Loading ci/default.nix +3 −1 Original line number Diff line number Diff line Loading @@ -18,7 +18,9 @@ let pkgs = import nixpkgs' { inherit system; config = { }; config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; overlays = [ ]; }; Loading lib/tests/release.nix +10 −3 Original line number Diff line number Diff line Loading @@ -2,7 +2,14 @@ # The pkgs used for dependencies for the testing itself # Don't test properties of pkgs.lib, but rather the lib in the parent directory system ? builtins.currentSystem, pkgs ? import ../.. { inherit system; } // { pkgs ? import ../.. { inherit system; config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; } // { lib = throw "pkgs.lib accessed, but the lib tests should use nixpkgs' lib path directly!"; }, # For testing someone may edit impure.nix to return cross pkgs, use `pkgsBuildBuild` directly so everything here works. Loading pkgs/tools/package-management/nix/common-autoconf.nix +2 −1 Original line number Diff line number Diff line Loading @@ -11,6 +11,7 @@ inherit hash; }, patches ? [ ], knownVulnerabilities ? [ ], maintainers ? [ lib.maintainers.lovesegfault lib.maintainers.artturin Loading Loading @@ -335,7 +336,7 @@ let ''; homepage = "https://nixos.org/"; license = licenses.lgpl21Plus; inherit maintainers teams; inherit knownVulnerabilities maintainers teams; platforms = platforms.unix; outputsToInstall = [ "out" ] ++ optional enableDocumentation "man"; mainProgram = "nix"; Loading pkgs/tools/package-management/nix/default.nix +9 −0 Original line number Diff line number Diff line Loading @@ -159,6 +159,15 @@ lib.makeExtensible ( patch-monitorfdhup ]; self_attribute_name = "nix_2_3"; knownVulnerabilities = [ "CVE-2024-38531" "CVE-2024-47174" "CVE-2025-46415" "CVE-2025-46416" "CVE-2025-52991" "CVE-2025-52992" "CVE-2025-52993" ]; maintainers = with lib.maintainers; [ flokli ]; teams = [ ]; }).overrideAttrs Loading pkgs/top-level/make-tarball.nix +7 −1 Original line number Diff line number Diff line Loading @@ -3,7 +3,13 @@ officialRelease, pkgs ? import nixpkgs.outPath { }, nix ? pkgs.nix, lib-tests ? import ../../lib/tests/release.nix { inherit pkgs; }, lib-tests ? import ../../lib/tests/release.nix { pkgs = import nixpkgs.outPath { config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; }; }, }: pkgs.releaseTools.sourceTarball { Loading Loading
ci/default.nix +3 −1 Original line number Diff line number Diff line Loading @@ -18,7 +18,9 @@ let pkgs = import nixpkgs' { inherit system; config = { }; config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; overlays = [ ]; }; Loading
lib/tests/release.nix +10 −3 Original line number Diff line number Diff line Loading @@ -2,7 +2,14 @@ # The pkgs used for dependencies for the testing itself # Don't test properties of pkgs.lib, but rather the lib in the parent directory system ? builtins.currentSystem, pkgs ? import ../.. { inherit system; } // { pkgs ? import ../.. { inherit system; config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; } // { lib = throw "pkgs.lib accessed, but the lib tests should use nixpkgs' lib path directly!"; }, # For testing someone may edit impure.nix to return cross pkgs, use `pkgsBuildBuild` directly so everything here works. Loading
pkgs/tools/package-management/nix/common-autoconf.nix +2 −1 Original line number Diff line number Diff line Loading @@ -11,6 +11,7 @@ inherit hash; }, patches ? [ ], knownVulnerabilities ? [ ], maintainers ? [ lib.maintainers.lovesegfault lib.maintainers.artturin Loading Loading @@ -335,7 +336,7 @@ let ''; homepage = "https://nixos.org/"; license = licenses.lgpl21Plus; inherit maintainers teams; inherit knownVulnerabilities maintainers teams; platforms = platforms.unix; outputsToInstall = [ "out" ] ++ optional enableDocumentation "man"; mainProgram = "nix"; Loading
pkgs/tools/package-management/nix/default.nix +9 −0 Original line number Diff line number Diff line Loading @@ -159,6 +159,15 @@ lib.makeExtensible ( patch-monitorfdhup ]; self_attribute_name = "nix_2_3"; knownVulnerabilities = [ "CVE-2024-38531" "CVE-2024-47174" "CVE-2025-46415" "CVE-2025-46416" "CVE-2025-52991" "CVE-2025-52992" "CVE-2025-52993" ]; maintainers = with lib.maintainers; [ flokli ]; teams = [ ]; }).overrideAttrs Loading
pkgs/top-level/make-tarball.nix +7 −1 Original line number Diff line number Diff line Loading @@ -3,7 +3,13 @@ officialRelease, pkgs ? import nixpkgs.outPath { }, nix ? pkgs.nix, lib-tests ? import ../../lib/tests/release.nix { inherit pkgs; }, lib-tests ? import ../../lib/tests/release.nix { pkgs = import nixpkgs.outPath { config = { permittedInsecurePackages = [ "nix-2.3.18" ]; }; }; }, }: pkgs.releaseTools.sourceTarball { Loading