certName: "acme-${certName}.service") acmeCertNames.all; + ++ map (certName: "acme-${certName}.service") acmeCertNames.all; serviceConfig = { ExecStart = "${h2oExe} --mode 'master'"; diff --git a/nixos/modules/services/web-servers/stargazer.nix b/nixos/modules/services/web-servers/stargazer.nix index 4af08aeba0c1..299f7b11082f 100644 --- a/nixos/modules/services/web-servers/stargazer.nix +++ b/nixos/modules/services/web-servers/stargazer.nix @@ -31,7 +31,7 @@ let section: let name = section.route; - params = builtins.removeAttrs section [ "route" ]; + params = removeAttrs section [ "route" ]; in genINI { "${name}" = params; diff --git a/nixos/modules/services/web-servers/tomcat.nix b/nixos/modules/services/web-servers/tomcat.nix index deff4f7f821b..db3b3ac8d90f 100644 --- a/nixos/modules/services/web-servers/tomcat.nix +++ b/nixos/modules/services/web-servers/tomcat.nix @@ -425,8 +425,8 @@ in "CATALINA_BASE=${cfg.baseDir}" "CATALINA_PID=/run/tomcat/tomcat.pid" "JAVA_HOME='${cfg.jdk}'" - "JAVA_OPTS='${builtins.toString cfg.javaOpts}'" - "CATALINA_OPTS='${builtins.toString cfg.catalinaOpts}'" + "JAVA_OPTS='${toString cfg.javaOpts}'" + "CATALINA_OPTS='${toString cfg.catalinaOpts}'" ] ++ cfg.extraEnvironment; ExecStart = "${tomcat}/bin/startup.sh"; diff --git a/nixos/modules/services/x11/desktop-managers/phosh.nix b/nixos/modules/services/x11/desktop-managers/phosh.nix index 3013cc8a79e0..36d8a6331807 100644 --- a/nixos/modules/services/x11/desktop-managers/phosh.nix +++ b/nixos/modules/services/x11/desktop-managers/phosh.nix @@ -95,7 +95,7 @@ let }; }; - optionalKV = k: v: lib.optionalString (v != null) "${k} = ${builtins.toString v}"; + optionalKV = k: v: lib.optionalString (v != null) "${k} = ${toString v}"; renderPhocOutput = name: output: diff --git a/nixos/modules/services/x11/desktop-managers/surf-display.nix b/nixos/modules/services/x11/desktop-managers/surf-display.nix index 519388cf11a5..c4c6f37b2fff 100644 --- a/nixos/modules/services/x11/desktop-managers/surf-display.nix +++ b/nixos/modules/services/x11/desktop-managers/surf-display.nix @@ -25,7 +25,7 @@ let # Setting for internal inactivity timer to restart surf-display # if the user goes inactive/idle. - INACTIVITY_INTERVAL="${builtins.toString cfg.inactivityInterval}" + INACTIVITY_INTERVAL="${toString cfg.inactivityInterval}" # log to syslog instead of .xsession-errors LOG_TO_SYSLOG="yes" diff --git a/nixos/modules/system/boot/initrd-ssh.nix b/nixos/modules/system/boot/initrd-ssh.nix index d43ce5960e11..7e53a7d93b7d 100644 --- a/nixos/modules/system/boot/initrd-ssh.nix +++ b/nixos/modules/system/boot/initrd-ssh.nix @@ -165,7 +165,7 @@ in path else let - name = builtins.baseNameOf path; + name = baseNameOf path; in builtins.unsafeDiscardStringContext ("/etc/ssh/" + substring 1 (stringLength name) name); diff --git a/nixos/modules/system/boot/luksroot.nix b/nixos/modules/system/boot/luksroot.nix index efc04ad75abc..e925a1e7d2d0 100644 --- a/nixos/modules/system/boot/luksroot.nix +++ b/nixos/modules/system/boot/luksroot.nix @@ -602,7 +602,7 @@ let ++ optional (v.header != null) "header=${v.header}" ++ optional (v.keyFileOffset != null) "keyfile-offset=${toString v.keyFileOffset}" ++ optional (v.keyFileSize != null) "keyfile-size=${toString v.keyFileSize}" - ++ optional (v.keyFileTimeout != null) "keyfile-timeout=${builtins.toString v.keyFileTimeout}s" + ++ optional (v.keyFileTimeout != null) "keyfile-timeout=${toString v.keyFileTimeout}s" ++ optional (v.tryEmptyPassphrase) "try-empty-password=true"; in "${n} ${v.device} ${if v.keyFile == null then "-" else v.keyFile} ${lib.concatStringsSep "," opts}" diff --git a/nixos/modules/system/boot/systemd/initrd.nix b/nixos/modules/system/boot/systemd/initrd.nix index 04c814b7ec6e..53a73641f245 100644 --- a/nixos/modules/system/boot/systemd/initrd.nix +++ b/nixos/modules/system/boot/systemd/initrd.nix @@ -583,7 +583,7 @@ in "${pkgs.bashNonInteractive}/bin" ] ++ jobScripts - ++ map (c: builtins.removeAttrs c [ "text" ]) (builtins.attrValues cfg.contents) + ++ map (c: removeAttrs c [ "text" ]) (builtins.attrValues cfg.contents) ++ lib.optional (pkgs.stdenv.hostPlatform.libc == "glibc") "${pkgs.glibc}/lib/libnss_files.so.2"; targets.initrd.aliases = [ "default.target" ]; diff --git a/nixos/modules/system/boot/systemd/shutdown.nix b/nixos/modules/system/boot/systemd/shutdown.nix index 754e38b9714d..def2057c865e 100644 --- a/nixos/modules/system/boot/systemd/shutdown.nix +++ b/nixos/modules/system/boot/systemd/shutdown.nix @@ -65,7 +65,7 @@ in ++ lib.optionals cfg.shell.enable [ pkgs.runtimeShell ] - ++ map (c: builtins.removeAttrs c [ "text" ]) (builtins.attrValues cfg.contents); + ++ map (c: removeAttrs c [ "text" ]) (builtins.attrValues cfg.contents); systemd.mounts = [ { diff --git a/nixos/modules/system/boot/systemd/sysusers.nix b/nixos/modules/system/boot/systemd/sysusers.nix index c2d8b7cc373e..e3b0f2656b6a 100644 --- a/nixos/modules/system/boot/systemd/sysusers.nix +++ b/nixos/modules/system/boot/systemd/sysusers.nix @@ -152,7 +152,7 @@ in # systemd-sysusers cannot find it when we also pass another flag. ExecStart = lib.mkIf immutableEtc [ "" - "${config.systemd.package}/bin/systemd-sysusers --root ${builtins.dirOf immutablePasswordFilesLocation} /etc/sysusers.d/00-nixos.conf" + "${config.systemd.package}/bin/systemd-sysusers --root ${dirOf immutablePasswordFilesLocation} /etc/sysusers.d/00-nixos.conf" ]; # Make the source files writable before executing sysusers. diff --git a/nixos/modules/system/boot/uki.nix b/nixos/modules/system/boot/uki.nix index 692261d512dd..fa12c63b751a 100644 --- a/nixos/modules/system/boot/uki.nix +++ b/nixos/modules/system/boot/uki.nix @@ -101,7 +101,7 @@ in name = config.boot.uki.name; version = config.boot.uki.version; versionInfix = if version != null then "_${version}" else ""; - triesInfix = if cfg.tries != null then "+${builtins.toString cfg.tries}" else ""; + triesInfix = if cfg.tries != null then "+${toString cfg.tries}" else ""; in name + versionInfix + triesInfix + ".efi"; diff --git a/nixos/modules/virtualisation/azure-common.nix b/nixos/modules/virtualisation/azure-common.nix index 55c6c706b017..d75eff323575 100644 --- a/nixos/modules/virtualisation/azure-common.nix +++ b/nixos/modules/virtualisation/azure-common.nix @@ -60,7 +60,7 @@ in linkConfig.Unmanaged = "yes"; }; networking.networkmanager.unmanaged = lib.mkIf cfg.acceleratedNetworking ( - builtins.map (drv: "driver:${drv}") mlxDrivers + map (drv: "driver:${drv}") mlxDrivers ); # Allow root logins only using the SSH key that the user specified diff --git a/nixos/modules/virtualisation/nixos-containers.nix b/nixos/modules/virtualisation/nixos-containers.nix index ce86487bbbc3..8a46d022633a 100644 --- a/nixos/modules/virtualisation/nixos-containers.nix +++ b/nixos/modules/virtualisation/nixos-containers.nix @@ -1044,7 +1044,7 @@ in serviceConfig = serviceDirectives containerConfig; unitConfig.RequiresMountsFor = lib.optional (!containerConfig.ephemeral) "${stateDirectory}/%i" - ++ builtins.map (d: if d.hostPath != null then d.hostPath else d.mountPoint) ( + ++ map (d: if d.hostPath != null then d.hostPath else d.mountPoint) ( builtins.attrValues cfg.bindMounts ); environment.root = diff --git a/nixos/modules/virtualisation/oci-containers.nix b/nixos/modules/virtualisation/oci-containers.nix index 5b3576c97acd..be9ff405a4cc 100644 --- a/nixos/modules/virtualisation/oci-containers.nix +++ b/nixos/modules/virtualisation/oci-containers.nix @@ -555,7 +555,7 @@ in backend = "docker"; containers = lib.mapAttrs ( n: v: - builtins.removeAttrs ( + removeAttrs ( v // { extraOptions = v.extraDockerOptions or [ ]; diff --git a/nixos/modules/virtualisation/proxmox-image.nix b/nixos/modules/virtualisation/proxmox-image.nix index d3babb785fdd..a1582e404c9f 100644 --- a/nixos/modules/virtualisation/proxmox-image.nix +++ b/nixos/modules/virtualisation/proxmox-image.nix @@ -213,7 +213,7 @@ with lib; let cfg = config.proxmox; cfgLine = name: value: '' - ${name}: ${builtins.toString value} + ${name}: ${toString value} ''; virtio0Storage = builtins.head (builtins.split ":" cfg.qemuConf.virtio0); cfgFile = diff --git a/nixos/modules/virtualisation/qemu-vm.nix b/nixos/modules/virtualisation/qemu-vm.nix index 8a6c55cfc9fa..3be38c02085d 100644 --- a/nixos/modules/virtualisation/qemu-vm.nix +++ b/nixos/modules/virtualisation/qemu-vm.nix @@ -300,7 +300,7 @@ let idx: { size, ... }: '' - test -e "empty${builtins.toString idx}.qcow2" || ${qemu}/bin/qemu-img create -f qcow2 "empty${builtins.toString idx}.qcow2" "${builtins.toString size}M" + test -e "empty${toString idx}.qcow2" || ${qemu}/bin/qemu-img create -f qcow2 "empty${toString idx}.qcow2" "${toString size}M" '' )) (builtins.concatStringsSep "") diff --git a/nixos/release-combined.nix b/nixos/release-combined.nix index 6730a9faa4d8..f2bad26fcde8 100644 --- a/nixos/release-combined.nix +++ b/nixos/release-combined.nix @@ -26,7 +26,7 @@ let set: if builtins.isAttrs set then if (set.type or "") == "derivation" then - set // { meta = builtins.removeAttrs (set.meta or { }) [ "maintainers" ]; } + set // { meta = removeAttrs (set.meta or { }) [ "maintainers" ]; } else pkgs.lib.mapAttrs (n: v: removeMaintainers v) set else @@ -43,7 +43,7 @@ rec { } ); - nixpkgs = builtins.removeAttrs (removeMaintainers ( + nixpkgs = removeAttrs (removeMaintainers ( import ../pkgs/top-level/release.nix { inherit supportedSystems; nixpkgs = nixpkgsSrc; diff --git a/nixos/release-small.nix b/nixos/release-small.nix index 5a845d34f41b..58f5d413feb7 100644 --- a/nixos/release-small.nix +++ b/nixos/release-small.nix @@ -32,7 +32,7 @@ let nixpkgs = nixpkgsSrc; }; - nixpkgs' = builtins.removeAttrs (import ../pkgs/top-level/release.nix { + nixpkgs' = removeAttrs (import ../pkgs/top-level/release.nix { inherit supportedSystems; nixpkgs = nixpkgsSrc; }) [ "unstable" ]; diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix index 957882749b9a..52b10f309d1c 100644 --- a/nixos/tests/all-tests.nix +++ b/nixos/tests/all-tests.nix @@ -118,7 +118,7 @@ let findTests = tree: if tree ? recurseForDerivations && tree.recurseForDerivations then - mapAttrs (k: findTests) (builtins.removeAttrs tree [ "recurseForDerivations" ]) + mapAttrs (k: findTests) (removeAttrs tree [ "recurseForDerivations" ]) else callTest tree; diff --git a/nixos/tests/benchexec.nix b/nixos/tests/benchexec.nix index 25e53179bf5a..40b6575ad428 100644 --- a/nixos/tests/benchexec.nix +++ b/nixos/tests/benchexec.nix @@ -18,7 +18,7 @@ in { ... }: let runexec = lib.getExe' pkgs.benchexec "runexec"; - echo = builtins.toString pkgs.benchexec; + echo = toString pkgs.benchexec; test = lib.getExe ( pkgs.writeShellApplication rec { name = "test"; diff --git a/nixos/tests/ceph-single-node-bluestore-dmcrypt.nix b/nixos/tests/ceph-single-node-bluestore-dmcrypt.nix index 3cd8c799c1a2..8ab8cbba3a62 100644 --- a/nixos/tests/ceph-single-node-bluestore-dmcrypt.nix +++ b/nixos/tests/ceph-single-node-bluestore-dmcrypt.nix @@ -139,7 +139,7 @@ in }; in lib.pipe config.services.ceph.osd.daemons [ - (builtins.map map-osd) + (map map-osd) builtins.listToAttrs ]; }; diff --git a/nixos/tests/common/acme/server/default.nix b/nixos/tests/common/acme/server/default.nix index 0786af59e60b..9622b6487130 100644 --- a/nixos/tests/common/acme/server/default.nix +++ b/nixos/tests/common/acme/server/default.nix @@ -89,8 +89,7 @@ in ( cfg: lib.attrsets.mapAttrsToList ( - domain: cfg: - builtins.map (builtins.replaceStrings [ "*." ] [ "" ]) ([ domain ] ++ cfg.extraDomainNames) + domain: cfg: map (builtins.replaceStrings [ "*." ] [ "" ]) ([ domain ] ++ cfg.extraDomainNames) ) cfg.configuration.security.acme.certs ) # A specialisation's config is nested under its configuration attribute. @@ -99,7 +98,7 @@ in ) ); in - builtins.listToAttrs (builtins.map (ip: lib.attrsets.nameValuePair ip names) ips) + builtins.listToAttrs (map (ip: lib.attrsets.nameValuePair ip names) ips) ) nodes; }; diff --git a/nixos/tests/devpi-server.nix b/nixos/tests/devpi-server.nix index 723499941654..093e381570f9 100644 --- a/nixos/tests/devpi-server.nix +++ b/nixos/tests/devpi-server.nix @@ -34,8 +34,8 @@ in testScript = '' start_all() devpi.wait_for_unit("devpi-server.service") - devpi.wait_for_open_port(${builtins.toString server-port}) + devpi.wait_for_open_port(${toString server-port}) - client1.succeed("devpi getjson http://devpi:${builtins.toString server-port}") + client1.succeed("devpi getjson http://devpi:${toString server-port}") ''; } diff --git a/nixos/tests/ergochat.nix b/nixos/tests/ergochat.nix index e55215aab65f..69fce2fe5396 100644 --- a/nixos/tests/ergochat.nix +++ b/nixos/tests/ergochat.nix @@ -25,7 +25,7 @@ in }; } // lib.listToAttrs ( - builtins.map ( + map ( client: lib.nameValuePair client { imports = [ @@ -83,7 +83,7 @@ in '' # check that all greetings arrived on all clients ] - ++ builtins.map (other: '' + ++ map (other: '' ${client}.succeed( "grep '${msg other}$' ${iiDir}/${server}/#${channel}/out" ) @@ -101,5 +101,5 @@ in # entry is executed by every client before advancing # to the next one. '' - + lib.concatStrings (reduce (lib.zipListsWith (cs: c: cs + c)) (builtins.map clientScript clients)); + + lib.concatStrings (reduce (lib.zipListsWith (cs: c: cs + c)) (map clientScript clients)); } diff --git a/nixos/tests/fsck.nix b/nixos/tests/fsck.nix index c5fcf80699e3..52ca33093146 100644 --- a/nixos/tests/fsck.nix +++ b/nixos/tests/fsck.nix @@ -27,10 +27,7 @@ with subtest("root fs is fsckd"): machine.succeed("journalctl -b | grep '${ - if systemdStage1 then - "fsck.*${builtins.baseNameOf rootDevice}.*clean" - else - "fsck.ext4.*${rootDevice}" + if systemdStage1 then "fsck.*${baseNameOf rootDevice}.*clean" else "fsck.ext4.*${rootDevice}" }'") with subtest("mnt fs is fsckd"): diff --git a/nixos/tests/galene.nix b/nixos/tests/galene.nix index 3918e1048147..7d3a3eabd422 100644 --- a/nixos/tests/galene.nix +++ b/nixos/tests/galene.nix @@ -57,17 +57,17 @@ in with subtest("galene starts"): # Starts? machine.wait_for_unit("galene") - machine.wait_for_open_port(${builtins.toString galenePort}) + machine.wait_for_open_port(${toString galenePort}) # Reponds fine? - machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}' >&2") + machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}' >&2") machine.succeed("cp -v /etc/${galeneTestGroupFile} ${galeneTestGroupsDir}/test.json >&2") - machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}/group/test/' >&2") + machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}/group/test/' >&2") with subtest("galene can join group"): # Open site - machine.succeed("firefox --new-window 'http://localhost:${builtins.toString galenePort}/group/test/' >&2 &") + machine.succeed("firefox --new-window 'http://localhost:${toString galenePort}/group/test/' >&2 &") # Note: Firefox doesn't use a regular "-" in the window title, but "—" (Hex: 0xe2 0x80 0x94) machine.wait_for_window("Test — Mozilla Firefox") machine.send_key("ctrl-minus") @@ -141,17 +141,17 @@ in with subtest("galene starts"): # Starts? machine.wait_for_unit("galene") - machine.wait_for_open_port(${builtins.toString galenePort}) + machine.wait_for_open_port(${toString galenePort}) # Reponds fine? - machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}' >&2") + machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}' >&2") machine.succeed("cp -v /etc/${galeneTestGroupFile} ${galeneTestGroupsDir}/test.json >&2") - machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}/group/test/' >&2") + machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}/group/test/' >&2") with subtest("galene can join group"): # Open site - machine.succeed("firefox --new-window 'http://localhost:${builtins.toString galenePort}/group/test/' >&2 &") + machine.succeed("firefox --new-window 'http://localhost:${toString galenePort}/group/test/' >&2 &") # Note: Firefox doesn't use a regular "-" in the window title, but "—" (Hex: 0xe2 0x80 0x94) machine.wait_for_window("Test — Mozilla Firefox") machine.send_key("ctrl-minus") @@ -176,7 +176,7 @@ in machine.succeed( "galene-file-transfer " + "-to '${galeneTestGroupAdminName}' " - + "-insecure 'http://localhost:${builtins.toString galenePort}/group/test/' " + + "-insecure 'http://localhost:${toString galenePort}/group/test/' " + "${galeneTestGroupsDir}/test.json " # just try sending the groups file + " >&2 &" ) @@ -276,20 +276,20 @@ in with subtest("galene starts"): # Starts? machine.wait_for_unit("galene") - machine.wait_for_open_port(${builtins.toString galenePort}) + machine.wait_for_open_port(${toString galenePort}) # Reponds fine? - machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}' >&2") + machine.succeed("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}' >&2") machine.succeed("cp -v /etc/${galeneTestGroupFile} ${galeneTestGroupsDir}/test.json >&2") - machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${builtins.toString galenePort}/group/test/' >&2") + machine.wait_until_succeeds("curl -s -D - -o /dev/null 'http://localhost:${toString galenePort}/group/test/' >&2") with subtest("galene-stream works"): # Start interface for stream data machine.succeed( "galene-stream " - + "--input 'srt://localhost:${builtins.toString galeneStreamSrtPort}?mode=listener' " - + "--insecure --output 'http://localhost:${builtins.toString galenePort}/group/test/' " + + "--input 'srt://localhost:${toString galeneStreamSrtPort}?mode=listener' " + + "--insecure --output 'http://localhost:${toString galenePort}/group/test/' " + "--username ${galeneTestGroupBotName} --password ${galeneTestGroupBotPassword} " + ">&2 &" ) @@ -304,13 +304,13 @@ in + "-c:a mp2 " # stream audio codec + "-c:v libx264 -pix_fmt yuv420p " # stream video codec + "-f mpegts " # stream format - + "'srt://localhost:${builtins.toString galeneStreamSrtPort}' " + + "'srt://localhost:${toString galeneStreamSrtPort}' " + ">/dev/null 2>&1 &" ) machine.wait_for_console_text("Setting remote session description") # Open site - machine.succeed("firefox --new-window 'http://localhost:${builtins.toString galenePort}/group/test/' >&2 &") + machine.succeed("firefox --new-window 'http://localhost:${toString galenePort}/group/test/' >&2 &") # Note: Firefox doesn't use a regular "-" in the window title, but "—" (Hex: 0xe2 0x80 0x94) machine.wait_for_window("Test — Mozilla Firefox") machine.send_key("ctrl-minus") diff --git a/nixos/tests/gitlab/runner/podman-runner/nix-image.nix b/nixos/tests/gitlab/runner/podman-runner/nix-image.nix index 43c11ae25175..bfb11e9573d9 100644 --- a/nixos/tests/gitlab/runner/podman-runner/nix-image.nix +++ b/nixos/tests/gitlab/runner/podman-runner/nix-image.nix @@ -219,7 +219,7 @@ let cat > $out <' -i src/util/hash.{cpp,h} + ''; + + env.NIX_CFLAGS_COMPILE = "-Wno-error=template-body"; postInstall = lib.optionalString stdenv.hostPlatform.isDarwin '' substituteInPlace $out/bin/leanpkg \ diff --git a/pkgs/by-name/li/libdovi/package.nix b/pkgs/by-name/li/libdovi/package.nix index ce9f4f123bb8..b1994d4d18dd 100644 --- a/pkgs/by-name/li/libdovi/package.nix +++ b/pkgs/by-name/li/libdovi/package.nix @@ -47,6 +47,6 @@ rustPlatform.buildRustPackage rec { description = "C library for Dolby Vision metadata parsing and writing"; homepage = "https://crates.io/crates/dolby_vision"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/by-name/li/libfreeaptx/package.nix b/pkgs/by-name/li/libfreeaptx/package.nix index 95496d43c7c2..a0c7f549c9bd 100644 --- a/pkgs/by-name/li/libfreeaptx/package.nix +++ b/pkgs/by-name/li/libfreeaptx/package.nix @@ -48,6 +48,6 @@ stdenv.mkDerivation rec { license = lib.licenses.lgpl21Plus; homepage = "https://github.com/iamthehorker/libfreeaptx"; platforms = lib.platforms.unix; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/by-name/ma/mattermost/package.nix b/pkgs/by-name/ma/mattermost/package.nix index cfdc80dd38b0..5382a883c3c1 100644 --- a/pkgs/by-name/ma/mattermost/package.nix +++ b/pkgs/by-name/ma/mattermost/package.nix @@ -262,7 +262,6 @@ buildMattermost rec { maintainers = with lib.maintainers; [ ryantm numinit - kranzes mgdelacroix ]; platforms = lib.platforms.linux; diff --git a/pkgs/by-name/mp/mpd-discord-rpc/package.nix b/pkgs/by-name/mp/mpd-discord-rpc/package.nix index 9793b6f44dd4..dade0e9059a7 100644 --- a/pkgs/by-name/mp/mpd-discord-rpc/package.nix +++ b/pkgs/by-name/mp/mpd-discord-rpc/package.nix @@ -32,7 +32,7 @@ rustPlatform.buildRustPackage rec { homepage = "https://github.com/JakeStanger/mpd-discord-rpc/"; changelog = "https://github.com/JakeStanger/mpd-discord-rpc/blob/${src.rev}/CHANGELOG.md"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; mainProgram = "mpd-discord-rpc"; }; } diff --git a/pkgs/by-name/na/nautilus/package.nix b/pkgs/by-name/na/nautilus/package.nix index e41b49201b46..a4b4851f9ded 100644 --- a/pkgs/by-name/na/nautilus/package.nix +++ b/pkgs/by-name/na/nautilus/package.nix @@ -41,7 +41,7 @@ stdenv.mkDerivation (finalAttrs: { pname = "nautilus"; - version = "49.2"; + version = "49.3"; outputs = [ "out" @@ -51,7 +51,7 @@ stdenv.mkDerivation (finalAttrs: { src = fetchurl { url = "mirror://gnome/sources/nautilus/${lib.versions.major finalAttrs.version}/nautilus-${finalAttrs.version}.tar.xz"; - hash = "sha256-JXazS+0ngaifCQUeyfyuOuF+txcs175nj1kqoU5MJrE="; + hash = "sha256-qmvzdvCJkjYoBergGJCxv1rRSPNWqnzP4fZk7aiNQT4="; }; patches = [ diff --git a/pkgs/by-name/ne/nextcloud-client/package.nix b/pkgs/by-name/ne/nextcloud-client/package.nix index 90370188deb9..158e7a1bf286 100644 --- a/pkgs/by-name/ne/nextcloud-client/package.nix +++ b/pkgs/by-name/ne/nextcloud-client/package.nix @@ -100,7 +100,6 @@ stdenv.mkDerivation rec { homepage = "https://nextcloud.com"; license = lib.licenses.gpl2Plus; maintainers = with lib.maintainers; [ - kranzes SuperSandro2000 ]; platforms = lib.platforms.linux; diff --git a/pkgs/by-name/op/openscad-unstable/package.nix b/pkgs/by-name/op/openscad-unstable/package.nix index b4e57ca17e3f..b584019221ff 100644 --- a/pkgs/by-name/op/openscad-unstable/package.nix +++ b/pkgs/by-name/op/openscad-unstable/package.nix @@ -121,7 +121,7 @@ clangStdenv.mkDerivation rec { "-DUSE_BUILTIN_OPENCSG=OFF" "-DUSE_BUILTIN_MANIFOLD=OFF" "-DUSE_BUILTIN_CLIPPER2=OFF" - "-DOPENSCAD_VERSION=\"${builtins.replaceStrings [ "-" ] [ "." ] version}\"" + "-DOPENSCAD_VERSION=\"${builtins.replaceStrings [ "-" ] [ "." ] (lib.strings.getVersion version)}\"" "-DCMAKE_UNITY_BUILD=OFF" # broken compile with unity # IPO "-DCMAKE_EXE_LINKER_FLAGS=-fuse-ld=lld" diff --git a/pkgs/by-name/pa/pam_rssh/package.nix b/pkgs/by-name/pa/pam_rssh/package.nix index 7924cf482594..984fa6242870 100644 --- a/pkgs/by-name/pa/pam_rssh/package.nix +++ b/pkgs/by-name/pa/pam_rssh/package.nix @@ -74,7 +74,6 @@ rustPlatform.buildRustPackage rec { license = lib.licenses.mit; platforms = lib.platforms.linux; maintainers = with lib.maintainers; [ - kranzes xyenon ]; }; diff --git a/pkgs/by-name/pa/paperless-ngx/package.nix b/pkgs/by-name/pa/paperless-ngx/package.nix index 50f0e8b1651b..9a03cf6d1722 100644 --- a/pkgs/by-name/pa/paperless-ngx/package.nix +++ b/pkgs/by-name/pa/paperless-ngx/package.nix @@ -30,13 +30,13 @@ xorg, }: let - version = "2.20.3"; + version = "2.20.4"; src = fetchFromGitHub { owner = "paperless-ngx"; repo = "paperless-ngx"; tag = "v${version}"; - hash = "sha256-aAcE0AUkB5SS4jwFOKCM7+iqc7EqGJv0qjqz0mnj2Wo="; + hash = "sha256-xWyYisSJ5FKU+ZFrCtjo94TjqXCzHDVdPAISMTX0Tt8="; }; python = python3.override { diff --git a/pkgs/by-name/pl/plex-desktop/package.nix b/pkgs/by-name/pl/plex-desktop/package.nix index 6dae4b0a9212..a3a12c8e3598 100644 --- a/pkgs/by-name/pl/plex-desktop/package.nix +++ b/pkgs/by-name/pl/plex-desktop/package.nix @@ -13,6 +13,7 @@ libva, libxkbcommon, libxml2_13, + makeDesktopItem, makeShellWrapper, minizip, nss, @@ -40,6 +41,15 @@ let platforms = [ "x86_64-linux" ]; mainProgram = "plex-desktop"; }; + desktopItem = makeDesktopItem { + name = "plex-desktop"; + desktopName = "Plex"; + exec = "plex-desktop"; + icon = "plex-desktop"; + terminal = false; + categories = [ "AudioVideo" ]; + startupWMClass = "Plex"; + }; plex-desktop = stdenv.mkDerivation { inherit pname version meta; @@ -133,11 +143,8 @@ buildFHSEnv { extraInstallCommands = '' mkdir -p $out/share/applications $out/share/icons/hicolor/scalable/apps - install -m 444 -D ${plex-desktop}/meta/gui/plex-desktop.desktop $out/share/applications/plex-desktop.desktop - substituteInPlace $out/share/applications/plex-desktop.desktop \ - --replace-fail \ - 'Icon=''${SNAP}/meta/gui/icon.png' \ - 'Icon=${plex-desktop}/meta/gui/icon.png' + install -m 444 -D ${desktopItem}/share/applications/plex-desktop.desktop $out/share/applications/plex-desktop.desktop + install -m 444 -D ${plex-desktop}/meta/gui/icon.png $out/share/icons/hicolor/scalable/apps/plex-desktop.png ''; runScript = writeShellScript "plex-desktop.sh" '' diff --git a/pkgs/by-name/pr/protoc-gen-elixir/package.nix b/pkgs/by-name/pr/protoc-gen-elixir/package.nix index 9c1600c022c5..237f52d810c2 100644 --- a/pkgs/by-name/pr/protoc-gen-elixir/package.nix +++ b/pkgs/by-name/pr/protoc-gen-elixir/package.nix @@ -9,13 +9,13 @@ let in mixRelease rec { pname = "protoc-gen-elixir"; - version = "0.15.0"; + version = "0.16.0"; src = fetchFromGitHub { owner = "elixir-protobuf"; repo = "protobuf"; tag = "v${version}"; - hash = "sha256-khgK+hSNyQbM4JB8VuCpbLS0z4NlweORW9z2PdhZ/+Y="; + hash = "sha256-kyS9KZENdoEuB64k48RegtZQa57/RDnm8bY+piAAk2w="; }; mixFodDeps = fetchMixDeps { diff --git a/pkgs/by-name/ra/radicle-node/package.nix b/pkgs/by-name/ra/radicle-node/package.nix index d1e984a74701..71d01408459e 100644 --- a/pkgs/by-name/ra/radicle-node/package.nix +++ b/pkgs/by-name/ra/radicle-node/package.nix @@ -7,27 +7,24 @@ lib, makeBinaryWrapper, man-db, - nixos, nixosTests, openssh, - radicle-node, runCommand, rustPlatform, stdenv, - testers, xdg-utils, versionCheckHook, }: rustPlatform.buildRustPackage (finalAttrs: { pname = "radicle-node"; - version = "1.5.0"; + version = "1.6.0"; src = fetchFromRadicle { seed = "seed.radicle.xyz"; repo = "z3gqcJUoA1n9HaHKufZs5FCSGazv5"; tag = "releases/${finalAttrs.version}"; - hash = "sha256-/dWeG2jKCnfg7fwPP+BbRmEvM7rCppGYh2aeftcg3SY="; + hash = "sha256-j7GTtx9Dq3xZeEsgIlaRq1Vbc9aJfn22WCkNTGjvH1Q="; leaveDotGit = true; postFetch = '' git -C $out rev-parse HEAD > $out/.git_head @@ -36,7 +33,7 @@ rustPlatform.buildRustPackage (finalAttrs: { ''; }; - cargoHash = "sha256-4URBtN5lyzFPaLJUf/HPAL2ugRUa6sZhpDeiFR0W7cc="; + cargoHash = "sha256-59RyfSUJNoQ7EtQK3OSYOIO/YVEjeeM9ovbojHFX4pI="; env.RADICLE_VERSION = finalAttrs.version; @@ -89,6 +86,12 @@ rustPlatform.buildRustPackage (finalAttrs: { asciidoctor -d manpage -b manpage $page installManPage ''${page::-5} done + '' + + lib.optionalString (stdenv.buildPlatform.canExecute stdenv.hostPlatform) '' + installShellCompletion --cmd rad \ + --bash <($out/bin/rad completion bash) \ + --fish <($out/bin/rad completion fish) \ + --zsh <($out/bin/rad completion zsh) ''; nativeInstallCheckInputs = [ versionCheckHook ]; @@ -110,53 +113,34 @@ rustPlatform.buildRustPackage (finalAttrs: { ''; passthru.updateScript = ./update.sh; - passthru.tests = - let - package = radicle-node; - in - { - basic = - runCommand "${package.name}-basic-test" - { - nativeBuildInputs = [ - jq - openssh - radicle-node - ]; - } - '' - set -e - export RAD_HOME="$PWD/.radicle" - mkdir -p "$RAD_HOME/keys" - ssh-keygen -t ed25519 -N "" -f "$RAD_HOME/keys/radicle" > /dev/null - jq -n '.node.alias |= "nix"' > "$RAD_HOME/config.json" + passthru.tests = { + basic = + runCommand "radicle-node-basic-test" + { + nativeBuildInputs = [ + jq + openssh + finalAttrs.finalPackage + ]; + } + '' + set -e + export RAD_HOME="$PWD/.radicle" + mkdir -p "$RAD_HOME/keys" + ssh-keygen -t ed25519 -N "" -f "$RAD_HOME/keys/radicle" > /dev/null + jq -n '.node.alias |= "nix"' > "$RAD_HOME/config.json" - rad config > /dev/null - rad debug | jq -e ' - (.sshVersion | contains("${openssh.version}")) - and - (.gitVersion | contains("${gitMinimal.version}")) - ' + rad config > /dev/null + rad debug | jq -e ' + (.sshVersion | contains("${openssh.version}")) + and + (.gitVersion | contains("${gitMinimal.version}")) + ' - touch $out - ''; - nixos-build = lib.recurseIntoAttrs { - checkConfig-success = - (nixos { - services.radicle.settings = { - node.alias = "foo"; - }; - }).config.services.radicle.configFile; - checkConfig-failure = - testers.testBuildFailure - (nixos { - services.radicle.settings = { - node.alias = null; - }; - }).config.services.radicle.configFile; - }; - nixos-run = nixosTests.radicle; - }; + touch $out + ''; + nixos-run = nixosTests.radicle; + }; meta = { description = "Radicle node and CLI for decentralized code collaboration"; diff --git a/pkgs/by-name/ri/ristate/package.nix b/pkgs/by-name/ri/ristate/package.nix index c7ca287a581c..ad948e4a787c 100644 --- a/pkgs/by-name/ri/ristate/package.nix +++ b/pkgs/by-name/ri/ristate/package.nix @@ -24,7 +24,7 @@ rustPlatform.buildRustPackage { description = "River-status client written in Rust"; homepage = "https://gitlab.com/snakedye/ristate"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; mainProgram = "ristate"; }; } diff --git a/pkgs/by-name/ru/rush-parallel/package.nix b/pkgs/by-name/ru/rush-parallel/package.nix index 945b6a6f1a31..aed32b53470a 100644 --- a/pkgs/by-name/ru/rush-parallel/package.nix +++ b/pkgs/by-name/ru/rush-parallel/package.nix @@ -27,7 +27,7 @@ buildGoModule rec { homepage = "https://github.com/shenwei356/rush"; changelog = "https://github.com/shenwei356/rush/blob/${src.rev}/CHANGELOG.md"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; mainProgram = "rush-parallel"; }; } diff --git a/pkgs/by-name/si/simplotask/package.nix b/pkgs/by-name/si/simplotask/package.nix index dc434971de3f..acd6c10234b1 100644 --- a/pkgs/by-name/si/simplotask/package.nix +++ b/pkgs/by-name/si/simplotask/package.nix @@ -7,13 +7,13 @@ buildGoModule (finalAttrs: { pname = "simplotask"; - version = "1.19.2"; + version = "1.19.3"; src = fetchFromGitHub { owner = "umputun"; repo = "spot"; tag = "v${finalAttrs.version}"; - hash = "sha256-UFuHcva5+0KMaIas6N+Ny1Ego6ZI+J8gd+91EisRlXM="; + hash = "sha256-XtM9WiLZ8KqaG7oQBADRRz//o60EBFEZl/pgCLQ+adM="; }; vendorHash = null; diff --git a/pkgs/by-name/sp/spatialite-tools/package.nix b/pkgs/by-name/sp/spatialite-tools/package.nix index e7fd11efae7e..bd1bc0bacd45 100644 --- a/pkgs/by-name/sp/spatialite-tools/package.nix +++ b/pkgs/by-name/sp/spatialite-tools/package.nix @@ -45,6 +45,7 @@ stdenv.mkDerivation rec { env = { NIX_LDFLAGS = toString [ + "-lm" "-lxml2" (lib.optionalString stdenv.hostPlatform.isDarwin "-liconv") ]; diff --git a/pkgs/by-name/sq/sql-formatter/package.nix b/pkgs/by-name/sq/sql-formatter/package.nix index 0f3f3dbdd1a6..9003dbde6071 100644 --- a/pkgs/by-name/sq/sql-formatter/package.nix +++ b/pkgs/by-name/sq/sql-formatter/package.nix @@ -11,13 +11,13 @@ }: stdenv.mkDerivation rec { pname = "sql-formatter"; - version = "15.6.12"; + version = "15.7.0"; src = fetchFromGitHub { owner = "sql-formatter-org"; repo = "sql-formatter"; rev = "v${version}"; - hash = "sha256-WwxqzJrZ3Y7PBDdKXKkehTT9WYVxUfTQE9BT0cJdJ3k="; + hash = "sha256-k105xoppmxW1jSbkzbqHF7bg/IbY1P9kZVwa3pdKF7k="; }; yarnOfflineCache = fetchYarnDeps { diff --git a/pkgs/by-name/sz/szyszka/package.nix b/pkgs/by-name/sz/szyszka/package.nix index b3318743902b..022a81b0c39e 100644 --- a/pkgs/by-name/sz/szyszka/package.nix +++ b/pkgs/by-name/sz/szyszka/package.nix @@ -55,7 +55,7 @@ rustPlatform.buildRustPackage rec { description = "Simple but powerful and fast bulk file renamer"; homepage = "https://github.com/qarmin/szyszka"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; mainProgram = "szyszka"; }; } diff --git a/pkgs/by-name/ti/tidb/package.nix b/pkgs/by-name/ti/tidb/package.nix index 5498aea95c45..d91e8acde0ff 100644 --- a/pkgs/by-name/ti/tidb/package.nix +++ b/pkgs/by-name/ti/tidb/package.nix @@ -6,16 +6,16 @@ buildGoModule rec { pname = "tidb"; - version = "8.5.4"; + version = "8.5.5"; src = fetchFromGitHub { owner = "pingcap"; repo = "tidb"; rev = "v${version}"; - sha256 = "sha256-8YlN49XPplEAk1RwqB+2fXyTMIAFXt5W0CGOE0hc3PQ="; + sha256 = "sha256-wrCdclS9qpc0mq5QZ6u5/APZyOTWvCJNCPCzM385MBM="; }; - vendorHash = "sha256-fVY34aZCaxGh6OXV9oEkdEtJpXqyaQjxH0v6Xfpokz4="; + vendorHash = "sha256-7g8U0gbG46AC4h1SyOTKKuNc5eVRqJsimzshj4O5FYw="; ldflags = [ "-X github.com/pingcap/tidb/pkg/parser/mysql.TiDBReleaseVersion=${version}" diff --git a/pkgs/by-name/vi/vial/package.nix b/pkgs/by-name/vi/vial/package.nix index a1e6c450d136..c33272e0c828 100644 --- a/pkgs/by-name/vi/vial/package.nix +++ b/pkgs/by-name/vi/vial/package.nix @@ -30,7 +30,7 @@ appimageTools.wrapType2 { homepage = "https://get.vial.today"; license = lib.licenses.gpl2Plus; mainProgram = "Vial"; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; platforms = [ "x86_64-linux" ]; sourceProvenance = with lib.sourceTypes; [ binaryNativeCode ]; }; diff --git a/pkgs/by-name/wi/wingpanel-indicator-ayatana/fix-libapplication-dir.patch b/pkgs/by-name/wi/wingpanel-indicator-ayatana/fix-libapplication-dir.patch deleted file mode 100644 index 2d9a510b751e..000000000000 --- a/pkgs/by-name/wi/wingpanel-indicator-ayatana/fix-libapplication-dir.patch +++ /dev/null @@ -1,13 +0,0 @@ -diff --git a/src/IndicatorFactory.vala b/src/IndicatorFactory.vala -index 9411de0..632d83b 100644 ---- a/src/IndicatorFactory.vala -+++ b/src/IndicatorFactory.vala -@@ -24,7 +24,7 @@ public class AyatanaCompatibility.IndicatorFactory : Object, IndicatorLoader { - public Gee.Collection get_indicators () { - if (indicators == null) { - indicators = new Gee.LinkedList (); -- load_indicator (File.new_for_path (Constants.AYATANA_INDICATOR_DIR), "libapplication.so"); -+ load_indicator (File.new_for_path ("@indicator_application@/lib/indicators3/7/"), "libapplication.so"); - } - - return indicators.read_only_view; diff --git a/pkgs/by-name/wi/wingpanel-indicator-ayatana/package.nix b/pkgs/by-name/wi/wingpanel-indicator-ayatana/package.nix deleted file mode 100644 index 9d617fa5ab0c..000000000000 --- a/pkgs/by-name/wi/wingpanel-indicator-ayatana/package.nix +++ /dev/null @@ -1,62 +0,0 @@ -{ - lib, - stdenv, - fetchFromGitHub, - unstableGitUpdater, - replaceVars, - meson, - ninja, - pkg-config, - vala, - gtk3, - libindicator-gtk3, - pantheon, - indicator-application-gtk3, -}: - -stdenv.mkDerivation { - pname = "wingpanel-indicator-ayatana"; - version = "2.0.7-unstable-2023-04-18"; - - src = fetchFromGitHub { - owner = "Lafydev"; - repo = "wingpanel-indicator-ayatana"; - rev = "d554663b4e199d44c1f1d53b5cc39b9a775b3f1c"; - sha256 = "sha256-dEk0exLh+TGuQt7be2YRTS2EzPD55+edR8WibthXwhI="; - }; - - patches = [ - # Tells the indicator the path for libapplication.so - (replaceVars ./fix-libapplication-dir.patch { - indicator_application = indicator-application-gtk3; - }) - ]; - - nativeBuildInputs = [ - meson - ninja - pkg-config - vala - ]; - - buildInputs = [ - gtk3 - libindicator-gtk3 - pantheon.granite - pantheon.wingpanel - ]; - - passthru = { - updateScript = unstableGitUpdater { - url = "https://github.com/Lafydev/wingpanel-indicator-ayatana.git"; - }; - }; - - meta = { - description = "Ayatana Compatibility Indicator for Wingpanel"; - homepage = "https://github.com/Lafydev/wingpanel-indicator-ayatana"; - license = lib.licenses.lgpl21Plus; - platforms = lib.platforms.linux; - teams = [ lib.teams.pantheon ]; - }; -} diff --git a/pkgs/development/libraries/pipewire/default.nix b/pkgs/development/libraries/pipewire/default.nix index 8aa898b1615c..d9b0ef5e7d90 100644 --- a/pkgs/development/libraries/pipewire/default.nix +++ b/pkgs/development/libraries/pipewire/default.nix @@ -269,7 +269,6 @@ stdenv.mkDerivation (finalAttrs: { license = lib.licenses.mit; platforms = lib.platforms.linux ++ lib.platforms.freebsd; maintainers = with lib.maintainers; [ - kranzes k900 ]; pkgConfigModules = [ diff --git a/pkgs/development/python-modules/aenum/default.nix b/pkgs/development/python-modules/aenum/default.nix index 9890e9bc7541..cfa688c7d7c6 100644 --- a/pkgs/development/python-modules/aenum/default.nix +++ b/pkgs/development/python-modules/aenum/default.nix @@ -10,12 +10,12 @@ buildPythonPackage rec { pname = "aenum"; - version = "3.1.15"; + version = "3.1.16"; pyproject = true; src = fetchPypi { inherit pname version; - hash = "sha256-jL12zRjE+HD/ObJChNPqAo++hzGljfOqWB5DTFdblVk="; + hash = "sha256-v6+Vib20GO46mG2FdQxzGNnSg5wbGh1v6PxT7CAc8UA="; }; nativeBuildInputs = [ setuptools ]; diff --git a/pkgs/development/python-modules/aiohomematic/default.nix b/pkgs/development/python-modules/aiohomematic/default.nix index cf7465e0bb17..ed80ce2ada10 100644 --- a/pkgs/development/python-modules/aiohomematic/default.nix +++ b/pkgs/development/python-modules/aiohomematic/default.nix @@ -16,14 +16,14 @@ buildPythonPackage rec { pname = "aiohomematic"; - version = "2026.1.27"; + version = "2026.1.38"; pyproject = true; src = fetchFromGitHub { owner = "SukramJ"; repo = "aiohomematic"; tag = version; - hash = "sha256-KS4mSmu0JY+X5pVrE4IvNjowrgq3CRww1mMmKR0Bedk="; + hash = "sha256-2Rf6WRMs/m55/kdq7yEmLkf4ptlOhfyRnvNT4XqelPs="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/aiohttp-sse-client/default.nix b/pkgs/development/python-modules/aiohttp-sse-client/default.nix index 9692f7bfc2ca..cb07e73ca491 100644 --- a/pkgs/development/python-modules/aiohttp-sse-client/default.nix +++ b/pkgs/development/python-modules/aiohttp-sse-client/default.nix @@ -45,6 +45,6 @@ buildPythonPackage rec { description = "Server-Sent Event python client base on aiohttp"; homepage = "https://pypi.org/project/aiohttp-sse-client/"; license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/boto3-stubs/default.nix b/pkgs/development/python-modules/boto3-stubs/default.nix index cebe1d296037..fb20505d5da0 100644 --- a/pkgs/development/python-modules/boto3-stubs/default.nix +++ b/pkgs/development/python-modules/boto3-stubs/default.nix @@ -358,13 +358,13 @@ buildPythonPackage (finalAttrs: { pname = "boto3-stubs"; - version = "1.42.26"; + version = "1.42.28"; pyproject = true; src = fetchPypi { pname = "boto3_stubs"; inherit (finalAttrs) version; - hash = "sha256-U3s4gorgNqQKwQP8K8xSDpM3WYFtqcq/v+zp7RddfH4="; + hash = "sha256-bug70UV9Y3cTDXCfyw+LK5XKeSiwZX0Yq7HQjRnbbsk="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/botocore-stubs/default.nix b/pkgs/development/python-modules/botocore-stubs/default.nix index e7ea925bedda..06cf46fa41b0 100644 --- a/pkgs/development/python-modules/botocore-stubs/default.nix +++ b/pkgs/development/python-modules/botocore-stubs/default.nix @@ -9,13 +9,13 @@ buildPythonPackage (finalAttrs: { pname = "botocore-stubs"; - version = "1.42.26"; + version = "1.42.28"; pyproject = true; src = fetchPypi { pname = "botocore_stubs"; inherit (finalAttrs) version; - hash = "sha256-WwlGaB1GzorLCjuElL33bTS8JidvC3uu3PiKbPHdeYs="; + hash = "sha256-qhMfkvJmwKxHmHPo6RTEYlbDnbOuzqDHPt8IRtME6d8="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/calysto-scheme/default.nix b/pkgs/development/python-modules/calysto-scheme/default.nix index 4e3b16f50fa2..a514a15ea0d3 100644 --- a/pkgs/development/python-modules/calysto-scheme/default.nix +++ b/pkgs/development/python-modules/calysto-scheme/default.nix @@ -33,6 +33,6 @@ buildPythonPackage rec { homepage = "https://github.com/Calysto/calysto_scheme"; changelog = "https://github.com/Calysto/calysto_scheme/blob/${src.rev}/ChangeLog.md"; license = lib.licenses.bsd3; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/calysto/default.nix b/pkgs/development/python-modules/calysto/default.nix index 8016ecb7798f..a9e62370f4c3 100644 --- a/pkgs/development/python-modules/calysto/default.nix +++ b/pkgs/development/python-modules/calysto/default.nix @@ -38,6 +38,6 @@ buildPythonPackage rec { description = "Tools for Jupyter and Python"; homepage = "https://github.com/Calysto/calysto"; license = lib.licenses.bsd2; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/cryptolyzer/default.nix b/pkgs/development/python-modules/cryptolyzer/default.nix index 9dc28a265f9b..8531c4d74931 100644 --- a/pkgs/development/python-modules/cryptolyzer/default.nix +++ b/pkgs/development/python-modules/cryptolyzer/default.nix @@ -72,7 +72,7 @@ buildPythonPackage rec { changelog = "https://gitlab.com/coroner/cryptolyzer/-/blob/v${version}/CHANGELOG.md"; license = lib.licenses.mpl20; mainProgram = "cryptolyze"; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; teams = with lib.teams; [ ngi ]; }; } diff --git a/pkgs/development/python-modules/cryptoparser/default.nix b/pkgs/development/python-modules/cryptoparser/default.nix index 093c13ed6986..7cd535eea98f 100644 --- a/pkgs/development/python-modules/cryptoparser/default.nix +++ b/pkgs/development/python-modules/cryptoparser/default.nix @@ -62,7 +62,7 @@ buildPythonPackage rec { homepage = "https://gitlab.com/coroner/cryptoparser"; changelog = "https://gitlab.com/coroner/cryptoparser/-/blob/${src.tag}/CHANGELOG.md"; license = lib.licenses.mpl20; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; teams = with lib.teams; [ ngi ]; }; } diff --git a/pkgs/development/python-modules/fire/default.nix b/pkgs/development/python-modules/fire/default.nix index 8282ca1bdf13..0ba1a46dcb22 100644 --- a/pkgs/development/python-modules/fire/default.nix +++ b/pkgs/development/python-modules/fire/default.nix @@ -9,6 +9,7 @@ levenshtein, pytestCheckHook, termcolor, + pythonAtLeast, }: buildPythonPackage rec { @@ -37,6 +38,11 @@ buildPythonPackage rec { pytestCheckHook ]; + disabledTests = lib.optionals (pythonAtLeast "3.14") [ + # RuntimeError: There is no current event loop in thread 'MainThread' + "testFireAsyncio" + ]; + pythonImportsCheck = [ "fire" ]; meta = { diff --git a/pkgs/development/python-modules/githubkit/default.nix b/pkgs/development/python-modules/githubkit/default.nix index f8f85d4ba07d..155b981f3f6a 100644 --- a/pkgs/development/python-modules/githubkit/default.nix +++ b/pkgs/development/python-modules/githubkit/default.nix @@ -84,6 +84,6 @@ buildPythonPackage rec { homepage = "https://github.com/yanyongyu/githubkit"; changelog = "https://github.com/yanyongyu/githubkit/releases/tag/${src.tag}"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/glad2/default.nix b/pkgs/development/python-modules/glad2/default.nix index 1a038314f6d2..e5f2997ba18e 100644 --- a/pkgs/development/python-modules/glad2/default.nix +++ b/pkgs/development/python-modules/glad2/default.nix @@ -30,6 +30,6 @@ buildPythonPackage rec { mainProgram = "glad"; homepage = "https://github.com/Dav1dde/glad"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/hid-parser/default.nix b/pkgs/development/python-modules/hid-parser/default.nix index dae57d0ac5d1..4ac5ade3d0bb 100644 --- a/pkgs/development/python-modules/hid-parser/default.nix +++ b/pkgs/development/python-modules/hid-parser/default.nix @@ -32,6 +32,6 @@ buildPythonPackage rec { description = "Typed pure Python library to parse HID report descriptors"; homepage = "https://github.com/usb-tools/python-hid-parser"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/iamdata/default.nix b/pkgs/development/python-modules/iamdata/default.nix index 02270db22de5..af26c394d781 100644 --- a/pkgs/development/python-modules/iamdata/default.nix +++ b/pkgs/development/python-modules/iamdata/default.nix @@ -8,14 +8,14 @@ buildPythonPackage (finalAttrs: { pname = "iamdata"; - version = "0.1.202601141"; + version = "0.1.202601151"; pyproject = true; src = fetchFromGitHub { owner = "cloud-copilot"; repo = "iam-data-python"; tag = "v${finalAttrs.version}"; - hash = "sha256-jehKBabFf7aMVViJtThjzgJsH4gmA0wUu6H0ScFxFsw="; + hash = "sha256-J8b4pPBip8rRwDVxmOXl1+WI00qchu4eJj50jCmJ9Zo="; }; __darwinAllowLocalNetworking = true; diff --git a/pkgs/development/python-modules/image-go-nord/default.nix b/pkgs/development/python-modules/image-go-nord/default.nix index 7d8d6dc402fa..f37969317106 100644 --- a/pkgs/development/python-modules/image-go-nord/default.nix +++ b/pkgs/development/python-modules/image-go-nord/default.nix @@ -44,6 +44,6 @@ buildPythonPackage rec { homepage = "https://github.com/Schrodinger-Hat/ImageGoNord-pip"; changelog = "https://github.com/Schroedinger-Hat/ImageGoNord-pip/releases/tag/v${version}"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/llvmlite/default.nix b/pkgs/development/python-modules/llvmlite/default.nix index 383346cbf058..d932dd3c866d 100644 --- a/pkgs/development/python-modules/llvmlite/default.nix +++ b/pkgs/development/python-modules/llvmlite/default.nix @@ -29,7 +29,7 @@ buildPythonPackage rec { version = "0.46.0"; pyproject = true; - disabled = isPyPy || pythonAtLeast "3.14"; + disabled = isPyPy; src = fetchFromGitHub { owner = "numba"; diff --git a/pkgs/development/python-modules/moddb/default.nix b/pkgs/development/python-modules/moddb/default.nix index a53342277b83..d2792616c6b1 100644 --- a/pkgs/development/python-modules/moddb/default.nix +++ b/pkgs/development/python-modules/moddb/default.nix @@ -37,6 +37,6 @@ buildPythonPackage rec { description = "Python scrapper to access ModDB mods, games and more as objects"; homepage = "https://github.com/ClementJ18/moddb"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/mypy-boto3/default.nix b/pkgs/development/python-modules/mypy-boto3/default.nix index 97c0bc05ec66..e84ba439dcd3 100644 --- a/pkgs/development/python-modules/mypy-boto3/default.nix +++ b/pkgs/development/python-modules/mypy-boto3/default.nix @@ -179,8 +179,8 @@ in "sha256-ycyUNWVH6be7P5uutkkjDBBfNKwMdRQxOO27fn6v/gU="; mypy-boto3-ce = - buildMypyBoto3Package "ce" "1.42.23" - "sha256-bjumKpXRF2vLy1LUvm+RYLdEmvYBg1EVrJwp7XaCyOM="; + buildMypyBoto3Package "ce" "1.42.28" + "sha256-WOV41Me/uQKGrDotJutJyUuH8XIeMFrnkE204NFFFGk="; mypy-boto3-chime = buildMypyBoto3Package "chime" "1.42.3" @@ -335,8 +335,8 @@ in "sha256-zMNP1LXKSynkfJSLn19sz5UoT8LiswD5qSZCn1y5GsA="; mypy-boto3-connect = - buildMypyBoto3Package "connect" "1.42.19" - "sha256-PDva4umoq8e5JTRSaLs+VPr5fJFUdhy+QQKajM9G4MA="; + buildMypyBoto3Package "connect" "1.42.28" + "sha256-Vt3rd5sY2S/RNpgGK6rdQK0EEwe5y8yPTPm4LTk/sIo="; mypy-boto3-connect-contact-lens = buildMypyBoto3Package "connect-contact-lens" "1.42.3" @@ -467,8 +467,8 @@ in "sha256-lNlav7BQkVjbYE9cdnvcdNki9IDo6tTlerD+lt69Rio="; mypy-boto3-eks = - buildMypyBoto3Package "eks" "1.42.3" - "sha256-f4WgQz6uZG0cy1s9dsM4TzI2WYeS/RJg58Tig1USRAg="; + buildMypyBoto3Package "eks" "1.42.28" + "sha256-8mDaLGqdD3M6ECsteVw6QMwcY7+VCCGZ2eJAEgwbBl4="; mypy-boto3-elastic-inference = buildMypyBoto3Package "elastic-inference" "1.36.0" @@ -1082,24 +1082,24 @@ in "sha256-55wnvv8vd/G5KdZoJipaSLzC13wRoop7ZXwTLDU4GtE="; mypy-boto3-rds = - buildMypyBoto3Package "rds" "1.42.5" - "sha256-TOppe2P3YVp0HcmSis+7XZVgGOXKc5WbQDGt+vMZIec="; + buildMypyBoto3Package "rds" "1.42.28" + "sha256-cZXotruFxQ8HXT5YJYCtvIe5gqvLnnqwS5si2RNWcw4="; mypy-boto3-rds-data = buildMypyBoto3Package "rds-data" "1.42.3" "sha256-XHcwFnP9i2zw5yPwvhcMMCSTmBpQy7ZdxQ4eMR0ao4M="; mypy-boto3-redshift = - buildMypyBoto3Package "redshift" "1.42.3" - "sha256-fBCd9JdfPAV1Qoqs21FutPQgexAtR/+Nk5VcrcRaY1M="; + buildMypyBoto3Package "redshift" "1.42.28" + "sha256-5OKcDz0wEDr7eDg1cNPSXemjvquYIHI+ozK2doNGAi8="; mypy-boto3-redshift-data = buildMypyBoto3Package "redshift-data" "1.42.3" "sha256-Mby+hQJcBXqmDY5wC1Uut4EQex1PmjT8bgB81rT5NKU="; mypy-boto3-redshift-serverless = - buildMypyBoto3Package "redshift-serverless" "1.42.5" - "sha256-nHQyuWxdHmCImK1bF7GpGxrUJJUsAFA0U5A1/ew7eAY="; + buildMypyBoto3Package "redshift-serverless" "1.42.28" + "sha256-9sMbueRSG+9HdUXt0qH7L52J4coYQMV3ij7z9lGJJb8="; mypy-boto3-rekognition = buildMypyBoto3Package "rekognition" "1.42.3" diff --git a/pkgs/development/python-modules/nicegui/default.nix b/pkgs/development/python-modules/nicegui/default.nix index be6dc3bced7d..f7a4c6f45a3a 100644 --- a/pkgs/development/python-modules/nicegui/default.nix +++ b/pkgs/development/python-modules/nicegui/default.nix @@ -41,16 +41,16 @@ writableTmpDirAsHomeHook, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "nicegui"; - version = "3.4.1"; + version = "3.5.0"; pyproject = true; src = fetchFromGitHub { owner = "zauberzeug"; repo = "nicegui"; - tag = "v${version}"; - hash = "sha256-fZAGqFQQFLFi5jWlQb1SAQnAFEtt2C07vNZXfyUHIa0="; + tag = "v${finalAttrs.version}"; + hash = "sha256-4bIpQ6n6s6GgwAzDs6pPULNlwYqclNHvWlPOwJ5I5v4="; }; pythonRelaxDeps = [ "requests" ]; @@ -105,7 +105,7 @@ buildPythonPackage rec { webdriver-manager writableTmpDirAsHomeHook ] - ++ lib.concatAttrValues optional-dependencies; + ++ lib.flatten (builtins.attrValues finalAttrs.passthru.optional-dependencies); pythonImportsCheck = [ "nicegui" ]; @@ -115,8 +115,8 @@ buildPythonPackage rec { meta = { description = "Module to create web-based user interfaces"; homepage = "https://github.com/zauberzeug/nicegui/"; - changelog = "https://github.com/zauberzeug/nicegui/releases/tag/${src.tag}"; + changelog = "https://github.com/zauberzeug/nicegui/releases/tag/${finalAttrs.src.tag}"; license = lib.licenses.mit; maintainers = with lib.maintainers; [ fab ]; }; -} +}) diff --git a/pkgs/development/python-modules/nodeenv/default.nix b/pkgs/development/python-modules/nodeenv/default.nix index 752c1384c70a..45a3a3b5b072 100644 --- a/pkgs/development/python-modules/nodeenv/default.nix +++ b/pkgs/development/python-modules/nodeenv/default.nix @@ -12,14 +12,14 @@ buildPythonPackage rec { pname = "nodeenv"; - version = "1.9.1"; + version = "1.10.0"; pyproject = true; src = fetchFromGitHub { owner = "ekalinin"; repo = "nodeenv"; tag = version; - hash = "sha256-nud8HSfx1ri0UZf25VPCy7swfaSM13u5+HzozK+ikeY="; + hash = "sha256-CosZOTWxXFGrc2ZvPPUwFcUv1blZhyl8MWPnoRCpBBo="; }; build-system = [ diff --git a/pkgs/development/python-modules/numba/default.nix b/pkgs/development/python-modules/numba/default.nix index 32c45c2f56c0..8ef25f126700 100644 --- a/pkgs/development/python-modules/numba/default.nix +++ b/pkgs/development/python-modules/numba/default.nix @@ -37,8 +37,6 @@ buildPythonPackage rec { pname = "numba"; pyproject = true; - disabled = pythonOlder "3.10" || pythonAtLeast "3.14"; - src = fetchFromGitHub { owner = "numba"; repo = "numba"; diff --git a/pkgs/development/python-modules/oauth2-client/default.nix b/pkgs/development/python-modules/oauth2-client/default.nix index dc258aba198a..14874fd873cb 100644 --- a/pkgs/development/python-modules/oauth2-client/default.nix +++ b/pkgs/development/python-modules/oauth2-client/default.nix @@ -34,6 +34,6 @@ buildPythonPackage rec { description = "Client library for OAuth2"; homepage = "https://pypi.org/project/oauth2-client/"; license = lib.licenses.asl20; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/publicsuffixlist/default.nix b/pkgs/development/python-modules/publicsuffixlist/default.nix index daf639a145e4..8badd59781da 100644 --- a/pkgs/development/python-modules/publicsuffixlist/default.nix +++ b/pkgs/development/python-modules/publicsuffixlist/default.nix @@ -9,14 +9,14 @@ publicsuffix-list, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "publicsuffixlist"; - version = "1.0.2.20260109"; + version = "1.0.2.20260114"; pyproject = true; src = fetchPypi { - inherit pname version; - hash = "sha256-3fS1KZvzGyiYkt4GsYZ4zElGoazRiIeBTDuNbNQFjhk="; + inherit (finalAttrs) pname version; + hash = "sha256-PO+kopKEHUBqbFoHvGVQQVbssb4d2ZzXMLmLYzLx1S0="; }; postPatch = '' @@ -38,11 +38,11 @@ buildPythonPackage rec { enabledTestPaths = [ "publicsuffixlist/test.py" ]; meta = { - changelog = "https://github.com/ko-zu/psl/blob/v${version}-gha/CHANGES.md"; description = "Public Suffix List parser implementation"; homepage = "https://github.com/ko-zu/psl"; + changelog = "https://github.com/ko-zu/psl/blob/v${finalAttrs.version}-gha/CHANGES.md"; license = lib.licenses.mpl20; maintainers = with lib.maintainers; [ fab ]; mainProgram = "publicsuffixlist-download"; }; -} +}) diff --git a/pkgs/development/python-modules/pyais/default.nix b/pkgs/development/python-modules/pyais/default.nix index e6f52f8b8870..fcf61e9155b3 100644 --- a/pkgs/development/python-modules/pyais/default.nix +++ b/pkgs/development/python-modules/pyais/default.nix @@ -9,16 +9,16 @@ setuptools, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "pyais"; - version = "2.14.0"; + version = "2.15.0"; pyproject = true; src = fetchFromGitHub { owner = "M0r13n"; repo = "pyais"; - tag = "v${version}"; - hash = "sha256-3KZCfJkXofxMcqAOa6IInCbQIGZSJ/1+L9cM/GCCGog="; + tag = "v${finalAttrs.version}"; + hash = "sha256-EMMyH6bjoS0PFop1C0TZinfwAA9E8xA7jrJ8q1jm+CY="; }; __darwinAllowLocalNetworking = true; @@ -47,8 +47,8 @@ buildPythonPackage rec { meta = { description = "Module for decoding and encoding AIS messages (AIVDM/AIVDO)"; homepage = "https://github.com/M0r13n/pyais"; - changelog = "https://github.com/M0r13n/pyais/blob/${src.tag}/CHANGELOG.txt"; + changelog = "https://github.com/M0r13n/pyais/blob/${finalAttrs.src.tag}/CHANGELOG.txt"; license = lib.licenses.mit; maintainers = with lib.maintainers; [ fab ]; }; -} +}) diff --git a/pkgs/development/python-modules/pygmt/default.nix b/pkgs/development/python-modules/pygmt/default.nix index 053e8ca2df90..23c581d02b50 100644 --- a/pkgs/development/python-modules/pygmt/default.nix +++ b/pkgs/development/python-modules/pygmt/default.nix @@ -1,6 +1,5 @@ { lib, - pythonOlder, buildPythonPackage, fetchFromGitHub, setuptools-scm, @@ -15,18 +14,16 @@ pytestCheckHook, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "pygmt"; - version = "0.17.0"; + version = "0.18.0"; pyproject = true; - disabled = pythonOlder "3.11"; - src = fetchFromGitHub { owner = "GenericMappingTools"; repo = "pygmt"; - tag = "v${version}"; - hash = "sha256-YW111pgaW13TrD6mu+WgeLNljgmXWT/r1mZDbl9uROw="; + tag = "v${finalAttrs.version}"; + hash = "sha256-yWB/IRu5B6hnu8e1TvpAaLehr1TMqvnDc5sRgyMw2mM="; }; postPatch = '' @@ -63,7 +60,7 @@ buildPythonPackage rec { description = "Python interface for the Generic Mapping Tools"; homepage = "https://github.com/GenericMappingTools/pygmt"; license = lib.licenses.bsd3; - changelog = "https://github.com/GenericMappingTools/pygmt/releases/tag/${src.tag}"; + changelog = "https://github.com/GenericMappingTools/pygmt/releases/tag/${finalAttrs.src.tag}"; teams = [ lib.teams.geospatial ]; }; -} +}) diff --git a/pkgs/development/python-modules/pyinfra-testgen/default.nix b/pkgs/development/python-modules/pyinfra-testgen/default.nix new file mode 100644 index 000000000000..9a426e492ca6 --- /dev/null +++ b/pkgs/development/python-modules/pyinfra-testgen/default.nix @@ -0,0 +1,43 @@ +{ + lib, + buildPythonPackage, + fetchPypi, + uv-build, + pyyaml, +}: + +buildPythonPackage rec { + pname = "pyinfra-testgen"; + version = "0.1.1"; + pyproject = true; + + # no tags on GitHub + src = fetchPypi { + pname = "pyinfra_testgen"; + inherit version; + hash = "sha256-c5pZ0SfRXC50vJZfnnf0HQgImf7hi2oQ5/XKMVNzlpc="; + }; + + postPatch = '' + substituteInPlace pyproject.toml \ + --replace-fail "uv_build>=0.8.14,<0.9.0" uv_build + ''; + + build-system = [ uv-build ]; + + dependencies = [ + pyyaml + ]; + + pythonImportsCheck = [ "testgen" ]; + + # upstream has no tests + doCheck = false; + + meta = { + description = "Generate Python unit tests from JSON and YAML files"; + homepage = "https://github.com/pyinfra-dev/testgen"; + license = lib.licenses.mit; + maintainers = [ lib.maintainers.dotlambda ]; + }; +} diff --git a/pkgs/development/python-modules/pyinfra/default.nix b/pkgs/development/python-modules/pyinfra/default.nix index a73a8d10b9b5..6eda1baa56b8 100644 --- a/pkgs/development/python-modules/pyinfra/default.nix +++ b/pkgs/development/python-modules/pyinfra/default.nix @@ -4,33 +4,54 @@ click, distro, fetchFromGitHub, + fetchpatch, + freezegun, gevent, - importlib-metadata, + hatchling, jinja2, packaging, paramiko, + pydantic, + pyinfra-testgen, + pytest-testinfra, pytestCheckHook, python-dateutil, pythonOlder, - pywinrm, - setuptools, typeguard, typing-extensions, + uv-dynamic-versioning, }: buildPythonPackage rec { pname = "pyinfra"; - version = "3.4.1"; + version = "3.6"; pyproject = true; src = fetchFromGitHub { owner = "Fizzadar"; repo = "pyinfra"; tag = "v${version}"; - hash = "sha256-7bNkDm5SyIgVkrGQ95/q7AiY/JnxtWx+jkDO/rJQ2WQ="; + hash = "sha256-CTeGn9aN5voyCUL5LuTErLgTgC1Z/qTS7SB9TNfq7mc="; }; - build-system = [ setuptools ]; + patches = [ + # paramiko v4 compat + # https://github.com/pyinfra-dev/pyinfra/pull/1525 + (fetchpatch { + name = "remove-DSSKey.patch"; + url = "https://github.com/pyinfra-dev/pyinfra/commit/a655bdf425884055145cfd0011c3b444c9a3ada2.patch"; + hash = "sha256-puHcA4+KigltCL2tUYRMc9OT3kxvTeW77bbFbxgkcTs="; + }) + ]; + + build-system = [ + hatchling + uv-dynamic-versioning + ]; + + pythonRelaxDeps = [ + "paramiko" + ]; dependencies = [ click @@ -39,15 +60,18 @@ buildPythonPackage rec { jinja2 packaging paramiko + pydantic python-dateutil - pywinrm - setuptools typeguard ] - ++ lib.optionals (pythonOlder "3.11") [ typing-extensions ] - ++ lib.optionals (pythonOlder "3.10") [ importlib-metadata ]; + ++ lib.optionals (pythonOlder "3.11") [ typing-extensions ]; - nativeCheckInputs = [ pytestCheckHook ]; + nativeCheckInputs = [ + freezegun + pyinfra-testgen + pytest-testinfra + pytestCheckHook + ]; pythonImportsCheck = [ "pyinfra" ]; diff --git a/pkgs/development/python-modules/pyrate-limiter/default.nix b/pkgs/development/python-modules/pyrate-limiter/default.nix index fe0c175048fd..d14866abba03 100644 --- a/pkgs/development/python-modules/pyrate-limiter/default.nix +++ b/pkgs/development/python-modules/pyrate-limiter/default.nix @@ -82,6 +82,6 @@ buildPythonPackage rec { homepage = "https://github.com/vutran1710/PyrateLimiter"; changelog = "https://github.com/vutran1710/PyrateLimiter/blob/${src.tag}/CHANGELOG.md"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/python-modules/python-engineio/default.nix b/pkgs/development/python-modules/python-engineio/default.nix index b905b22971e8..8026a606c7f6 100644 --- a/pkgs/development/python-modules/python-engineio/default.nix +++ b/pkgs/development/python-modules/python-engineio/default.nix @@ -19,14 +19,14 @@ buildPythonPackage rec { pname = "python-engineio"; - version = "4.12.3"; + version = "4.13.0"; pyproject = true; src = fetchFromGitHub { owner = "miguelgrinberg"; repo = "python-engineio"; tag = "v${version}"; - hash = "sha256-VcL8Od1EM/cbbeOVyXlsXYt8Bms636XbtunrTblkGDQ="; + hash = "sha256-lNVy2Q14+F43TfV1iXqCy1rm4DGjt5IgNVHzMOeOZ5s="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/python-fsutil/default.nix b/pkgs/development/python-modules/python-fsutil/default.nix index c51ce2b89dba..de5c9aac1dcb 100644 --- a/pkgs/development/python-modules/python-fsutil/default.nix +++ b/pkgs/development/python-modules/python-fsutil/default.nix @@ -7,16 +7,16 @@ setuptools, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "python-fsutil"; - version = "0.15.0"; + version = "0.16.0"; pyproject = true; src = fetchFromGitHub { owner = "fabiocaccamo"; repo = "python-fsutil"; - tag = version; - hash = "sha256-hzPNj6hqNCnMx1iRK1c6Y70dUU/H4u6o+waEgOhyhuA="; + tag = finalAttrs.version; + hash = "sha256-1XYyfBuaUED+xnVrILEtB+fUpc8sk4BDzGp8Hln/rlc="; }; build-system = [ setuptools ]; @@ -36,8 +36,8 @@ buildPythonPackage rec { meta = { description = "Module with file-system utilities"; homepage = "https://github.com/fabiocaccamo/python-fsutil"; - changelog = "https://github.com/fabiocaccamo/python-fsutil/blob/${version}/CHANGELOG.md"; + changelog = "https://github.com/fabiocaccamo/python-fsutil/blob/${finalAttrs.src.tag}/CHANGELOG.md"; license = lib.licenses.mit; maintainers = with lib.maintainers; [ fab ]; }; -} +}) diff --git a/pkgs/development/python-modules/python-socketio/default.nix b/pkgs/development/python-modules/python-socketio/default.nix index 8220ee89a803..a5fd12ae5cf5 100644 --- a/pkgs/development/python-modules/python-socketio/default.nix +++ b/pkgs/development/python-modules/python-socketio/default.nix @@ -29,14 +29,14 @@ buildPythonPackage rec { pname = "python-socketio"; - version = "5.15.0"; + version = "5.16.0"; pyproject = true; src = fetchFromGitHub { owner = "miguelgrinberg"; repo = "python-socketio"; tag = "v${version}"; - hash = "sha256-7SX55TXU7HzxoatYor4mUiZoi/2O7nqaAIniyl4lGoc="; + hash = "sha256-20qTND62sIrWuJ7kY+4Pf9qP9Z5+CrItPiXnTDhmcME="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/pyvizio/default.nix b/pkgs/development/python-modules/pyvizio/default.nix index 9cb445ecb454..765d24bf70cb 100644 --- a/pkgs/development/python-modules/pyvizio/default.nix +++ b/pkgs/development/python-modules/pyvizio/default.nix @@ -6,22 +6,25 @@ fetchPypi, jsonpickle, requests, + setuptools, tabulate, xmltodict, zeroconf, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "pyvizio"; - version = "0.1.61"; - format = "setuptools"; + version = "0.1.63"; + pyproject = true; src = fetchPypi { - inherit pname version; - hash = "sha256-AtqMWe2zgRqOp5S9oKq7keHNHM8pnTmV1mfGiVzygTc="; + inherit (finalAttrs) pname version; + hash = "sha256-bRdxIqU3euzrtMvD00nPxOD69VWP2vkGZHxUe3O/YP8="; }; - propagatedBuildInputs = [ + build-system = [ setuptools ]; + + dependencies = [ aiohttp click jsonpickle @@ -33,13 +36,15 @@ buildPythonPackage rec { # Project has no tests doCheck = false; + pythonImportsCheck = [ "pyvizio" ]; meta = { description = "Python client for Vizio SmartCast"; - mainProgram = "pyvizio"; homepage = "https://github.com/vkorn/pyvizio"; - license = with lib.licenses; [ gpl3Only ]; + changelog = "https://github.com/raman325/pyvizio/releases/tag/v${finalAttrs.version}"; + license = lib.licenses.gpl3Only; maintainers = with lib.maintainers; [ fab ]; + mainProgram = "pyvizio"; }; -} +}) diff --git a/pkgs/development/python-modules/rioxarray/default.nix b/pkgs/development/python-modules/rioxarray/default.nix index 5bdd716bd6f9..3abd52840580 100644 --- a/pkgs/development/python-modules/rioxarray/default.nix +++ b/pkgs/development/python-modules/rioxarray/default.nix @@ -56,6 +56,8 @@ buildPythonPackage rec { # Fails with small numerical errors on GDAL 3.11 "test_rasterio_vrt_gcps" "test_reproject__gcps" + # IndexError: range object index out of range (Python 3.13+) + "test_indexing" ] ++ lib.optionals stdenv.hostPlatform.isAarch64 [ # numerical errors diff --git a/pkgs/development/python-modules/sigstore/default.nix b/pkgs/development/python-modules/sigstore/default.nix index 01681e3259c3..b54fa72b51be 100644 --- a/pkgs/development/python-modules/sigstore/default.nix +++ b/pkgs/development/python-modules/sigstore/default.nix @@ -28,18 +28,19 @@ }: buildPythonPackage rec { - pname = "sigstore-python"; - version = "4.0.0"; + pname = "sigstore"; + version = "4.1.0"; pyproject = true; src = fetchFromGitHub { owner = "sigstore"; repo = "sigstore-python"; tag = "v${version}"; - hash = "sha256-KAHGg2o5t8qfbvLGTzaVoV7AcMkgi3rXxyOQgSASl7A="; + hash = "sha256-Wt9ZoMHTiMlbAab9p8/WF38/OiyCaqHPS5R7/fTAfxw="; }; pythonRelaxDeps = [ + "sigstore-models" "sigstore-rekor-types" "rfc3161-client" "cryptography" diff --git a/pkgs/development/python-modules/solaredge-web/default.nix b/pkgs/development/python-modules/solaredge-web/default.nix index 32be69fb465a..71f0e29d018f 100644 --- a/pkgs/development/python-modules/solaredge-web/default.nix +++ b/pkgs/development/python-modules/solaredge-web/default.nix @@ -9,14 +9,14 @@ buildPythonPackage rec { pname = "solaredge-web"; - version = "0.0.1"; + version = "0.1.0"; pyproject = true; src = fetchFromGitHub { owner = "Solarlibs"; repo = "solaredge-web"; tag = "v${version}"; - hash = "sha256-Vf/f5NDmjsKY8F5//8uAk+dJEaku94yjNaD2XyX7Vuk="; + hash = "sha256-kVjhXW+MPIh41IIaTHCKXz+SOfZ0w61fCBsutNszrAY="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/switchbot-api/default.nix b/pkgs/development/python-modules/switchbot-api/default.nix index c2dd154753a5..c04a5df6c39f 100644 --- a/pkgs/development/python-modules/switchbot-api/default.nix +++ b/pkgs/development/python-modules/switchbot-api/default.nix @@ -6,16 +6,16 @@ poetry-core, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "switchbot-api"; - version = "2.9.0"; + version = "2.10.0"; pyproject = true; src = fetchFromGitHub { owner = "SeraphicCorp"; repo = "py-switchbot-api"; - tag = "v${version}"; - hash = "sha256-G5cUpX89KC6C4295wbvyeYWvUob4LdHiJjcN0UbVJnY="; + tag = "v${finalAttrs.version}"; + hash = "sha256-s6ezIkW36eIaxqedOfIk4KNhCwjXPFkc49qqK2p2eGw="; }; build-system = [ poetry-core ]; @@ -30,8 +30,8 @@ buildPythonPackage rec { meta = { description = "Asynchronous library to use Switchbot API"; homepage = "https://github.com/SeraphicCorp/py-switchbot-api"; - changelog = "https://github.com/SeraphicCorp/py-switchbot-api/releases/tag/${src.tag}"; + changelog = "https://github.com/SeraphicCorp/py-switchbot-api/releases/tag/${finalAttrs.src.tag}"; license = lib.licenses.mit; maintainers = with lib.maintainers; [ fab ]; }; -} +}) diff --git a/pkgs/development/python-modules/tagoio-sdk/default.nix b/pkgs/development/python-modules/tagoio-sdk/default.nix index 08c1eba32bf9..d110c7971dbe 100644 --- a/pkgs/development/python-modules/tagoio-sdk/default.nix +++ b/pkgs/development/python-modules/tagoio-sdk/default.nix @@ -13,16 +13,16 @@ sseclient-py, }: -buildPythonPackage rec { +buildPythonPackage (finalAttrs: { pname = "tagoio-sdk"; - version = "5.1.0"; + version = "5.1.1"; pyproject = true; src = fetchFromGitHub { owner = "tago-io"; repo = "sdk-python"; - tag = "v${version}"; - hash = "sha256-jKgH78ZFb9hr7rb71mF7qIpfDzCCWLlqUJVjO88dbYc="; + tag = "v${finalAttrs.version}"; + hash = "sha256-1sPwwRgMGcT8ZCKkc6nt1XAjz4frw6guVbDN+Ydaa94="; }; pythonRelaxDeps = [ "requests" ]; @@ -48,8 +48,8 @@ buildPythonPackage rec { meta = { description = "Module for interacting with Tago.io"; homepage = "https://github.com/tago-io/sdk-python"; - changelog = "https://github.com/tago-io/sdk-python/releases/tag/${src.tag}"; + changelog = "https://github.com/tago-io/sdk-python/releases/tag/${finalAttrs.src.tag}"; license = lib.licenses.asl20; maintainers = with lib.maintainers; [ fab ]; }; -} +}) diff --git a/pkgs/development/python-modules/tencentcloud-sdk-python/default.nix b/pkgs/development/python-modules/tencentcloud-sdk-python/default.nix index 514b6ceb64be..1494d0ac77c5 100644 --- a/pkgs/development/python-modules/tencentcloud-sdk-python/default.nix +++ b/pkgs/development/python-modules/tencentcloud-sdk-python/default.nix @@ -9,14 +9,14 @@ buildPythonPackage (finalAttrs: { pname = "tencentcloud-sdk-python"; - version = "3.1.31"; + version = "3.1.32"; pyproject = true; src = fetchFromGitHub { owner = "TencentCloud"; repo = "tencentcloud-sdk-python"; tag = finalAttrs.version; - hash = "sha256-JcWKoSN92QQdvCkhuSexMwYEr+boanOAyviFuMf2bmo="; + hash = "sha256-ELXBgIBR4RwW1mB6zN6t7ayoohwnvRzjQph9MJXSPRc="; }; build-system = [ setuptools ]; diff --git a/pkgs/development/python-modules/untokenize/default.nix b/pkgs/development/python-modules/untokenize/default.nix index be7c41eed599..b12a9f382db7 100644 --- a/pkgs/development/python-modules/untokenize/default.nix +++ b/pkgs/development/python-modules/untokenize/default.nix @@ -2,6 +2,7 @@ lib, buildPythonPackage, fetchPypi, + pythonAtLeast, unittestCheckHook, }: @@ -10,6 +11,9 @@ buildPythonPackage rec { version = "0.1.1"; format = "setuptools"; + # https://github.com/myint/untokenize/issues/4 + disabled = pythonAtLeast "3.14"; + src = fetchPypi { inherit pname version; sha256 = "3865dbbbb8efb4bb5eaa72f1be7f3e0be00ea8b7f125c69cbd1f5fda926f37a2"; diff --git a/pkgs/development/python-modules/vallox-websocket-api/default.nix b/pkgs/development/python-modules/vallox-websocket-api/default.nix index 82f2110a9042..88de8b8c9e52 100644 --- a/pkgs/development/python-modules/vallox-websocket-api/default.nix +++ b/pkgs/development/python-modules/vallox-websocket-api/default.nix @@ -12,14 +12,14 @@ buildPythonPackage rec { pname = "vallox-websocket-api"; - version = "5.4.0"; + version = "6.0.0"; pyproject = true; src = fetchFromGitHub { owner = "yozik04"; repo = "vallox_websocket_api"; tag = version; - hash = "sha256-L9duL8XfDUxHgJxVbG7PPPRJRzVEckxqbB+1vX0GalU="; + hash = "sha256-i4KUXvDz6FCdQguZtpNybyIPC/gn+O3SAYWh2CIbAeI="; }; build-system = [ diff --git a/pkgs/development/python-modules/yasi/default.nix b/pkgs/development/python-modules/yasi/default.nix index 80076d43bbb7..0676f058b4bf 100644 --- a/pkgs/development/python-modules/yasi/default.nix +++ b/pkgs/development/python-modules/yasi/default.nix @@ -38,6 +38,6 @@ buildPythonPackage rec { homepage = "https://github.com/nkmathew/yasi-sexp-indenter"; changelog = "https://github.com/nkmathew/yasi-sexp-indenter/blob/${src.rev}/CHANGELOG.md"; license = lib.licenses.mit; - maintainers = with lib.maintainers; [ kranzes ]; + maintainers = [ ]; }; } diff --git a/pkgs/development/r-modules/wrapper-rstudio.nix b/pkgs/development/r-modules/wrapper-rstudio.nix index 817888a7ce50..c306e83edcac 100644 --- a/pkgs/development/r-modules/wrapper-rstudio.nix +++ b/pkgs/development/r-modules/wrapper-rstudio.nix @@ -32,7 +32,7 @@ runCommand (rstudio.name + "-wrapper") # with the wrapped one, however, RStudio internally overrides # R_LIBS_SITE. The below works around this by turning R_LIBS_SITE # into an R file (fixLibsR) which achieves the same effect, then - # uses R_PROFILE_USER to load this code at startup in RStudio. + # uses R_PROFILE to load this code at startup in RStudio. fixLibsR = "fix_libs.R"; } ( @@ -48,7 +48,7 @@ runCommand (rstudio.name + "-wrapper") if rstudio.server then '' makeWrapper ${rstudio}/bin/rsession $out/bin/rsession \ - --set R_PROFILE_USER $out/$fixLibsR --set FONTCONFIG_FILE ${fontconfig.out}/etc/fonts/fonts.conf + --set R_PROFILE $out/$fixLibsR --set FONTCONFIG_FILE ${fontconfig.out}/etc/fonts/fonts.conf makeWrapper ${rstudio}/bin/rserver $out/bin/rserver \ --add-flags --rsession-path=$out/bin/rsession @@ -63,7 +63,7 @@ runCommand (rstudio.name + "-wrapper") ''} makeWrapper ${rstudio}/bin/rstudio $out/bin/rstudio \ - --set R_PROFILE_USER $out/$fixLibsR + --set R_PROFILE $out/$fixLibsR '' ) ) diff --git a/pkgs/kde/plasma/powerdevil/default.nix b/pkgs/kde/plasma/powerdevil/default.nix index 095a45beb866..87d964fbb346 100644 --- a/pkgs/kde/plasma/powerdevil/default.nix +++ b/pkgs/kde/plasma/powerdevil/default.nix @@ -10,6 +10,8 @@ mkKdeDerivation { patches = [ # https://invent.kde.org/plasma/powerdevil/-/merge_requests/595 ./rb-brightness.patch + # https://invent.kde.org/plasma/powerdevil/-/merge_requests/595 + ./rb-batterymonitor.patch ]; extraNativeBuildInputs = [ pkg-config ]; extraBuildInputs = [ diff --git a/pkgs/kde/plasma/powerdevil/rb-batterymonitor.patch b/pkgs/kde/plasma/powerdevil/rb-batterymonitor.patch new file mode 100644 index 000000000000..b5808138734f --- /dev/null +++ b/pkgs/kde/plasma/powerdevil/rb-batterymonitor.patch @@ -0,0 +1,10 @@ +diff --git a/applets/batterymonitor/CMakeLists.txt b/applets/batterymonitor/CMakeLists.txt +index 28e52d26..3f2bf985 100644 +--- a/applets/batterymonitor/CMakeLists.txt ++++ b/applets/batterymonitor/CMakeLists.txt +@@ -19,3 +19,5 @@ plasma_add_applet(org.kde.plasma.battery + main.xml + GENERATE_APPLET_CLASS + ) ++ ++add_dependencies(org.kde.plasma.battery batterymonitorplugin) diff --git a/pkgs/servers/home-assistant/custom-components/homematicip_local/package.nix b/pkgs/servers/home-assistant/custom-components/homematicip_local/package.nix index 07e3b4458a84..0835972d1f1b 100644 --- a/pkgs/servers/home-assistant/custom-components/homematicip_local/package.nix +++ b/pkgs/servers/home-assistant/custom-components/homematicip_local/package.nix @@ -13,13 +13,13 @@ buildHomeAssistantComponent rec { owner = "SukramJ"; domain = "homematicip_local"; - version = "2.1.1"; + version = "2.1.2"; src = fetchFromGitHub { owner = "SukramJ"; repo = "custom_homematic"; tag = version; - hash = "sha256-pE32BBFuhHfEc0mGTrrDqdeHgz6LeOZmJmjfsvdrleQ="; + hash = "sha256-GD5EcsVjlhP6jHsZgedd2HHASFHvt3iaJAPHtnm7U+0="; }; postPatch = '' diff --git a/pkgs/servers/home-assistant/custom-components/solax_modbus/package.nix b/pkgs/servers/home-assistant/custom-components/solax_modbus/package.nix index 9fae6a33098b..adeaded73498 100644 --- a/pkgs/servers/home-assistant/custom-components/solax_modbus/package.nix +++ b/pkgs/servers/home-assistant/custom-components/solax_modbus/package.nix @@ -8,13 +8,13 @@ buildHomeAssistantComponent rec { owner = "wills106"; domain = "solax_modbus"; - version = "2025.11.1"; + version = "2026.01.1"; src = fetchFromGitHub { owner = "wills106"; repo = "homeassistant-solax-modbus"; tag = version; - hash = "sha256-uzwXJ9GJuzp7IVpdM6r7+ZU2KF7jORpqIwqKTc8Iuok="; + hash = "sha256-aVrYlJlvYTnVbt7Xc4nYj5bbTrbL4f2QcuTJrrKDmDg="; }; dependencies = [ pymodbus ]; diff --git a/pkgs/tools/misc/sshx/default.nix b/pkgs/tools/misc/sshx/default.nix index 1aeb743ba6af..d4f9d81751df 100644 --- a/pkgs/tools/misc/sshx/default.nix +++ b/pkgs/tools/misc/sshx/default.nix @@ -43,7 +43,6 @@ let license = lib.licenses.mit; maintainers = with lib.maintainers; [ pinpox - kranzes ]; mainProgram = pname; }; diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index eb2276cc2566..54d3813cdf61 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -1775,6 +1775,7 @@ mapAliases { win-pvdrivers = throw "'win-pvdrivers' has been removed as it was subject to the Xen build machine compromise (XSN-01) and has open security vulnerabilities (XSA-468)"; # Added 2025-08-29 win-virtio = throw "'win-virtio' has been renamed to/replaced by 'virtio-win'"; # Converted to throw 2025-10-27 wineWayland = throw "'wineWayland' has been renamed to/replaced by 'wine-wayland'"; # Converted to throw 2025-10-27 + wingpanel-indicator-ayatana = throw "'wingpanel-indicator-ayatana' has been removed as it is archived upstream and doesn't work with pantheon 8 and onwards. Use wingpanel-indicator-namarupa instead"; # Added 2026-01-14 winhelpcgi = throw "'winhelpcgi' has been removed as it was unmaintained upstream and broken with GCC 14"; # Added 2025-06-14 wkhtmltopdf-bin = throw "'wkhtmltopdf-bin' has been renamed to/replaced by 'wkhtmltopdf'"; # Converted to throw 2025-10-27 wlx-overlay-s = throw "'wlx-overlay-s' and 'wayvr-dashboard' have been merged into a single application. Please switch to 'wayvr'"; # Added 2026-01-09 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index eb7c50937ce3..4d527a65d187 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -13229,8 +13229,6 @@ with pkgs; antimicrox = libsForQt5.callPackage ../tools/misc/antimicrox { }; - autotiling = python3Packages.callPackage ../misc/autotiling { }; - brgenml1lpr = pkgsi686Linux.callPackage ../misc/cups/drivers/brgenml1lpr { }; foomatic-db-ppds-withNonfreeDb = callPackage ../by-name/fo/foomatic-db-ppds/package.nix { diff --git a/pkgs/top-level/python-packages.nix b/pkgs/top-level/python-packages.nix index afeba3265b94..2054ad2545d6 100644 --- a/pkgs/top-level/python-packages.nix +++ b/pkgs/top-level/python-packages.nix @@ -13645,6 +13645,8 @@ self: super: with self; { pyinfra = callPackage ../development/python-modules/pyinfra { }; + pyinfra-testgen = callPackage ../development/python-modules/pyinfra-testgen { }; + pyinotify = callPackage ../development/python-modules/pyinotify { }; pyinputevent = callPackage ../development/python-modules/pyinputevent { }; diff --git a/pkgs/top-level/release-cross.nix b/pkgs/top-level/release-cross.nix index 7f2696a23828..95d30e66077a 100644 --- a/pkgs/top-level/release-cross.nix +++ b/pkgs/top-level/release-cross.nix @@ -205,11 +205,12 @@ in } ); - # Test some cross builds on 32 bit mingw-w64 - crossMingw32 = mapTestOnCross systems.examples.mingw32 windowsCommon; - - # Test some cross builds on 64 bit mingw-w64 - crossMingwW64 = mapTestOnCross systems.examples.mingwW64 windowsCommon; + # Test some cross builds on various mingw-w64 platforms + crossMingw32 = mapTestOnCross systems.examples.mingw-msvcrt-i686 windowsCommon; + cross-mingw-msvcrt-x86_64 = mapTestOnCross systems.examples.mingw-msvcrt-x86_64 windowsCommon; + cross-mingw-ucrt-x86_64 = mapTestOnCross systems.examples.mingw-ucrt-x86_64 windowsCommon; + cross-mingw-ucrt-x86_64-llvm = mapTestOnCross systems.examples.mingw-ucrt-x86_64-llvm windowsCommon; + cross-mingw-ucrt-aarch64 = mapTestOnCross systems.examples.mingw-ucrt-aarch64 windowsCommon; x86_64-cygwin = mapTestOnCross systems.examples.x86_64-cygwin cygwinCommon;