style: Switch to nixfmt from nixpkgs-fmt

Most of the ecosystem has moved to this formatter,
and many people configured their editors to autoformat it with this formatter.

Closes: https://git.snix.dev/snix/snix/issues/62
Change-Id: Icf39e7836c91fc2ae49fbe22a40a639105bfb0bd
Reviewed-on: https://cl.snix.dev/c/snix/+/30671
Reviewed-by: Florian Klink <flokli@flokli.de>
Tested-by: besadii
Autosubmit: Ilan Joselevich <personal@ilanjoselevich.com>
This commit is contained in:
Ilan Joselevich 2025-08-09 21:08:41 +02:00
parent 3443e6bd08
commit 91d02d8c84
136 changed files with 39952 additions and 11007 deletions

View file

@ -13,21 +13,21 @@ in
validateTerraform =
{
# Environment name to use (inconsequential, only for drv name)
name ? "main"
, # Terraform package to use. Should be pre-configured with the
name ? "main",
# Terraform package to use. Should be pre-configured with the
# correct providers.
terraform ? pkgs.terraform
, # Source path for Terraform configuration. Be careful about
terraform ? pkgs.terraform,
# Source path for Terraform configuration. Be careful about
# relative imports. Use the 'subDir' parameter to optionally cd
# into a subdirectory of source, e.g. if there is a flat structure
# with modules.
src
, # Sub-directory of $src from which to run the check. Useful in
src,
# Sub-directory of $src from which to run the check. Useful in
# case of relative Terraform imports from a code tree
subDir ? "."
, # Environment variables to pass to Terraform. Necessary in case of
subDir ? ".",
# Environment variables to pass to Terraform. Necessary in case of
# dummy environment variables that need to be set.
env ? { }
env ? { },
}:
pkgs.runCommand "tf-validate-${sanitizeDerivationName name}" env ''
cp -r ${src}/* . && chmod -R u+w .

View file

@ -22,7 +22,12 @@ pkgs.writeShellScriptBin "crfo-approve" ''
exit 1
fi
export PATH="${pkgs.lib.makeBinPath [ pkgs.httpie pkgs.jq ]}:''${PATH}"
export PATH="${
pkgs.lib.makeBinPath [
pkgs.httpie
pkgs.jq
]
}:''${PATH}"
readonly CL_ID="''${1}"
readonly PATCHSET="''${2}"

View file

@ -9,7 +9,7 @@ depot.nix.lazy-deps {
gerrit.attr = "tools.gerrit-cli";
mg.attr = "tools.magrathea";
niv.attr = "third_party.nixpkgs.niv";
nixpkgs-fmt.attr = "third_party.nixpkgs.nixpkgs-fmt";
nixfmt.attr = "third_party.nixpkgs.nixfmt";
tf-buildkite = {
attr = "ops.buildkite.terraform";

View file

@ -10,10 +10,11 @@ let
includes = ["*.go"]
[formatter.nix]
command = "${pkgs.nixpkgs-fmt}/bin/nixpkgs-fmt"
command = "${pkgs.nixfmt}/bin/nixfmt"
includes = [ "*.nix" ]
excludes = [
"snix/eval/src/tests/nix_tests/*",
"snix/eval/src/tests/snix_tests/*"
]
[formatter.rust]

View file

@ -20,7 +20,10 @@ stdenv.mkDerivation {
src = ./.;
dontInstall = true;
nativeBuildInputs = [ chicken makeWrapper ];
nativeBuildInputs = [
chicken
makeWrapper
];
buildInputs = with chickenPackages.chickenEggs; [
matchable
srfi-13

View file

@ -1,5 +1,10 @@
# Definitions for simple release mechanisms from depot.
{ depot, lib, pkgs, ... }:
{
depot,
lib,
pkgs,
...
}:
let
inherit (lib.strings) makeBinPath sanitizeDerivationName;
@ -10,28 +15,39 @@ in
#
# This expects, of course, that the remote repository has granted
# push access to the CI SSH key.
filteredGitPush = { filter, remote, ref ? "refs/heads/canon" }: {
label = ":git: push '${filter}' to external git repository";
branches = [ "refs/heads/canon" ];
phase = "release";
filteredGitPush =
{
filter,
remote,
ref ? "refs/heads/canon",
}:
{
label = ":git: push '${filter}' to external git repository";
branches = [ "refs/heads/canon" ];
phase = "release";
command = pkgs.writeShellScript "${sanitizeDerivationName filter}-push" ''
set -e
export PATH="${makeBinPath [ pkgs.git pkgs.josh ]}:$PATH"
command = pkgs.writeShellScript "${sanitizeDerivationName filter}-push" ''
set -e
export PATH="${
makeBinPath [
pkgs.git
pkgs.josh
]
}:$PATH"
echo 'Filtering depot through ${filter}'
josh-filter '${filter}'
echo 'Filtering depot through ${filter}'
josh-filter '${filter}'
echo 'Fetching remote to check if a push is needed'
git fetch '${remote}' '${ref}'
echo 'Fetching remote to check if a push is needed'
git fetch '${remote}' '${ref}'
if git merge-base --is-ancestor FILTERED_HEAD FETCH_HEAD; then
echo 'Commit already present, nothing to push.'
exit 0
fi
if git merge-base --is-ancestor FILTERED_HEAD FETCH_HEAD; then
echo 'Commit already present, nothing to push.'
exit 0
fi
echo 'Pushing filtered repository to ${remote}:${ref}'
git push '${remote}' 'FILTERED_HEAD:${ref}'
'';
};
echo 'Pushing filtered repository to ${remote}:${ref}'
git push '${remote}' 'FILTERED_HEAD:${ref}'
'';
};
}

View file

@ -1,19 +1,22 @@
{ depot, pkgs, lib, ... }:
{
depot,
pkgs,
lib,
...
}:
let
our-crates = lib.filter (v: v ? outPath)
(builtins.attrValues depot.third_party.rust-crates);
our-crates = lib.filter (v: v ? outPath) (builtins.attrValues depot.third_party.rust-crates);
our-crates-lock-file = pkgs.writeText "our-crates-Cargo.lock"
(lib.concatMapStrings
(crate: ''
[[package]]
name = "${crate.crateName}"
version = "${crate.version}"
source = "registry+https://github.com/rust-lang/crates.io-index"
our-crates-lock-file = pkgs.writeText "our-crates-Cargo.lock" (
lib.concatMapStrings (crate: ''
[[package]]
name = "${crate.crateName}"
version = "${crate.version}"
source = "registry+https://github.com/rust-lang/crates.io-index"
'')
our-crates);
'') our-crates
);
lock-file-report = pkgs.writers.writeBash "lock-file-report" ''
set -u
@ -66,9 +69,10 @@ let
'';
buildkiteReportStep =
{ command
, context ? null
, style ? "warning"
{
command,
context ? null,
style ? "warning",
}:
let
commandName = depot.nix.utils.storePathName (builtins.head command);
@ -82,13 +86,16 @@ let
if test $? -ne 0; then
printf "%s" "$report" | \
buildkite-agent annotate ${
lib.escapeShellArgs ([
"--style"
style
] ++ lib.optionals (context != null) [
"--context"
context
])
lib.escapeShellArgs (
[
"--style"
style
]
++ lib.optionals (context != null) [
"--context"
context
]
)
}
fi
'';